Service Overview
As cyber-attacks make the news headlines regularly, the need for a practical and relevant incident management plan is crucial, and an organization’s ability to respond appropriately to such incidents is a major factor in determining its resilience and continuity. While technical teams are crucial in analyzing the events and supporting the decision-making process, the extent of the impact caused by a breach on a business depends on how quickly and effectively the organization responds to protect various aspects of the organization’s business continuity, including how it handles interactions with customers, regulators, law enforcement, suppliers, media, and other stakeholders.
Target Audience | Decision-makers in the company, including (but not limited to) CEO, COO, CFO, CIO, CTO, as well as representatives from Legal, HR, risk managers, public relations, marketing, etc.
Methodology
The session simulates relevant cyber incidents in a structured tabletop format.
The scenarios typically involve handling ransomware attacks within the organization or managing a breach of sensitive information.
The objective is to determine how executive stakeholders interact and respond to a cyber incident, validate existing procedures, and observe & describe the processes used to detect, respond, and recover from simulated events.
Deliverables
A detailed report assessing the organization's cyber incident response process and procedures. The report highlights what worked well and what requires improvement (lessons learned).
Prerequisites
None.
Customer Engagement
One hour-long preparation meeting with a representative from the security team.
All workshop participants should be available for the full four-hour session.
Relevant Standards
NIST Cybersecurity Framework
Security Domains Covered
Cross-organization policies, procedures, and governance
Security operations, monitoring, and incident response
