var lpData = {"site_url":"https:\/\/staging.cyberleadershipinstitute.com","user_id":"0","theme":"astra-child","lp_rest_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/","nonce":"c63b3886d3","is_course_archive":"","courses_url":"https:\/\/staging.cyberleadershipinstitute.com\/courses-old-learnpress\/","urlParams":[],"lp_version":"4.2.6"};
var gtm4wp_datalayer_name = "dataLayer";
var dataLayer = dataLayer || [];
window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/staging.cyberleadershipinstitute.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.2"}};
/*! This file is auto-generated */
!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings);
https://staging.cyberleadershipinstitute.com/wp-includes/js/jquery/jquery.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/jquery/jquery-migrate.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/booster/assets/js/circle-progress.js
var twb = {"nonce":"56a7159345","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var twb = {"nonce":"56a7159345","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/booster/assets/js/global.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.lazy.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.sumoselect.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/tocca.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.mCustomScrollbar.concat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.fullscreen.min.js
var bwg_objectsL10n = {"bwg_field_required":"field is required.","bwg_mail_validation":"This is not a valid email address.","bwg_search_result":"There are no images matching your search.","bwg_select_tag":"Select Tag","bwg_order_by":"Order By","bwg_search":"Search","bwg_show_ecommerce":"Show Ecommerce","bwg_hide_ecommerce":"Hide Ecommerce","bwg_show_comments":"Show Comments","bwg_hide_comments":"Hide Comments","bwg_restore":"Restore","bwg_maximize":"Maximize","bwg_fullscreen":"Fullscreen","bwg_exit_fullscreen":"Exit Fullscreen","bwg_search_tag":"SEARCH...","bwg_tag_no_match":"No tags found","bwg_all_tags_selected":"All tags selected","bwg_tags_selected":"tags selected","play":"Play","pause":"Pause","is_pro":"","bwg_play":"Play","bwg_pause":"Pause","bwg_hide_info":"Hide info","bwg_show_info":"Show info","bwg_hide_rating":"Hide rating","bwg_show_rating":"Show rating","ok":"Ok","cancel":"Cancel","select_all":"Select all","lazy_load":"1","lazy_loader":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/images\/ajax_loader.png","front_ajax":"0","bwg_tag_see_all":"see all tags","bwg_tag_see_less":"see less tags"};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/scripts.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/imagesloaded.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/masonry.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/jquery/jquery.masonry.min.js
var tve_frontend_options = {"ajaxurl":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","is_editor_page":"","page_events":[],"is_single":"1","social_fb_app_id":"","dash_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/thrive-visual-editor\/thrive-dashboard","queried_object":{"ID":18292,"post_author":"3"},"query_vars":{"page":"","pagename":"develop-and-implement-a-security-incident-management-program"},"$_POST":[],"translations":{"Copy":"Copy","empty_username":"ERROR: The username field is empty.","empty_password":"ERROR: The password field is empty.","empty_login":"ERROR: Enter a username or email address.","min_chars":"At least %s characters are needed","no_headings":"No headings found","registration_err":{"required_field":"<strong>Error<\/strong>: This field is required","required_email":"<strong>Error<\/strong>: Please type your email address.","invalid_email":"<strong>Error<\/strong>: The email address isn’t correct.","passwordmismatch":"<strong>Error<\/strong>: Password mismatch"}},"routes":{"posts":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/posts","video_reporting":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/video-reporting","testimonials":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/testimonials"},"nonce":"c63b3886d3","allow_video_src":"1","google_client_id":null,"google_api_key":null,"facebook_app_id":null,"lead_generation_custom_tag_apis":["activecampaign","aweber","convertkit","drip","klicktipp","mailchimp","sendlane","zapier"],"post_request_data":[],"user_profile_nonce":"4700ca6443","ip":"3.238.227.73","current_user":[],"post_id":"18292","post_title":"Develop and Implement a Security Incident Management Program","post_type":"page","post_url":"https:\/\/staging.cyberleadershipinstitute.com\/develop-and-implement-a-security-incident-management-program\/","is_lp":"tcb2-bright-smart-sales-page","conditional_display":{"is_tooltip_dismissed":false}};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/general.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/plupload/moxie.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/post-list.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/wp-user-avatar/assets/flatpickr/flatpickr.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/wp-user-avatar/assets/select2/select2.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-ovation/tcb-bridge/frontend/js/display-testimonials-tcb.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/learnpress/assets/js/dist/loadAJAX.min.js
(function(url){
if(/(?:Chrome\/26\.0\.1410\.63 Safari\/537\.31|WordfenceTestMonBot)/.test(navigator.userAgent)){ return; }
var addEvent = function(evt, handler) {
if (window.addEventListener) {
document.addEventListener(evt, handler, false);
} else if (window.attachEvent) {
document.attachEvent('on' + evt, handler);
}
};
var removeEvent = function(evt, handler) {
if (window.removeEventListener) {
document.removeEventListener(evt, handler, false);
} else if (window.detachEvent) {
document.detachEvent('on' + evt, handler);
}
};
var evts = 'contextmenu dblclick drag dragend dragenter dragleave dragover dragstart drop keydown keypress keyup mousedown mousemove mouseout mouseover mouseup mousewheel scroll'.split(' ');
var logHuman = function() {
if (window.wfLogHumanRan) { return; }
window.wfLogHumanRan = true;
var wfscr = document.createElement('script');
wfscr.type = 'text/javascript';
wfscr.async = true;
wfscr.src = url + '&r=' + Math.random();
(document.getElementsByTagName('head')[0]||document.getElementsByTagName('body')[0]).appendChild(wfscr);
for (var i = 0; i < evts.length; i++) {
removeEvent(evts[i], logHuman);
}
};
for (var i = 0; i < evts.length; i++) {
addEvent(evts[i], logHuman);
}
})('//staging.cyberleadershipinstitute.com/?wordfence_lh=1&hid=5DC5BB4A6E89E97298D0851A450F3F95');
var dataLayer_content = {"pagePostType":"page","pagePostType2":"single-page","pagePostAuthor":"anirtac arim","geoCloudflareCountryCode":"US"};
dataLayer.push( dataLayer_content );
Develop and Implement a Security Incident Management Program
Create a scalable and cost-effective incident response program.
If you're already a member, click here to log in.
Major Business Pain Points
- Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
- Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being re-victimized by the same vector.
- Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.
- You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
- Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
- Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.
Approach
- Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
- This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.
Executive Brief
Read the concise Executive Brief to find out why you should develop and implement a security incident management program and review the methodology.
- Develop and Implement a Security Incident Management Program – Executive Brief
- Develop and Implement a Security Incident Management Program – Phases 1-3
1. Prepare
Equip your organization for incident response with formal documentation of policies and processes.
- Develop and Implement a Security Incident Management Program – Phase 1: Prepare
- Security Incident Management Maturity Checklist ‒ Preliminary
- Information Security Requirements Gathering Tool
- Incident Response Maturity Assessment Tool
- Security Incident Management Charter Template
- Security Incident Management Policy
- Security Incident Management RACI Tool
2. Operate
Act with efficiency and effectiveness as new incidents are handled.
- Develop and Implement a Security Incident Management Program – Phase 2: Operate
- Security Incident Management Plan
- Security Incident Runbook Prioritization Tool
- Security Incident Management Runbook: Credential Compromise
Security Incident Management Workflow: Credential Compromise (Visio)
- Security Incident Management Workflow: Credential Compromise (PDF)
- Security Incident Management Runbook: Distributed Denial of Service
Security Incident Management Workflow: Distributed Denial of Service (Visio)
- Security Incident Management Workflow: Distributed Denial of Service (PDF)
- Security Incident Management Runbook: Malware
Security Incident Management Workflow: Malware (Visio)
- Security Incident Management Workflow: Malware (PDF)
- Security Incident Management Runbook: Malicious Email
Security Incident Management Workflow: Malicious Email (Visio)
- Security Incident Management Workflow: Malicious Email (PDF)
- Security Incident Management Runbook: Ransomware
Security Incident Management Workflow: Ransomware (Visio)
- Security Incident Management Workflow: Ransomware (PDF)
- Security Incident Management Runbook: Data Breach
Security Incident Management Workflow: Data Breach (Visio)
- Security Incident Management Workflow: Data Breach (PDF)
- Data Breach Reporting Requirements Summary
- Security Incident Management Runbook: Third-Party Incident
Security Incident Management Workflow: Third-Party Incident (Visio)
- Security Incident Management Workflow: Third-Party Incident (PDF)
- Security Incident Management Runbook: Blank Template
3. Maintain and optimize
Manage and improve the incident management process by tracking metrics, testing capabilities, and leveraging best practices.
- Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize
- Security Incident Metrics Tool
- Post-Incident Review Questions Tracking Tool
- Root-Cause Analysis Template
- Security Incident Report Template
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.
jQuery( document ).ready(function() {
if (jQuery(window).width() < 767) {
jQuery('body').addClass('lp-sidebar-toggle__close');
}
});
var OX = {is_loaded:false, callbacks:[], delay_ex:7E3, lazy_class:".oxlazy", mime_js:"text/oxjs", events:["scroll", "mousemove", "touchstart", "touchmove"], add_event:function(evnt, elem, func){if (elem.addEventListener)elem.addEventListener(evnt, func, false); else if (elem.attachEvent)elem.attachEvent("on" + evnt, func); else elem["on" + evnt] = func}, add_cb:function(cb){this.callbacks.push(cb)}, inject_scripts:function(scripts_obj, refnode){var i = 0, len = scripts_obj.length; if (!refnode)refnode = document.getElementsByTagName("head")[0]; for (i; i < len; i++)refnode.insertBefore(this._el("script", scripts_obj[i]), refnode.children[refnode.children.length - 1])}, _el:function(el, attrs){var elem = document.createElement(el); for (var k in attrs)if (k === "textContent")elem.textContent = attrs[k]; else elem.setAttribute(k, attrs[k]); return elem}, init:function(){this.events.forEach(function(e){document.addEventListener(e, OX.execute)}); window.setTimeout(OX.execute, OX.delay_ex)}, execute:function(){if (OX.loaded)return; document.querySelectorAll(OX.lazy_class).forEach(function(elem){if (elem.hasAttribute("data-href"))elem.setAttribute("href", elem.getAttribute("data-href")); else if (elem.hasAttribute("data-src"))elem.setAttribute("src", elem.getAttribute("data-src"))}); for (var i = 0; i < OX.callbacks.length; i++)OX.callbacks[i](); OX.events.forEach(function(e){document.removeEventListener(e, OX.execute)}); OX.loaded = true}};
document.addEventListener("DOMContentLoaded", function(){OX.init()});
( $ => {
/**
* Displays toast message from storage, it is used when the user is redirected after login
*/
if ( window.sessionStorage ) {
$( window ).on( 'tcb_after_dom_ready', () => {
const message = sessionStorage.getItem( 'tcb_toast_message' );
if ( message ) {
tcbToast( sessionStorage.getItem( 'tcb_toast_message' ), false );
sessionStorage.removeItem( 'tcb_toast_message' );
}
} );
}
/**
* Displays toast message
*
* @param {string} message - message to display
* @param {Boolean} error - whether the message is an error or not
* @param {Function} callback - callback function to be called after the message is closed
*/
function tcbToast( message, error, callback ) {
/* Also allow "message" objects */
if ( typeof message !== 'string' ) {
message = message.message || message.error || message.success;
}
if ( ! error ) {
error = false;
}
TCB_Front.notificationElement.toggle( message, error ? 'error' : 'success', callback );
}
} )( typeof ThriveGlobal === 'undefined' ? jQuery : ThriveGlobal.$j );
window.TVE_Event_Manager_Registered_Callbacks = window.TVE_Event_Manager_Registered_Callbacks || {};window.TVE_Event_Manager_Registered_Callbacks.thrive_animation = function(trigger, action, config) {var $element = jQuery( this ),
$at = $element.closest( '.tcb-col, .thrv_wrapper' );
if ( $at.length === 0 ) {
$at = $element;
}
if ( ! config.loop && $at.data( 'a-done' ) ) {
return;
}
$at.data( 'a-done', 1 );
const hadAnimStart = $at.hasClass( 'tve_anim_start' );
$at.removeClass( function ( i, cls ) {
return cls.split( ' ' ).filter( function ( item ) {
return item.indexOf( 'tve_anim_' ) === 0;
} ).join( ' ' );
} ).addClass( 'tve_anim_' + config.anim ).removeClass( 'tve_anim_start' );
if ( config.loop ) {
setTimeout( function () {
$at.addClass( 'tve_anim_start' );
}, hadAnimStart ? 50 : 0 );
if ( trigger === 'mouseover' ) {
$element.one( 'mouseleave', function () {
$at.removeClass( 'tve_anim_start' );
} );
}
if ( trigger === 'tve-viewport' ) {
$element.one( 'tve-viewport-leave', function () {
/**
* double check for viewport
* animation in animation triggers weird behaviors
*/
if ( ! TCB_Front.isInViewport( $element ) ) {
$at.removeClass( 'tve_anim_start' );
}
} );
}
} else {
setTimeout( function () {
$at.addClass( 'tve_anim_start' );
}, 50 );
}
return false;
};
var astra = {"break_point":"921","isRtl":"","is_scroll_to_id":"","is_scroll_to_top":"","is_header_footer_builder_active":""};
https://staging.cyberleadershipinstitute.com/wp-content/themes/astra/assets/js/minified/style.min.js
var php_data = {"ac_settings":{"tracking_actid":25575760,"site_tracking_default":1,"site_tracking":1},"user_email":""};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/activecampaign-subscription-forms/site_tracking.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/acf-dynamic-elements.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/audio.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/carousel-libs.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/carousel.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/contact-form-compat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/content-reveal.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/countdown.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/conditional-display.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/search-form.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/dropdown.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/divider.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/plupload/plupload.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/file-upload.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/avatar-picker.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/fill-counter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/number-counter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/image-gallery-libs.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/image-gallery.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/lead-generation.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/login.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/menu.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/number-counter-compat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/post-grid-compat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/pagination.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/post-list-filter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/pricing-table.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/progress-bar.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/social-share.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/table.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/tabs.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/timer.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/toc.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/toggle.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/twitter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/user-profile.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/video.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/google-api.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/facebook-api.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/modal.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/wp-user-avatar/assets/js/frontend.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/dist/dom-ready.min.js
var starter_templates_zip_preview = {"AstColorPaletteVarPrefix":"--ast-global-color-","AstEleColorPaletteVarPrefix":["ast-global-color-0","ast-global-color-1","ast-global-color-2","ast-global-color-3","ast-global-color-4","ast-global-color-5","ast-global-color-6","ast-global-color-7","ast-global-color-8"]};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/astra-sites/inc/lib/onboarding/assets/dist/template-preview/main.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/duracelltomi-google-tag-manager/dist/js/gtm4wp-contact-form-7-tracker.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/duracelltomi-google-tag-manager/dist/js/gtm4wp-form-move-tracker.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/duracelltomi-google-tag-manager/dist/js/gtm4wp-vimeo.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/thrive-dashboard/js/dist/frontend.min.js
var tcb_current_post_lists=JSON.parse('[]'); var tcb_post_lists=tcb_post_lists?[...tcb_post_lists,...tcb_current_post_lists]:tcb_current_post_lists;
/(trident|msie)/i.test(navigator.userAgent)&&document.getElementById&&window.addEventListener&&window.addEventListener("hashchange",function(){var t,e=location.hash.substring(1);/^[A-z0-9_-]+$/.test(e)&&(t=document.getElementById(e))&&(/^(?:a|select|input|button|textarea)$/i.test(t.tagName)||(t.tabIndex=-1),t.focus())},!1);