Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation

The use of a tabletop exercise is an excellent way to test the effectiveness of an organization’s overall security program, the investment of technology controls, and the...
  • guided implementation icon

Design a Tabletop Exercise to Support Your Security Operation – Executive Brief

Read our Executive Brief to understand why you should design a tabletop exercise to support your security operations to evaluate the effectiveness of your security...

Design a Tabletop Exercise to Support Your Security Operation – Phases 1-5

The use of a Tabletop Exercises is an excellent way to test the effectiveness of an organizations overall security program, the investment of technology controls, and the...

Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

Tabletop planning starts with the evaluation of needs to ensure proper execution.

Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

To properly design a tabletop exercise, organizations must review their existing threat landscape and incident history in order to identity topics, scope, objectives.

Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop

In order to ensure a seamless and well facilitated tabletop exercise, time needs to be dedicated to create briefings, guides, reports, and exercise injects.

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

Conduct a mock tabletop exercise.

Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...

Develop a Security Operations Strategy

Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network defense, and threat...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us