Practical Tabletop Exercises

Practical Tabletop Exercises

Last year, during the lockdown period, I published here a short series of articles on how I build and deliver threat models for my clients. (Didn't see it, try here: https://www.dhirubhai.net/pulse/threat-modeling-article-index-ken-van-wyk)

That series was pretty well received, in my view, so I decided now that most of us are coming out of our various degrees of lockdowns, I'd publish a similar series here on building and executing tabletop exercises.

I should underscore here the type of tabletops (commonly called TTXs) I'm talking about are operationally focused drills designed to measure some aspect of incident response planning and/or operations. They can be broad in scope or deeply technical. They can be designed to test executive decision making or they can put your technical staff to task (e.g., forensic data collection and analysis).

I've built and delivered hundreds of TTXs with my clients in various industry sectors including energy, healthcare, education, financial services, product manufacturing, and so forth. They've also spanned audiences from executive suite level down to incident response analyst level and pretty much everything in between. I have a lot of "war stories" to share and I hope you'll consider following along on this little journey.

But, I'm getting ahead of myself... I'll shoot for getting the articles out on a more-or-less weekly basis here. I'll start by posting a broad (and subject to change) outline, and I'll again post a full index to the complete series when I'm done.

If your company does or is considering doing TTXs, I welcome your input, either with or without attribution, as you prefer. If there's a specific TTX-related issue you'd like to see addressed or if you have unanswered questions, drop me an email and I'll do my best to address them.

Jim Appleman

Director, K3 Solutions, LLC

3 年

Thanks Ken

回复

要查看或添加评论,请登录

?? Kenneth van Wyk的更多文章

  • Twenty-One Years

    Twenty-One Years

    I don't do this often, but today I wanted to break the mold a bit. Happy 21st birthday to my own creation, KRvW…

    12 条评论
  • Practical Tabletops - Part 4

    Practical Tabletops - Part 4

    Technical Audience In the last article, I spotlighted issues for those preparing tabletop exercises (TTX) for…

  • Practical Tabletops - Part 3

    Practical Tabletops - Part 3

    Leadership Audience Now that you've decided for which audience you'll be running your tabletop, the next thing to…

    2 条评论
  • Practical Tabletops - Part 2

    Practical Tabletops - Part 2

    Audience Now that you've decided to build a tabletop exercise for your organization, and you've spent some time…

    1 条评论
  • Practical Tabletops

    Practical Tabletops

    Introduction Okay, it's been far too long since I opened this door, but here we go..

  • Threat Modeling -- Article index

    Threat Modeling -- Article index

    Index Threat Modeling -- Why Bother? Threat Modeling -- Start With The Basics Threat Modeling -- Describe The System…

  • Threat Modeling -- All Together Now

    Threat Modeling -- All Together Now

    If asked to evaluate the security well being of a software-driven system using only one methodology, it would be threat…

  • Threat Modeling -- Revisit Early and Often

    Threat Modeling -- Revisit Early and Often

    Revisiting our threat models is the final -- and most neglected of all -- step in our threat modeling process. In this…

  • Threat Modeling -- Now Fix It

    Threat Modeling -- Now Fix It

    If you've been following along in our process of threat modeling a system, for whatever system you are assessing, you…

    3 条评论
  • Threat Modeling -- Scoring Things

    Threat Modeling -- Scoring Things

    Okay, we're inching closer and closer to being finished. Before we turn the page entirely on the vulnerability analysis…

社区洞察

其他会员也浏览了