Navigating Cyber Crisis Drills: Best Practices Revealed By Dan Lohrmann and Bikash Barai.

 

Cybersecurity incidents have become increasingly prevalent in today's digital landscape, necessitating proactive measures to mitigate risks and ensure organizational resilience. One such crucial measure is the conduct of cyber crisis drills, which simulate real-world scenarios to test response capabilities and refine incident management strategies. In this discussion, we delve into the key components of designing a high-level structured framework for conducting cyber crisis drills tailored to enterprise needs.

 

 

Here is the verbatim discusiion:

How long should it be? What should be the structure? What are some best practices? What are some do's and don'ts? So building a kind of high level structured framework for conducting cyber crisis drill for enterprise, how would you approach that? Great question. Yeah. So I've been a part of many of those, both within government and now in the private sector, working with us, with infragard, with federal agencies, with us state agencies and others. So, first of all, obviously, there are different types of tabletops. I'm going to talk about one that really, for example, in Michigan, would be a whole of government approach, which really needs to involve the top executive.

 

Highlights:

Defining Objectives and Scope:

  • Determine the specific goals and objectives of the cyber crisis drill, considering the organization's unique risk landscape, regulatory requirements, and operational priorities.
  • Establish the scope of the exercise, including the systems, processes, and stakeholders to be involved, ensuring comprehensive coverage of potential threat scenarios.

Structuring the Drill:

  • Adopt a scenario-based approach, crafting realistic and evolving scenarios that reflect emerging cyber threats and industry trends.
  • Designate roles and responsibilities for participants, including executive leadership, IT security teams, legal counsel, and relevant stakeholders, to simulate a coordinated response effort.
  • Incorporate diverse simulation techniques, such as tabletop exercises, red team/blue team simulations, and technical drills, to assess different aspects of incident response and decision-making.

Execution and Evaluation:

  • Facilitate the drill under controlled conditions, providing clear instructions, timelines, and communication channels to all participants.
  • Encourage active participation and collaboration among team members, fostering a culture of transparency, accountability, and continuous improvement.
  • Capture and analyze key performance metrics and lessons learned throughout the exercise, identifying strengths, weaknesses, and areas for enhancement in the organization's cyber incident response capabilities.

Cyber crisis drills serve as invaluable tools for enterprises to enhance their preparedness and resilience against evolving cyber threats. By establishing clear objectives, structuring realistic scenarios, and fostering a culture of collaboration and continuous improvement, organizations can effectively leverage these exercises to strengthen their incident response capabilities and safeguard their digital assets. Embracing a proactive approach to cyber resilience is paramount in today's dynamic threat landscape, ensuring that enterprises can effectively detect, respond to, and recover from cyber incidents with speed and efficiency.

 
 

Speakers:

Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.


https://twitter.com/govcso

https://www.linkedin.com/in/danlohrmann/


Bikash Barai
is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)