We will be having an upcoming tabletop scenario ("war games") for Cyber-Security.   Are there any specific scenarios any of you have used that you've found particularly useful?   Any ways you've structured or executed these scenarios to amplify the value?

3.3k views2 Comments
Sort By:
Oldest
Director of IT in Healthcare and Biotech7 months ago
Phishing Attack Response: Simulate a widespread phishing attack that targets employees across various departments. This exercise tests the team's ability to quickly identify, respond to, and communicate about the phishing threat, emphasizing the importance of user awareness and rapid reaction protocols. It could also be used from a lessons-learned approach and you could categorize which departments did better than others. 

Ransomware Containment: Create a scenario where critical systems are hit with ransomware, challenging the team to contain the breach and initiate recovery procedures. This drills the importance of backup systems, quick containment measures, and business continuity planning under pressure. 

Insider Threat Simulation: Pose a situation where an insider maliciously accesses and exfiltrates sensitive data. This scenario helps the team refine strategies for monitoring internal activities, managing access controls, and incident investigation techniques.
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CISO/CPO & Adjunct Law Professor in Finance (non-banking)7 months ago
CISA has a solid set of exercises and tools, for free, that should help with incident response maturity.

https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages

Ensure you customize the scenario to your organization; it will be more realistic and fulfill the exercise’s goal.

Take the exercise seriously and be brutally honest about the results. Don’t brush off issues saying” if it was real, we’d have done much better.” 

If necessary, exclude people from the exercise who will hamper an open and forthright evaluation. Also ensure you have the key people who will actually be handling the issue (as opposed to a designee to represent a department).

Content you might like

IT Manager in Construction5 days ago
Hello,
I had a look and it seems available for free can be easily find European and global market but there are a bunch of company with commercial reports for UK. I will search more.
2k views1 Comment

Human Factors (fears, mental health, physical spacing)85%

Technical / IT Factors (on-premise tools, pivoting back away from remote)14%

3.7k views3 Upvotes2 Comments
Head of Enterprise Architecture MERCK Group in Healthcare and Biotecha year ago
Strategy & Architecture
Read More Comments
39k views5 Upvotes34 Comments
CISO in IT Services7 days ago
look for Plaid I know I looked at them last year
925 views1 Comment

MBA / Master's Degree75%

CISSP / Comparable Certification24%

9.8k views1 Upvote21 Comments