1. Home
  2. |Insights
  3. |Conducting an Incident Response Tabletop Exercise

Conducting an Incident Response Tabletop Exercise

Webinar | 11.07.23, 1:00 PM EST - 2:00 PM EST

Address

On Demand

Watch the Webinar   Get the Publication 

Every day, organizations face a barrage of attacks from cybercriminals looking to gain access to IT systems to steal sensitive data or otherwise do harm. To ready themselves for this, organizations must prepare a robust incident response plan that can be quickly and effectively deployed to address cyber threats that arise.

Tabletop exercises are a powerful way to understand where you have weaknesses and how you can strengthen your response to incidents when they occur. By simulating real-world scenarios, tabletop exercises allow you to test your incident response plans in a controlled environment and develop “muscle memory” for your planned response, as well as identify any gaps in your existing plans.

In this dynamic session, a panel of ArmorText and Crowell advisors will share insights from the recently published guide, Cyber Resilience: Incident Response Tabletop Exercises 2023, and their hands-on experience conducting tabletop exercises for leading organizations. Topics will include:

  • Why tabletop exercises are important.
  • How to plan for reality, not a hypothetical.
  • Common challenges of tabletop exercises.
  • Recent real-world examples hacks and attacks.
  • Selecting participants for your tabletop exercise.
  • Navigating the modules in Cyber Resilience.
  • The missing step zero in IR plans: How to communicate securely.


Questions
- For questions, please contact Maggie Weschler

For more information, please visit these areas: Privacy and Cybersecurity, Incident Response

Speakers

Insights

Webinar | 06.11.24

Consilio Symposium 2024

Ian Schuler will be speaking on the panel, "An Evolving Playbook: Privilege Protection and Logging.” The discussion will explore strategies for identifying privileged materials, including analytic tools and TAR, and approaches to logging privileged materials, including categorical logs and other types.