Strengthening%20Cyber%20Resilience%20Best%20Practices%20for%20Crisis%20Drills%20and%20Tabletop%20Exercises.png?profile=RESIZE_710x

 

In the ever-evolving landscape of cybersecurity, enterprises face the constant threat of cyberattacks. To fortify their defenses and enhance their preparedness, organizations must conduct regular tabletop exercises for cyber crisis management. Drawing from extensive experience in both government and private sectors, we'll outline a structured framework for conducting these exercises effectively.

 

.  

 

Here is the verbatim discussion:

How long should it be? What should be the structure? What are some best practices? What are some do's and don'ts? So building a kind of high level structured framework for conducting cyber crisis drill for enterprise, how would you approach that? Great question. Yeah. Solve been a part of many of those, both within government and nowin the private sector, working with us, with infragard, with federal agencies, with us state agencies and others. So, first of all, obviously,  there are different types of tabletops. i'm going to talk about one that really, for example, in Michigan, would be a whole of government approach, which really needs to involve the top executive.That's very interesting, Dan. So, Dan, let's consider a scenario like this that suppose we have to do a tabletop exercise for an enterprise. Can you give a kind of playbook for conducting tabletop crisis,cyber crisis drill? So you can start with, like, who are the folks who should be in the room? How long should it be? What should be the structure? What are some best practices? What are some do's and don'ts? So building a kind of high level structured framework for conducting cyber crisis drill for enterprise, how would you approach that?

 

Highlights:

Key Participants: Engage stakeholders from various departments, including IT, security, legal, communications, and senior management. This ensures a holistic approach and fosters collaboration across different functions.

Duration and Structure: Tailor the exercise duration to the organization's needs and the complexity of the scenario. Typically, tabletop exercises range from a few hours to a full day. Structure the exercise with a clear agenda, including scenario introduction, discussion, and debriefing.

Best Practices:

  • Realistic Scenarios: Craft scenarios that mimic potential real-world cyber threats faced by the organization.
  • Active Participation: Encourage active engagement from participants through role-playing and scenario-based discussions.
  • Learning and Improvement: Emphasize the learning aspect of the exercise, focusing on identifying strengths, weaknesses, and areas for improvement in the incident response process.

Do's and Don'ts:

  • Do: Foster a supportive environment that encourages open communication and collaboration.
  • Don't: Overwhelm participants with overly complex scenarios or unrealistic expectations.
  • Do: Conduct a thorough debriefing session post-exercise to capture lessons learned and actionable insights.
  • Don't: Neglect to update response plans based on feedback and lessons learned from tabletop exercises.

 

Tabletop exercises are invaluable tools for enhancing an organization's cyber resilience. By bringing together key stakeholders, simulating realistic scenarios, and emphasizing learning and improvement, enterprises can strengthen their preparedness to effectively respond to cyber crises. Adopting a structured framework that incorporates best practices ensures that tabletop exercises yield actionable insights and contribute to ongoing efforts to mitigate cyber risks.

 
 
 

 

Speakers:

Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.


https://twitter.com/govcso

https://www.linkedin.com/in/danlohrmann/


Bikash Barai
is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

 
 
 
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform