Cyber Security Tabletop Exercise
In this blog, we cover the different cyber tabletop exercise
examples that you can start running within your organization to protect
yourself from the cyber threats and threat actors that are looming
Before we begin, however, let’s take a quick look at what Cyber Attack Tabletop Exercises really are, what are the exercise objectives and why they are so critical.
What is a Cyber Security Tabletop Exercise?
During Cyber Attack Tabletop Exercises, an organization typically hires an experienced external cybersecurity consultant who has years of expertise in handling, managing and mitigating the impact of cyber crises and data breaches.
This facilitator works with the relevant teams and stakeholders in your organization to create a cyber attack scenario which is most pertinent to your business and operational model. The scenario will typically focus on an attack on your crown jewels in order to elicit a genuine concern amongst the participants in the cyber attack tabletop exercise.
The facilitator will create an environment of panic. But the idea is not to scare anyone - it’s simply to force everyone to think how they would act and react when such a complex cybersecurity incident does occur.