Why Demand for Tabletop Exercises Is Growing

Cybersecurity drills come in many forms, including penetration testing, phishing simulations, and live-fire exercises, with some scenarios costing hundreds of thousands of dollars and running over several days or even weeks.
The least complex of these drills are tabletop exercises, which typically run for two to four hours and can cost less than $50,000, with much of the expense related to planning and facilitating the event.
Unlike some other drills, tabletop exercises often don't involve attacks on live IT systems.
This common approach to tabletop exercises is old-school and low-tech, but proponents say a well-run scenario can show organizations if they have holes in their response and mitigation plans.
Tabletop Exercises Are in Demand Demand for tabletop exercises has grown exponentially in the past two years, driven by compliance issues, board directives, and cyber insurance mandates, says Mark Lance, vice president of incident response at GuidePoint Security, a cybersecurity consulting firm.
In some cases, employees ask for tabletop exercises to help educate executives.
Many cybersecurity organizations promote tabletop exercises as a way for organizations to test and improve their incident response plans and their internal and external communication plans following a cyberattack.
There are no cut-and-paste ways to run a tabletop exercise, though the US Cybersecurity and Infrastructure Security Agency provides packages to help organizations get started.
Some organizations run tabletops with internal teams, although the more common approach is to hire an outside cybersecurity vendor.
How Tabletop Exercises Work In a typical tabletop, the facilitator leads a discussion by asking a series of questions.
Tabletops can start with hundreds of different scenarios, including widespread problems like ransomware and phishing attacks.
Individual tabletops need to focus specifically on the organization or its industry to be successful, Lance says, adding that the success or failure of a tabletop depends largely on the provider's ability to plan the exercise and target it to the specific client.
Another way to ensure success is by running separate tabletop exercises for an organization's senior leadership and technical teams.
Learning Through Realistic Scenarios In addition to failing to provide a realistic scenario, facilitators of tabletop exercises also can falter by failing to keep a group engaged or by being more of an observer than a leader, says Curtis Fechner, cyber practice leader and engineering fellow at cybersecurity consulting and integration provider Optiv, stressing that participant engagement is the biggest factor in a tabletop's success.
If you've planned for a relevant scenario and kept the participants engaged, it's difficult to have a tabletop exercise fail, he says.
A well-facilitated discussion will result in participants learning about their organization's incident response plans and identifying areas that could be improved.
Most cybersecurity exercises contain a learning curve for everyone involved, says Peter Manev, co-founder and chief strategy officer of Stamus Networks, a network detection and response provider.
In December, Stamus Networks participated in a live-fire exercise called Crossed Swords, organized by the NATO Cooperative Cyber Defence Center of Excellence.
At the end of an exercise, Fechner likes to take a half hour to discuss the lessons learned throughout.
As they assess their exercise, participants should be focused on continuous improvement of cybersecurity practices, Fechner adds.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 08 Feb 2024 17:55:05 +0000


Cyber News related to Why Demand for Tabletop Exercises Is Growing

Why Demand for Tabletop Exercises Is Growing - Cybersecurity drills come in many forms, including penetration testing, phishing simulations, and live-fire exercises, with some scenarios costing hundreds of thousands of dollars and running over several days or even weeks. The least complex of ...
1 year ago Darkreading.com
How to Conduct Incident Response Tabletop Exercises - An incident response tabletop exercise is an activity that involves testing the processes outlined in an incident response plan. Attack simulations are run to ensure incident response team members know their roles and responsibilities - and whether ...
1 year ago Techtarget.com
Cybersecurity Curriculum Development Tips - In this article, we will explore essential tips for developing a comprehensive and up-to-date cybersecurity curriculum. By staying abreast of the latest industry trends, educational program developers can ensure that their curriculum remains relevant ...
1 year ago Securityzap.com
Deep dive into synthetic voice phishing defense - Voice phishing attacks are an escalating threat and this alarming statistic highlights a pervasive lack of awareness among the general population. At the moment, different techniques are being used by both big and small businesses to fight back ...
1 year ago Cybersecurity-insiders.com
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
1 year ago Darkreading.com
Riot Games Receives a 10 Million Dollar Ransom Demand - What Happened and How Can You Protect Your Organization? - Riot Games, the developer behind the popular video games League of Legends and Valorant, recently received a 10 million dollar ransom demand. This demand has the potential to cause chaos across the gaming world and can put any organization at risk if ...
2 years ago Heimdalsecurity.com
Recommendations that defenders can use from Talos' Year in Review Report - The Talos Year in Review is available now and contains a wealth of insights about how the threat landscape has shifted in 2023. With new ransomware strains emerging from leaked source code, commodity loaders adding more reconnaissance measures to ...
1 year ago Blog.talosintelligence.com
Mastering the Art of Cyber Resilience in Operational Technology - Our white paper underscores the significance of cybersecurity in OT environments, particularly in the context of digitalization and the convergence of IT/OT. It also emphasizes the need for a collaborative effort across both public and private ...
1 year ago Blog.checkpoint.com
Q&A: Lessons Learned From the Middle East's National Cyber Drills - Some 170 organizations were tested by Qatar's National Cyber Security Agency in its National Cyber Drill exercises last month. Such drills are an established part of cyber-resilience in the Middle East. Ethical hacker Suleyman Ozarslan, co-founder of ...
1 year ago Darkreading.com
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Pentest People Announces its Assured Service Provider status for NCSC's Cyber Incident Exercising Scheme - Pentest People, the Penetration Testing as a Service and cybersecurity experts, today announces it has become one of only a few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre Cyber ...
11 months ago Itsecurityguru.org
Protecting branch office environments from ransomware The Register - Sponsored Feature Ransomware gangs that steal and encrypt vital business data before extorting payment for its decryption and restoration are ramping up global attacks at an ever-increasing rate. Cyber security experts agree that ransomware now ...
11 months ago Go.theregister.com
Cybersecurity Career Pathways for Students - Whether aspiring to become a cybersecurity analyst, ethical hacker, or security engineer, this article serves as a valuable resource for students aiming to embark on a successful cybersecurity career. As an analyst, students will be responsible for ...
1 year ago Securityzap.com

Cyber Trends (last 7 days)