InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Using the Cyber Table Top (CTT) Process to Perform a Cyber Risk Assessment

Presented by

Katie Premore (Lockheed Martin)

About this talk

The Cyber Table Top (CTT) process was developed in 2014 to support DoD customers who were overwhelmed by the sheer number of findings produced by traditional cybersecurity scanning tools and checklist processes. These tools and processes identify a very large number of possible vulnerabilities for a system but didn’t provide context for which vulnerabilities might truly lead to potential mission failure. Since budgets are limited, customers need methods of focusing on the most critical vulnerabilities which present the highest risk to their systems. The CTT process is focused on producing actionable cyber vulnerability data in an approachable risk matrix format to enable teams to focus resources. CTTs bring together system developers and maintainers, system users, and expert red teams to execute a multi-day wargame that focuses on the security evaluation of threats that would deny, degrade, disrupt or destroy a system and prohibit users from accomplishing their core mission. By assessing the potential mission impact of vulnerabilities as well as their likelihood/difficulty it provides a way to understand the relative risks of various vulnerabilities and focus the remediation efforts. The CTT process has been used to support DoD system cyber security evaluations in various lifecycle stages from design through long-term maintenance. It has been used to identify and mitigate threats that later were witnessed “in the wild” and caused significant negative impacts to other systems. It has become so popular that an official DoD Guidebook and training course was developed in 2018.
WiCyS - Women in CyberSecurity

WiCyS - Women in CyberSecurity

52227 subscribers236 talks
WiCyS is part of the cybersecurity workforce solution.
Women in CyberSecurity (WiCyS) is a community where the recruitment, retention and advancement of women in cybersecurity doesn’t just happen—it's actively supported and celebrated. Join our channel to connect with industry leaders, gain valuable insights and elevate your career through our network of industry professionals and technical mentors dedicated to building a robust cybersecurity workforce.
Related topics