logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Cybersecurity Tabletop Exercises From Planning to Execution 1st edition by Robert Lelewski, John Hollenberger ISBN ‎ 1718503822‎ 978-1718503823

  • SKU: BELL-200692194
Cybersecurity Tabletop Exercises From Planning to Execution 1st edition by Robert Lelewski, John Hollenberger ISBN ‎ 1718503822‎ 978-1718503823
$ 35.00 $ 45.00 (-22%)

4.7

106 reviews

Cybersecurity Tabletop Exercises From Planning to Execution 1st edition by Robert Lelewski, John Hollenberger ISBN ‎ 1718503822‎ 978-1718503823 instant download after payment.

Publisher: No Starch Press
File Extension: EPUB
File size: 3.89 MB
Author: Robert Lelewski
Language: English
Year: 2024

Product desciption

Cybersecurity Tabletop Exercises From Planning to Execution 1st edition by Robert Lelewski, John Hollenberger ISBN ‎ 1718503822‎ 978-1718503823 by Robert Lelewski instant download after payment.

Cybersecurity Tabletop Exercises From Planning to Execution 1st edition by Robert Lelewski, John Hollenberger  - Ebook PDF Instant Download/Delivery: ‎ 1718503822,‎ 978-1718503823
Full download Cybersecurity Tabletop Exercises From Planning to Execution 1st edition after payment

Cybersecurity Tabletop Exercises: From Planning to Execution
Product details:


ISBN 10: ‎ 1718503822
ISBN 13:‎ 978-1718503823
Author: Robert Lelewski, John Hollenberger 

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks.

The book is divided into two main parts. In Part I: The Tabletop Exercise Process, you’ll learn:

  • Why you should perform tabletop exercises and what their organizational benefits are
  • Effective planning and logistics tips, including how to gain executive sponsor support
  • How to develop realistic scenarios, injects, and storyboards
  • Facilitation techniques to ensure active participant engagement
  • Evaluation methods and follow-up activities


The example scenarios in Part II include:

  • Technical tabletops covering phishing campaigns, ransomware attacks, and zero-day vulnerabilities
  • Executive-level exercises that focus on high-impact incidents
  • Cross-functional cases such as physical security breaches, social media compromises, and insider threats


With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture.


Cybersecurity Tabletop Exercises From Planning to Execution 1st Table of contents:

Part I: The Tabletop Exercise Process

1. Why Perform Tabletop Exercises?

Reasons to Conduct a Tabletop Exercise

Improve Incident Response Team Collaboration

Clarify Team Roles and Responsibilities

Assess the Impact of Process Changes

Reduce the Cost of Data Breaches

Improve Security Awareness

Explore Key Questions

Prepare Senior Leadership for an Incident

Align with Industry Standards

Fulfill Contractual Requirements

Examine a Recent Cybersecurity Incident

Identify and Prioritize Risks

Advantages of Tabletops over Other Security Exercises

Low Cost and High Return on Investment

Efficiency

No Operational Disruption

What Tabletop Exercises Can Test

The Potential Impact of Current Threats

The Sufficiency of the Information Security Budget

Information Sharing Protocols for IoCs

Gaps in the Incident Response Plan

The Efficacy of Processes and Procedures

Compliance with Notification Requirements

Residual Risk After Corrective Actions

Summary

Questions

2. Planning the Tabletop Exercise

Securing Executive Sponsor Support

Choosing an Appropriate Executive Sponsor

Outlining the Executive Sponsor’s Responsibilities

Defining the Exercise’s Goals and Objectives

Rehearsing the Incident Response Plan

Understanding Organizational Incident Response Roles

Assessing Vendor Response

Evaluating Communication Processes

Senior-Level vs. Operational-Level Exercises

Determining Who Should Participate

External Vendors

Legal Support

The Development Team

Logistical Considerations

Hosting Remote vs. In-Person Exercises

Determining the Duration

Choosing a Date and Time

Securing a Facility

Setting the Tone

Notifying and Preparing Exercise Attendees

The Executive Checkpoint

The Initial Email Notification

Calendar Invitations

The Discussion Session

Informal Touchpoints

The Final Reminder

Scenario Confidentiality

Opposition from Invitees

Outsourcing Tabletop Exercises

Summary

Questions

3. The Development Process: Where the Rubber Meets the Road

Choosing a Topic

Consult Your Business Impact Analysis

Confer with the Executive Sponsor

Leverage Other Resources for Inspiration

Developing the Scenario

Characteristics of an Effective Scenario

Sources of Inspiration for Your Scenario

Introducing Injects

Simulate Time Constraints

Direct Focus

Balance Clarity and Conciseness

Designing the Exercise Storyboard

Considering the Scenario Escalation Pace

Crafting Your Ground Truth Document

Add Details and Expected Outcomes

Maintain Realism

Align with Objectives

Creating the Presentation Deck

Introductions

The Preamble

Injects and Exercise Discussions

The Debrief

Inviting Feedback

Summary

Questions

4. Facilitating a Successful Tabletop Exercise

The Facilitator’s Role

Tabletop Management Tasks

Assigning a Scribe

Adding a Co-facilitator

Inviting a Guest Presenter

Prewriting Questions

Exercise Tools and Tactics

A Writing Board

Polling Software

Remote Presentation Software

Multimedia Aids

Attendee Tasks and Breakout Groups

Recording Devices and Software

Making the Most of the Exercise Space

Maximize the Conference Room Layout

Work the Room to Boost Engagement

Communication Tips

Monitor Physiological Responses

Set Up Backchannels

Check in with Senior Attendees

Manage Conversation Hogs

Forge Interpersonal Connections

Consider the Question Structure

Pay Attention to Nonverbal Communication

Practice Cultural Awareness

Identify Sensitive Topics Beforehand

Summary

Questions

5. Acting on What You’ve Learned: Evaluation and Next Steps

Evaluation Requirements and Restrictions

Choosing an Evaluator

Evaluation Methods

Performing a Debrief

Sending a Survey

Reporting Conventions

Statement of Completion

Full Report

Follow-up Activities

Assess the Incident Response Plan

Catalog and Update Other Documentation and Processes

Conduct Follow-up Tabletop Exercises

Implement a Formal Tabletop Exercise Program

Communicate High-Level Exercise Findings

Identify and Analyze Trends

Summary

Questions

Part II: Example Scenarios

6. Engaging a Technical Audience

A Widespread Phishing Campaign

The Scenario

Possible Modifications

Ransomware Affecting File Servers (the Technical Version)

The Scenario

Possible Modifications

A Malware Outbreak via a Zero-Day Vulnerability

The Scenario

Possible Modifications

A Supply Chain Compromise

The Scenario

Possible Modifications

7. Engaging an Executive Audience

Ransomware Affecting File Servers (the Senior-Level Version)

The Scenario

Possible Modifications

A Dark Web Data Discovery

The Scenario

Possible Modifications

A Distributed Denial-of-Service Attack

The Scenario

Possible Modifications

8. Engaging the Business

A Physical Security Breach

The Scenario

Possible Modifications

A Social Media Compromise

The Scenario

Possible Modifications

An Insider Threat

The Scenario

Possible Modifications


People also search for Cybersecurity Tabletop Exercises From Planning to Execution 1st :

stochastics and dynamics editorial board

stochastic dynamics and control

dynamic and stochastic models

stochastic dynamic analysis

dynamic stochastic

Tags: Robert Lelewski, John Hollenberger, Cybersecurity Tabletop, From Planning

Related Products