The COVID-19 crisis has demanded flexibility and rapid adjustments to the operation of IT infrastructures to ensure that business can continue. However, it would be too short-sighted to regard this as BCM preparation or as a validation of existing BCM processes. If, despite everything, you have survived this situation in good shape and are now heading out of the “lockdown”, then it is certain that you have done lots of things right! All the same, in this article you will learn that you should be preparing for another business-critical situation in a structured way, and how to approach it.
What we have observed is that only very few attackers have shown any consideration at all for the COVID-19 crisis and have exercised restraint. In fact, it's quite the opposite. Many attackers explicitly used this opportunity and the uncertainty associated with it to launch targeted attacks on companies and their staff (e.g. social engineering). As a result, companies had to (urgently) rethink their established processes, check them during ongoing operations and adapt them as necessary. As it turned out, this not only led to unfamiliar operating procedures but also created more opportunities for attackers. That is why we recommend that you also check how resilient the processes that were introduced at short notice are. A good way to do this is via a table-top exercise (TTX).
TTX are activities that prepare for disasters. They involve playing through hypothetical but realistic situations of catastrophic events and include an assessment of the participants' readiness to respond and their ability to cooperate.
During a table-top exercise, the TTX simulator team – in our case experts in cyber security and cyber defence – guides the exercise participants through the process of handling a simulated disaster scenario, for instance, a targeted ransomware attack. In this process, the measures that the team would take in a particular emergency are reviewed and discussed with the participant. It is preferable to test the emergency plan in an informal, stress-free environment. The TTX simulator team provides a realistic scenario and the schedule. The participants bring along company-specific solutions for problems and react accordingly as soon as events occur, and make changes in the course of the exercise. The TTX simulator team particularly monitors and assesses the reaction of sudden changes – because unexpected challenges are the most difficult thing to overcome in a crisis. The results and findings are then summarised in a report and appropriate recommendations are made.
Below we have compiled some of our tried and tested points for designing a table-top exercise which we hope will act as a helpful checklist for you.
The more realistic the scenario is, the greater the opportunities are for learning and improvement. TTX and the simulated incidents are appropriate for all companies. In the case of simulated cyber attacks, they are of course specifically targeted at staff in the incident response department.
The purpose of the exercises is to assess the reaction readiness of the TTX participants and to train them in dealing, for example, with cyber incidents. A table-top exercise helps with:
Depending on their set-up, participants are encouraged to discuss issues in-depth and make informed decisions about problems. This way the exercise stands in contrast to the rapid, spontaneous decision-making that takes place under real or simulated emergency conditions. A TTX's success depends on the active involvement of the participants and their appreciation of the TTX simulator team's recommendations with regard to their existing policies, procedures and plans.
For each TTX, the participants' feedback is used to improve the next iteration of the system, so that for each subsequent exercise an even better and more realistic prototype is utilised. The assessment and discussion that follows shows potential or even essential improvements to the existing response plans and the corresponding readiness to respond. Following on from the table-top exercise, it is advisable to schedule a workshop on disaster resilience and preparedness, so that the results can be discussed and improvements to the existing crisis management documentation can be introduced. To achieve this, a specific plan for short-term measures is drawn up so that the experiences and lessons that have been learned can be put into practice. Simple, practical suggestions for improvement assist with implementation of the measures.
It is important to involve not just the IT department, but also representatives of other organisational units in the table-top exercise. Depending on the scope and scenario selected, these could be teams from support / help desk, marketing & communication, legal & compliance etc. To validate success, you can track the time from the start of the incident, detection, response, internal and external communication, and resolution. The aim is for each successive table-top exercise to be more effective than the previous one.
To ensure that the scenario that has been used also fits the specific situation, the TTX simulation team creates a threat model for the relevant products and services. Developing this threat model means that we can identify vulnerabilities and work together with the appropriate authorities to ensure that corrections are given priority. Finally, realistic TTX events can be deduced from the threat model, for example:
As we have seen over the past months and years, unfortunately, it does not stop at exercises. Cyber incidents are also being made on Swiss companies – and are happening more and more rapidly, so part of your overall security plan has to include just ways to prevent these incidents but also reaction plans (including training).
It is claimed that Ben Franklin said: “If you fail to plan, you are planning to fail!” The way you react to an incident is just as important as the effort you make to avoid an incident. Cyber response plans that have been practiced in table-top exercises will help you to be better prepared and can increase your response and recovery capabilities should you ever fall victim to an attack by hackers.
As you have probably already realised, you need professional support in carrying out an effective table-top exercise. Our cyber security and cyber defence experts are your ideal partner! Their many years of experience with cyber incidents and TTX, as well as comprehensive, cross-divisional expertise, have already helped a great many companies to prepare for these incidents. And believe us when we say that after the exercise, everyone without exception is happy to have completed a TTX.
What about you? If you would like to complete a TTX now, please contact us. We will be happy to play through different scenarios with you!