A professionally conducted technical cyber drill has numerous benefits and related outcomes for both the organisation and the tabletop participants.
Some of these include:
As the name suggests, a technical tabletop exercises tests and validates the effectiveness of your existing tools and technical controls. Most importantly, it helps your technical teams and analysts to respond effectively and efficiently to a cyber-attack. It bolsters overall IT incident management.
The most important element in an organisation's cybersecurity posture is the human element. The Cyber Attack Simulation exercise is one of the most accurate ways to improve the technical competencies of your Incident Responders and enhance technical team's cyber incident readiness.
A Technical Tabletop Exercise takes a close & hard look at your technology infrastructure. We deep dive into the existing technology and processes and dig for gaps and loopholes that most urgently need to be plugged. Essentially, it's almost like a Penetration Test minus the exorbitant costs.
Working with the client we create detailed Cyber Attack Workflows. The workflow is implemented along with a dynamic and evolving attack scenario which is made all the more realistic through injects over time. This keeps the technical staff motivated & makes the exercise a true test of your IT team's mettle.
The biggest benefit of a Technical Tabletop Exercise is that it leads to peace of mind and confidence in the technical team. The management of the organisation can rest easy knowing that the technical team has been trained and tested in responding effectively to a cyber-attack.
For businesses in specific countries & industries, it is mandatory to demonstrate the efficacy of technical controls in dealing with a cyber attack. A Technical Cyber Crisis Drill helps you achieve compliance with any such regulatory requirement applicable to your business.
Our Technical Cyber Security Drills are a great way to validate your organisation's technical capability to handle a cyber-attack. Our unique and detail-oriented approach to technical tabletop exercises means they come as close as possible to a Penetration Test without actually being one - that's also what makes them cost-effective.
Here is why our technical cyber drills are unique and effective:
Here are some specific features of the Technical Cyber Tabletop Drill conducted by Cyber Management Alliance that makes them stand out in the market:
Unlike a generic Cyber Tabletop Exercise, a Technical Tabletop Exercise requires deep analytical and technical skills during the planning stage as it is geared specifically towards a technical audience.
We spend a lot of time working on the technical attack scenario and related questions to ensure relevancy.
Our goal is to challenge the technical Incident Responders.
We leverage detailed Cyber Attack Workflows during the Technical Tabletop Workshop.
This makes the exercise intense and productive with a razor-sharp focus on the actual 'response'. We delve deep into what technical response they elicit at each stage.
This helps the team build insight and muscle memory for when the business is under an actual attack and damage needs to be controlled in real time.
Our Technical Cyber Attack Tabletop Exercises are facilitated by deeply experienced practitioners.
They have been deep in the trenches themselves through their work in technical & Incident Response teams across multiple organisations.
The attack scenario, the questions asked and the discussions facilitated could not be more real and thought provoking.
The planning stage of the scenario for the IT staff cyber readiness session is critical. It involves deep work between our expert facilitator and one or more representatives from the Client's side. During this stage, the cybersecurity expert explores and exhausts all possible attack scenarios on the critical assets of the organisation. The primary points of discussion at this stage are:
The discussions and deliberations in the planning stage are then converted into the actual technical scenario for the Cyber Attack Simulation Exercise.
Case Studies demonstrate how others have benefited from our Tabletop Exercises. We have numerous client case studies which demonstrate how these sessions have helped clients optimise their handling of cyber incidents. Click the button below to check out some of our Case Studies.
We take great care in producing the content for the technical cyber tabletop session. Each image, each technical detail is meticulously selected to ensure maximum relevancy and participation.
A cyber drill is lifeless without audience interaction. We design each question and facilitate each session with one aim in mind - enabling maximum audience interaction & keeping technical staff engaged.
You can have the best content but a lifeless delivery loses the audience very quickly. Consequently, an uninterested and bored team means the objectives and outcomes are unachievable.
We ensure lively and engaging delivery by ensuring:
The video on the right gives an insight into how we engage and interact, and help you get the best value out of your Tabletop Exercises.
"Both the technical and executive tabletop sessions conducted by Cyber Management Alliance Ltd met all our objectives. The attendees from both the sessions were impressed with the facilitation and the outcome-driven approach and left the participants more informed and aware of the response processes and procedures.”
IT Compliance Manager, Otsuka Pharmaceutical Europe Ltd.
You absolutely can and should conduct regular tabletop or cyber drill exercises. However, our existing clients tell us of significant increases in interactivity and audience engagement after they hired us as external tabletop facilitators. There are several benefits of hiring an unbiased, external expert who can offer a valuable outsider's experienced perspective.
The use of our interactive platform during a cyber drill ensures maximum participation. For example, if 12 people have joined a tabletop session, we can ensure that we have 12 responses to each question presented to the participants.
Additionally, as the responses are formally captured:
Yes. We do not show the names of the respondents during the actual tabletop session. The names are only revealed after the exercise is complete. We DO NOT list the names of the respondents against the answers in the final report.
It's not easy to provide a binary number to this question. A lot depends on the complications of the asset, complexity of the infrastructure and how 'spread' the asset is (in terms of geography etc.).
Typically, we need 3 - 6 hours (elapsed time) of planning.
Conducting a technical cyber drill is fairly easy.
Conducting a meaningful, interactive and engaging cyber tabletop exercise for technical staff, however, requires sufficient planning, attention to detail and professional facilitation.
Anyone can put up a PowerPoint or an animated slide. Very few can engage the various attendees from the IT and technical teams to ensure relevancy and maximum participation.
Nope. Although we are not going to penalise you for perfect memory and recall. That's an amazing skill to have.
However, what we are looking for is the recall of of critical processes, the awareness of IR protocols, the ability to create high level actions (in the absence of any) and more.
Hybrid sessions are a mix of onsite and virtual sessions where a group of people is physically present in one location and several others are connected via MS Teams or Zoom.
We DO NOT recommend hybrid sessions (where some are remote and some are onsite) as they severely degrade the overall video and audio performance.
All other variables being equal, we recommend a remote session as, anecdotally, a majority of incidents happen during unearthly hours and a remote or virtual cyber drill helps simulate a real life incident.
We DO NOT recommend hybrid sessions (where some are remote and some are onsite).
Our shortest technical cyber tabletop exercise has been for 90 minutes (The client was a very small organisation). Most technical sessions last between 2 -3 hours. We have had exceptionally long technical tabletop sessions too - a total of 2 full days!
We could write several pages but here are the 'absolute bare minimums' we look for from the Client side:
Want more information on what is a Virtual CISO, Virtual CISO Services & Virtual CISO hourly rates? Book a no-obligation discovery call with one of our consultants.
All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved. The information on this page and related pages and documents is Copyright of Cyber Management Alliance Ltd. The VCC or Virtual Cyber Consultant term, other terms, information, concepts, ideas, workflows, processes, procedures and other content that directly or indirectly supports the VCC Service are Copyright of Cyber Management Alliance Ltd. Copyright 2023