Cybersecurity Tabletop Exercises
by Robert Lelewski, John Hollenberger
Cybersecurity
Book Details
Book Title
Cybersecurity Tabletop Exercises
Author
Robert Lelewski, John Hollenberger
Publisher
No Starch Press
Table of Contents
- Praise for Cybersecurity Tabletop Exercises
- Title Page
- Copyright
- Dedication
- About the Authors and Technical Reviewer
- Acknowledgments
- Introduction
- Part I: The Tabletop Exercise Process
- 1. Why Perform Tabletop Exercises?
- Reasons to Conduct a Tabletop Exercise
- Advantages of Tabletops over Other Security Exercises
- What Tabletop Exercises Can Test
- Summary
- Questions
- 2. Planning the Tabletop Exercise
- Securing Executive Sponsor Support
- Defining the Exercise’s Goals and Objectives
- Senior-Level vs. Operational-Level Exercises
- Determining Who Should Participate
- Logistical Considerations
- Notifying and Preparing Exercise Attendees
- Scenario Confidentiality
- Opposition from Invitees
- Outsourcing Tabletop Exercises
- Summary
- Questions
- 3. The Development Process: Where the Rubber Meets the Road
- Choosing a Topic
- Developing the Scenario
- Introducing Injects
- Designing the Exercise Storyboard
- Considering the Scenario Escalation Pace
- Crafting Your Ground Truth Document
- Creating the Presentation Deck
- Inviting Feedback
- Summary
- Questions
- 4. Facilitating a Successful Tabletop Exercise
- The Facilitator’s Role
- Tabletop Management Tasks
- Exercise Tools and Tactics
- Making the Most of the Exercise Space
- Communication Tips
- Summary
- Questions
- 5. Acting on What You’ve Learned: Evaluation and Next Steps
- Evaluation Requirements and Restrictions
- Choosing an Evaluator
- Evaluation Methods
- Reporting Conventions
- Follow-up Activities
- Summary
- Questions
- Part II: Example Scenarios
- 6. Engaging a Technical Audience
- A Widespread Phishing Campaign
- Ransomware Affecting File Servers (the Technical Version)
- A Malware Outbreak via a Zero-Day Vulnerability
- A Supply Chain Compromise
- 7. Engaging an Executive Audience
- Ransomware Affecting File Servers (the Senior-Level Version)
- A Dark Web Data Discovery
- A Distributed Denial-of-Service Attack
- 8. Engaging the Business
- A Physical Security Breach
- A Social Media Compromise
- An Insider Threat
- Appendix: Reporting Templates
- Index