Why Tabletop Exercises are Critical for Incident Response

Logo
Presented by

Michelle Drolet, Bob Skelley, Greg Neville, and Scott Tingley

About this talk

As the complexity and variety of threats continue to escalate, from cyber breaches to natural catastrophes, preparedness transcends having a plan on paper. It critically involves testing and confirming the efficacy of this plan under duress. This discussion offers a deep dive into why tabletop exercises are indispensable in fortifying organizations against unforeseeable crises. We will discuss: 1. The Anatomy of Effective Tabletop Exercises: A breakdown of the components that make an exercise both meaningful and actionable. 2. Bridging the Gap Between Theory and Practice: Insights into how simulations prime teams for real-life scenarios, enhancing their capacity to make swift, informed decisions under stress. 3. Designing Your Exercise: Strategies and considerations for customizing tabletop exercises to address your organization’s unique vulnerabilities and response capabilities. 4. Measurement and Feedback: Methods for assessing the impact of your exercises and incorporating feedback to strengthen your incident response plans. Join, Michelle Drolet, Founder, Towerwall, Bob Skelley, VP, Channel Sales & Strategy, Arctic Wolf & Greg Neville, Senior Cybersecurity Consultant, Towerwall and Scott Tingley, Sr. Director, Information Security, IntelyCare for a discussion you don't want to miss!
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (29)
Subscribers (1547)
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.