It\u2019s Cybersecurity Awareness Month! In honor of the theme \u2014 Do Your Part. #BeCyberSmart \u2014 we\u2019re doing our part by educating IT teams and organizations on protecting themselves. Throughout October, the JumpCloud blog will focus on top cybersecurity issues, from IT admin best practices to CISO responsibilities. Tune back into the blog this month for new cybersecurity content or <\/em>check out our archive of existing security articles<\/em><\/a> for cybersecurity insights written specifically for the IT professional. <\/em><\/p>\n\n\n\n
Most cybersecurity experts encourage organizations to consider a cybersecurity incident an inevitability \u2014 not an if, <\/em>but a when. <\/em>And breach ramifications are often severe: the average cost of a data breach is $4.24 million<\/a>. <\/p>\n\n\n\n
Table-top exercises aim to test incident response plans (IRPs); hence, the IRP is an essential and unavoidable element of TTX. If you plan to conduct a TTX and you don\u2019t have an IRP, go back and develop an IRP first. <\/p>\n\n\n\n
While you shouldn\u2019t conduct TTX without an IRP, thought exercises around incidents and how your organization might respond can help you build out your IRP. Additionally, smaller-scope TTX models can help you test out sections of your IRP. In fact, doing so is a great way to get the ball rolling in terms of fleshing out your plan. TTX helps identify holes in your plan, areas to edit, unexpected logistical issues, and more. <\/p>\n\n\n\n
With a base plan in place, you can start testing. The main goal of TTX is to test your IRP\u2019s validity against a realistic threat. In addition, TTX should: <\/p>\n\n\n\n
Table-top exercises can vary in scope. The scope can be broken into three tiers, which can overlap. While a bit simplified, these tiers give a general idea of your TTX options: <\/p>\n\n\n\n
Because you can\u2019t pass or fail TTX, outcomes are subjective. Goals of the exercise should be lessons learned and valuable team practice. Consider using the following objectives for your first exercise:<\/p>\n\n\n\n
Most simulations start with a scenario brief outlining the initial indicator of compromise (IoC), scope of the exercise, and other pertinent information. Some scenarios include supporting props (like an image of a ransomware message on a computer screen), complicating factors (like the IT Director being out of office), and stressors (like time limits). These help mimic real-life scenarios in which teams must think on their feet.<\/p>\n\n\n\n
If constructing your own scenario feels daunting for your first exercise, there are pre-packaged scenarios available online for common incidents. Further, there are third-party TTX facilitators that can conduct the exercises for you; these are a good option for first-timers that don\u2019t have the bandwidth or expertise to build and conduct a scenario. Some third-party TTX providers even offer actors, staged news clips, simulated social media activity, and other aids. While these facilitate realisticness, they are not necessary; a simpler exercise can still generate valuable takeaways.<\/p>\n\n\n\n
If you\u2019re conducting your first TTX in-house, don\u2019t bite off more than you can chew. A simple scenario brief with key stakeholders in the room can be a highly effective first TTX. It will test your teams\u2019 readiness, help them practice working together to follow the IRP, and prepare them for more complex exercises down the road. <\/p>\n\n\n\n
Participants should have a guide that outlines the threat brief and any other pertinent information. For your first exercise, you might choose to include the IRP for their reference; however, employees should know where to find it on their own during a real incident. The guide can also contain guiding questions or prompts to keep participants on track.<\/p>\n\n\n\n
The facilitator should also have a guide that includes the brief, IRP, and any other relevant information. The facilitator might choose to use slides that outline steps, stages, prompts, audio\/visual aids, or other material to support the exercise.<\/p>\n\n\n\n
Different scenarios test different types of response. Because TTX tests your IRP, choose a threat that\u2019s outlined in the IRP. Additionally, choose a realistic threat to shore up your preparedness in a valuable area. Ransomware, malware, and DDoS attacks are common types of threats that make for worthwhile TTX scenarios.<\/p>\n\n\n\n
While you can\u2019t pass or fail a tabletop exercise, participants can leave feeling accomplished or defeated. To instill buy-in across the organization, your first exercise should feel accomplishable. Choose a scenario whose response is outlined in your IRP, and have your facilitator be willing to help or guide the team if they get sidetracked or stuck. <\/p>\n\n\n\n
Even a seemingly straightforward scenario can help identify holes in the IRP and iron out kinks, so this won\u2019t decrease the efficacy of the exercise. Further, TTX should be conducted regularly, so you can complicate scenarios over time to drill into weaker areas once your organization is used to the TTX process. The better prepared they are, the better they\u2019ll be able to work through more complex scenarios.<\/p>\n\n\n\n
The IRP should define response procedures, but first-timers might consider focusing on performance in the following areas to measure response efficacy. <\/p>\n\n\n\n
It\u2019s human nature to clam up under pressure. When stressed, people enter high-alert mode that increases focus \u2014 sometimes to the point of failing to notice new information<\/a> around them \u2014 and decreases fine motor skills, working memory, and decision making skills. Simulating pressure can help team members learn how to operate under pressure and instill muscle memory for response actions that can kick in during a real incident.<\/p>\n\n\n\n
Cybersecurity TTX should be conducted at least once a year \u2014 ideally, quarterly. To set expectations, establish TTX as a recurring exercise from the outset. This will help promote buy-in and encourage participants to approach it as something to learn from and improve on rather than a one-time event.<\/p>\n\n\n\n
TTX is critically important to an organization\u2019s cyber health; however, several common barriers prevent companies from carrying them out. Fortunately, once TTX becomes familiar to the organization, it\u2019ll be easier to make the session regular.<\/p>\n\n\n\n
While it may sound trivial, booking time can be a major barrier when working with leadership. Schedule well in advance, stress the meeting\u2019s importance, and treat it like an event: order coffee or lunch, book a room, send an agenda beforehand, and give the event a name that differentiates it from run-of-the-mill meetings (i.e., Q4 Cybersecurity Workshop). <\/p>\n\n\n\n
Also, note that not all TTX requires leadership\u2019s presence. Consider making your first TTX a small-scale exercise with fewer participants to get the process off the ground and establish it as a norm in your organization.<\/p>\n\n\n\n
Another barrier to getting TTX approved and recruiting participants is a lack of buy-in. CEOs won\u2019t want to book time on their calendar if they don\u2019t believe their presence is needed, and leaders may not approve a time-consuming exercise for their employees if they don\u2019t see how it will affect their bottom-line.<\/p>\n\n\n\n
But TTX is one of the most critical factors to a business\u2019 bottom line. Cyber incidents are arguably the most dangerous threat to businesses today. A lack of preparedness, therefore, can be a business\u2019s biggest liability.<\/p>\n\n\n\n
Communicate the utmost importance of TTX to the business\u2019s viability and assert the need for leadership\u2019s presence, where appropriate. <\/p>\n\n\n\n
Many of the TTX resources out there are oriented toward in-person exercises, and it may be hard to know how to conduct an exercise if your team is remote or hybrid-remote<\/a>. However, if remote and hybrid-remote environments are a reality for your organization, your team will need to know how to follow an IRP in that environment. <\/p>\n\n\n\n
The best complement to strong incident response is strong threat protection. As businesses rely more and more heavily on the cloud, they need to ensure their security follows suit. The perimeter security model<\/a> that was designed for on-premise environments is giving way to Zero Trust<\/a>, a modern alternative that caters to a cloud-based, remote-first world.\u00a0<\/p>\n\n\n\n
New technologies like cloud-based directories<\/a> are emerging to meet these needs. JumpCloud\u00ae<\/sup><\/a>, the first fully cloud-based directory service, addresses this new risk environment by securely connecting users to all their resources \u2014 cloud or on-prem \u2014 with a Zero Trust methodology. JumpCloud\u2019s CISO recently spoke with VMWare\u2019s Head of Cybersecurity Strategy in a webinar on cloud security risks and how to combat them with Zero Trust. Watch the full webinar here.<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"