1 / 6

How to prepare for a successful Cyber Table-top Exercise

How to prepare for a successful Cyber Table-top Exercise

emilahales
Télécharger la présentation

How to prepare for a successful Cyber Table-top Exercise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How to prepare for a successful Cyber Table-top Exercise Global SNI

  2. How to prepare for a successful Cyber Table-top Exercise • You can never be too prepared when it comes to cyber security and data privacy. For the health of your business, it is essential to continuously test your cyber incident reply plans with effective cyber table-top workshops. • In this blog, we tell you what preparation and initial homework you should do to ensure you get the most value of your cyber table-top workshop. • Apart from reading this blog, we recommend you go through the other literature created by Cyber Management Alliance on the subject of Cyber Table-top Exercises. It will stand you in good stead as you prepare to conduct this workshop in your own enterprise. Why? • Because we are specialists in cyber incident response and crisis management and are creators of the foremost Cyber Incident Planning & Response training certified by the UK-Government's NCSC. The advice in our blogs is from the years of experience in training, conducting crisis management workshops, providing consultancy and mastery in cyber incident management.

  3. Here’s some more full reading into how to get the best bang for your buck when you invest in conducting a cyber table-top exercise for your business: • 6 reasons why your cyber table-top exercise may fail. • 5 requirements of an effective cyber table-top workshop. • Why you shouldn’t run your own cyber table-top exercise • Why it may be more active to run your cyber table-top exercise remotely.

  4. Participation – As the organizer, you should first identify who the key stakeholders in your group are for decision-making and response during a cyber crisis. It is imperative that you select the right audience to participate in the cyber table-top exercise. The selection should include executives across functions and silos. You should also prepare them in advance about what to expect during the exercise and how they must respond and react for the table-top exercise to be a success. • Scenarios – You must start out by defining the scenario that is most likely to materially impact your business. Run-of-the-mill scenarios will yield underwhelming results. Keep your focus on things that truly matter to the business and communicate the same to your facilitator.

  5. Facilitator – Speaking of facilitator, making sure you choose the right person to conduct the cyber table-top exercise makes all the difference. We recommend getting an external practitioner with years of experience on board. It has to be someone whose opinion and feedback will be valued by all and not be perceived as shrouded in bias or departmental agendas.  • Documentation – Make sure you appoint someone to document (or record) the entire exercise for later reference. It is easy to forget the vital points that emerge out of this adrenaline-filled workshop once it’s over. Be prepared with the right person and the right tools for recording all of it in advance.

  6. Thank youhttps://www.globalsni.com/

More Related