Playbook

Incident Response Playbook for ICS Phishing

Our ICS phishing (calendar phishing) incident response playbook helps teams handle malicious or unwanted calendar events on Google Workspace and Microsoft 365 – no matter what you're using for email security. 

Playbook

Incident Response Playbook for ICS Phishing

Our ICS phishing (calendar phishing) incident response playbook helps teams handle malicious or unwanted calendar events on Google Workspace and Microsoft 365 – no matter what you're using for email security. 

Download the playbook

ICS phishing protection for all

Attackers are exploiting malicious calendar events in record numbers. Most security tools leave users vulnerable, quarantining email while leaving calendars untouched. At Sublime, we're fighting back by:

  • Purging malicious events for Sublime customers.
  • Creating an open-source project and IR playbook for teams using Proofpoint, Mimecast, or Abnormal.

ICS phishing protection for all

Attackers are exploiting malicious calendar events in record numbers. Most security tools leave users vulnerable, quarantining email while leaving calendars untouched. At Sublime, we're fighting back by:

  • Purging malicious events for Sublime customers.
  • Creating an open-source project and IR playbook for teams using Proofpoint, Mimecast, or Abnormal.

Blog

Article

Incident Response Playbook for ICS Phishing

Report

Trusted by leading security teams
CompassSpotifyBentlerBrexelasticSnowflakeenergySentinelOnerampred canaryzscalercentricaGenetecSynkCriblAnduril

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern