Knowing how to deal with the fallout from a major cyber incident is just as important as knowing how to prepare for one.
In cyber security terms, a ‘tabletop exercise’ is a simulated attack designed to drill relevant incident response teams for handling the real thing. Any kind of cyber threat can be rehearsed, from data loss to ransomware attack.
The exercise is typically led by incident response and cyber security experts, who take the teams through the phases of response as the incident unfolds. While the technical aspects of the response are critical, they shouldn’t be the sole focus. A well-facilitated exercise will force your teams to work together under pressure to consider how the business should respond from a multitude of viewpoints – from legal to operational, and from supply chain to reputational.
The teams and the facilitators then review what worked and what could be improved
Dare to ask, “What if…?”
A real incident can manifest itself in a matter of minutes, but the fallout may last for months, if not years. A thoughtful tabletop exercise will therefore be expertly designed to stress-test your organisational responses to every aspect of managing an incident. It will draw in stakeholders from across the organisation, not just security, operations and IT teams, demonstrating how the realities of dealing with a cyber incident requires support from across a business.
The exercises should address your organisation’s worst-case scenario, not day-to-day cyber security and data management issues. There is little point in running a tabletop exercise simply to assess, for example, how long it takes your IT help desk to deal with an email flagged to it as spam. Consider other elements, such as the importance and value of independence (for example, your SOC provider running a tabletop exercise would have its limitations), encouraging challenge, and – most importantly – ensuring that the context of the business is understood, as is the focus of the exercise.
Before designing an exercise for our clients, we encourage them to think the unthinkable:
What would be the worst thing that could happen if the organisation was taken offline, or suffered a catastrophic data breach?
Would it suffer damaging financial losses? Would it have to interrupt vital services to vulnerable clients and patients?
Could someone’s life conceivably be put at risk, as happened with the Police Service of Northern Ireland breach in 2023?
And who, beyond the obvious technical roles, will need to be involved?
Have the right people at the table
Go beyond your security teams to look at other roles and responsibilities.
A coordinated response to a real attack depends on people from across the organisation being ready to play their parts.
This does not necessarily mean that they all need to attend the same exercises – in fact, too large a group could derail things. Consider running several exercises for different teams but based on the same scenario and feeding their responses into each session. How will the finance team adapt if you’re unable to restore your finance system in time for the monthly payroll?
Incident response planning will not look the same for everyone, but knowing how and what to communicate will be a common theme:
- Managers in every team and department will need to know what they can share with their people.
- Legal may need to communicate with threat actors and/or regulators and should have specialist support to do so.
- HR will field anxious questions about whether sensitive information is in the hands of criminals.
- After a security breach, external-facing teams must be ready to have difficult conversations with suppliers and clients.
Training people to handle these interactions efficiently is just one way to improve your incident response preparedness.
Use an experienced facilitator
With organisations new to tabletop exercises, we often find some initial scepticism about the value of “another workplace role play.”
But that is precisely what a well-executed tabletop exercise is not. The classic role-playing exercise shows participants how they should handle a given situation. But in a tabletop exercise participants are given space to explore their own response in a controlled environment.
The facilitators will assess the strengths and weaknesses in the response, which means they should do more observation than instruction. So that they know when to step in, have a discussion with them during the planning stages about how mature your cyber security plans are and the skill levels of your team members. They should also be able to challenge any assumptions held by those attending and provide an environment that allows individuals to air concerns.
Using their real-world experience, external facilitators will also create realistic simulations for your teams to work with. These should be crafted to present a realistic scenario with clear implications for the organisation.
This heightens the experience for participants and gets them to meaningfully engage with how they’d approach recovering from an incident. An experienced facilitator can identify recommendations for improvement, which allows actionable improvements to be made to your incident response plan.
Apart from presenting no risk at all to your organisation, the other great thing about tabletop exercises is that (unlike a real cyber incident) they can be scheduled to fit your calendar.
If you’re interested in finding out more about what’s involved in tabletop exercises, the Cyber Risk team will be happy to help.
Cyber Risk
We bring the best of our collective experience, energy and creative power to fiercely safeguard our clients and fortify their communities.
Insights
Thomas Murray Partners with Socura to offer Managed Detection and Response to clients that need support to stop cyber threats 24/7.
The collaboration will see Thomas Murray offer Socura MDR to help its clients proactively identify and respond to threats.
Thomas Murray and Crimson7 Announce Strategic Partnership to Modernise Threat Informed Security
Thomas Murray and Crimson7 are partnering to combine their expertise and create innovative solutions for tackling key cyber security challenges.
Thomas Murray and askblue partner to support financial institutions in meeting the Digital Operational Resilience Act (DORA) requirements
Thomas Murray and askblue are collaborating to provide services that help financial institutions comply with DORA requirements.
Threat Intelligence for Law Firms: Protecting clients in the digital age
As a law firm, protecting your clients' data and reputation is more critical than ever in today’s digital-first world.