A tabletop breach exercise will include leadership roles within the organization that would be involved in an actual cyber breach. The exercise will start with a common, realistic scenario and ultimately demonstrates what to expect when a real breach occurs.
The CEO of a large financial company receives an email directly to his corporate email address demanding that $20 million be deposited into a crypto currency account within 48 hours. If the CEO does not send the money, the cyber criminals will release private information from the network to the public. Since receiving the email, the organization’s databases have gone offline and their data has been discovered online. This data has been classified as personal identifying information (PII) and can cause the organization a lot of trouble. The security team has been trying to mitigate the incident for two hours now, this will be where the tabletop breach simulation starts and runs for the next four hours. Over the course of the four hours you will discover that you come across a lot of questions that will need to be addressed. It is important to determine at what point you alert your stakeholders and board members, when you should shut down the systems, and when to alert the public for a press release. This scenario and questions asked will help you learn and improve the process involved with a real cyber breach. You can expect to have a plan in place that assigns the proper roles and what decisions need to be made during the course of the breach incident.
During these unexpected times of crisis, it is imperative that organizations define roles. When money, data, and reputation are on the line there shouldn’t be any time wasted determining who is responsible for what, when they need to take action, and in which order. The more simulations acted out will help uncover more exposure and lead to improved reaction time and less damage. Now that your simulation is complete, it is important to discuss what went well and where improvements need to be made.
You also need to update your business continuity plan with the improvements needed to move forward. An organization’s response to a breach can be the difference between the success or failure of that company.
Our mission is to empower companies to successfully manage global cybersecurity risks, vulnerabilities, and compliance requirements.
RB Advisory LLC is a cybersecurity advisory firm with headquarters in Winter Park, Florida. Our business model is designed to help ALL companies, public and private, with IT security and compliance issues. The services we provide are custom designed for all companies, to secure platforms, networks, IoT, social, and cloud platforms in all industries.