Sign out

Session expired

Contact sales

Related services

image

Security Patching

Safeguard your mission-critical systems against cyber attacks.

image

Managed Security Services

Protect mission-critical systems, cloud, networks and endpoints.

image

Advisory Services

Get expert cybersecurity help when you need it.

Overview

Build cybersecurity readiness skills and confidence with scenario-based tabletop exercises.

Tabletop exercises are valuable for evaluating existing security defenses, testing new procedures and establishing a fundamental method for training your security personnel on evolving threats like ransomware and new defense tactics. Our team uses their real-word expertise to develop engaging, discussion-based tabletop exercises. Tailored, scenario-based engagements can improve your ability to detect and respond to cybersecurity incidents faster.

Features and benefits

Effective evaluation of personnel and skills

Effective evaluation of personnel and skills

In-depth post-exercise summary reports

In-depth post-exercise summary reports

Detailed recommendations for improvement

Detailed recommendations for improvement

Expert facilitators to host each session

Expert facilitators to host each session

Real-world scenario role-playing exercises

Real-world scenario role-playing exercises

Practitioner or executive exercises based on goals

Practitioner or executive exercises based on goals

Tailored to unique organizational needs

Tailored to unique organizational needs

No impact on network operations

No impact on network operations

Test your people, processes and technology with a cyber exercise to prepare before disaster strikes.

Evaluate actual versus perceived capabilities

Tabletop exercises enable participants to walk through the who, what, when, where and how of a situation in a safe environment before an actual emergency occurs. Tabletops can be used at any level (management through the individual contributor level) and test what participants actually know about processes and procedures and how they might react in a crisis. This type of exercise can also be good for reviewing documented procedures to see if they work and if there are any documentation gaps.

Determine where to invest security budgets

Tabletop exercises can help you identify gaps in personnel, technology and processes to determine where to best invest limited cybersecurity funds. For example, are staff adequately trained, or is it time to invest in classes on cloud security? Do you need to replace outdated hardware and software to reduce your risks? Could you benefit from expert cybersecurity consulting services to conduct pentests or gap assessments? Could 24/7 managed security services reduce your operating expenses?

Build muscle memory and reduce stress

Reducing stress in IT security comes from understanding threats and how you’re vulnerable. It also comes from understanding how your IT, systems operations and other teams will work together to deal with an incident. Cyber exercises can be used to discuss and or practice your cybersecurity processes and give you confidence in your plan. Reduce stress by working through the ‘what if’ and worst-case scenarios and identify any gaps in your plan to address before they become critical issues.

Meet industry regulatory requirements

Depending on your industry, you may have regulatory requirements that can be met through a cyber exercise. For example, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires training for all personnel that handle Protected Health Information (PHI). The requirements for data storage and protection fall directly on the cyber team(s). A cyber exercise can and should include these elements to meet the regulatory requirements.

Cybersecurity resources

Tabletop Exercises Solutions Brief

Tabletop Exercises Solutions Brief

Learn more about our cybersecurity exercises.

4 Cyber Incident Scenarios You Should Exercise

4 Cyber Incident Scenarios You Should Exercise

Test these scenarios to prepare for any cyber incident.

Hacker Secrets Revealed

Hacker Secrets Revealed

Assessments can help predict your adversaries' next move.

vulnerability scan

Vulnerability Assessment FAQs

Vulnerability assessments can help you discover and rank gaps in your cybersecurity.

Please wait...