Are you prepared if there is a cyber-incident?
Cyber incidents are like wargaming exercises. Going
thru the components, process and the mechanisms of a mock cyber attack needs
a game plan. Cyber and IT security crises include a unique number of unknowns
of malware, vulnerabilities, cybercrime, hacking, and cyber attacks.
Prepared for a significant computer
breach
Most often security and IT employees typically are trained in dealing
with violations. Managers and employees in other departments are often
not always ready to respond. A security breach or big data loss most often
triggers an emergency for the entire organisation, business; a is not
limited to the IT or security teams. Therefore during the workshop we
will do a role play with different positions and profiles from multiple
departments so that they know their responsibilities and how to react
quickly and efficiently in such situations. Just like a fire drill exercise!
A cyber incident now happens faster and causes more damage than before.
A cyber incident now happens faster and causes more damage than before.The
primary purpose of this exercise is to prepare your organization for when
a significant computer breach hits them. The participants include both
executives and rank and file positions to prompt all employees in the
organization to make the right decision.
The primary components of a mock scenario
Often only security and IT staff are aware of the probability of cyber
crimes and are trained to react quickly and efficiently should one occur.
Other business departments of an organization get the information in the
canteen and are not usually as aware of what their roles in such a scenario.
The workshop is an exercise in crisis and risk management. It should include
managers for security, IT, finance, marketing and legal, as well as the
CEO. We create a mock scenario in which an attacker has successfully hacked
into the corporate network; The primary component is to develop a response
and recovery plan. New pieces of information are provided as the cyber
attack advances that include mock media reports and investigation results
in a story telling format.
The plans must be formulated quickly, with a limited amount of information
to make vital decisions
We can also customise the details of a mock attack in the organization
in cooperation with your IT ans Security Department. A typical scenario
being that unknown attackers have broken into the systems of a fictitious
company and posted on the company website profiles of 200,000 clients
and users. Media and competitors are on the spot. The participants must
figure out all the steps the company needs to take, post-intrusion, restore
normal operations, go thru a business communication and interruption plan
and how to avoid an attack in the future.
Other secondary issues and components in the exercise are to find out
the source of how the breach and information leak took place and correcting
the problem. Drafting a media message, contacting all stakeholders, including
employees and reassuring customers.
- How to ensure that the organisation takes the breach seriously and
review the legal aspects of business partners, manufacturers and banks
to avoid any legitimate followup.
- Training, readjusts budgets, inventory levels and the response to
the board of directors, who are also responsible that cyber security
issues are addressed.