It's necessary to test your company's incident response capabilities. Otherwise, responding to an adversary is like facing off against a football team without practicing before the season. Level 1: Awareness Tabletops 1a: Incident Trends 1b: Recent Incidents Level 2: Tactical Tabletops 2a: Scenario Questions 2b: Scenario Injects
The conversations are what is important. Operational functions throughout your organization exercise their role and experience the importance of working together during incident response.
This is a good place to start if your organization has not conducted a tabletop exercise or if your senior executives have not participated.
• Nine scenarios
• 90 minute session
• 4 options for each scenario
• Similar to “choose your own adventure”
• Select the best path forward
Target Audiences:
- CEO, COO and CIO
- Business unit leaders
- Information Security Manager
- Members of IT and security teams
- Privacy Management
- Fraud Prevention
- Third Party Risk Management
- Crisis Management Team
• Nine scenarios
• 90 minute session
• 4 options for each scenario
• Similar to “choose your own adventure”
• Select the best path forward
Target Audiences:
- CEO, COO and CIO
- Business unit leaders
- Information Security Manager
- Members of IT and security teams
- Privacy Management
- Fraud Prevention
- Third Party Risk Management
- Crisis Management Team
Scenarios are presented followed by updates on how the adversary is adapting. Participants need to develop their own responses.
• 90 minute session
• Participants develop their own responses
• Similar to a real-world cybersecurity incident
• Leverage the Incident Response Plan and work together
Target Audiences:
- CEO, COO and CIO
- Business unit leaders
- Information Security Manager
- Members of IT and security teams
- Privacy Management
- Fraud Prevention
- Third Party Risk Management
- Crisis Management Team
• 4 hour session
• Participants develop their own responses
• Similar to a real-world cybersecurity incident
• Leverage the Incident Response Plan and work together
Target Audiences:
- CEO, COO and CIO
- Business unit leaders
- Information Security Manager
- Members of IT and security teams
- Privacy Management
- Fraud Prevention
- Third Party Risk Management
- Crisis Management Team