Design a Tabletop Exercise to Support Your Security Operation


Test whether you are prepared for the next cyber attack.

If you're already a member, click here to log in.

Major Business Pain Points

  • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data.
  • Security incidents are inevitable, but how they are handled is critical.
  • The increasing use of sophisticated malware is making it difficult for organizations to identify the true intent behind the attack campaign.
  • The incident response is often handled in an ad hoc or ineffective manner.
Design a Tabletop Exercise to Support Your Security Operation-Pain Points

Recommendations

Key Points

  • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and share information mutually with other organizations to stay ahead of incoming threats.
  • Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
  • You might experience a negative return on your security control investment. As technology in the industry evolves, threat actors will adopt new tools, tactics, and procedures; a tabletop exercise will help ensure teams are leveraging your security investment properly and providing relevant situational awareness to stay on top of the rapidly evolving threat landscape.

Approach

Design a Tabletop Exercise to Support Your Security Operation-Recommendations

Establish and design a tabletop exercise capability to support and test the efficiency of the core prevention, detection, analysis, and response functions that consist of an organization's threat intelligence, security operations, vulnerability management, and incident response functions.

Methodology and Tools

Executive Brief

Read the concise Executive Brief to find out why you should design a tabletop exercise and review the methodology.

  • Design a Tabletop Exercise to Support Your Security Operation – Executive Brief
  • Design a Tabletop Exercise to Support Your Security Operation – Phases 1-5

1. Plan

Evaluate the need for a tabletop exercise.

  • Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

2. Design

Determine the topics, scope, objectives, and participant roles and responsibilities.

  • Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

3. Develop

Create briefings, guides, reports, and exercise injects.

  • Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop
  • Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

4. Conduct

Host the exercise in a conference or classroom setting.

  • Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

5. Evaluate

Plan to ensure measurement and continued improvement.

  • Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.