ESTABLISH PROTOCOL & STRENGTHEN RESPONSE: MISSION ACCOMPLISHED READ MORE >

Partners

We collaborate with best in the business to ensure our customers receive the highest levels of care and support. These trusted relationships allow us to better serve and educate our customers.

Regional Partner of the Year Award

Partner of the Year Award

Why Inversion6

With an abundance of solutions and providers, the task of choosing the right option is critical and can sometimes be overwhelming.

industry validation

"Thanks to Inversion6, we now have an established protocol and response procedure whenever incidents are detected. Now, we are able to act immediately to prevent a security event from becoming a larger incident."

Read Full Story

Resources

Our experts are thought leaders in the cybersecurity space. From blogs to publications and webinars, check out these resources to learn more about what’s trending in our industry and how you can stay ahead.

It’s Time To Elevate Data-Centric Cybersecurity

By Christopher Prewitt

Read Article
Latest Inversion6 Press

CISO Craig Burland on Biden administration’s update to AI security goals

View Story
February 25, 2019
By: Inversion6

Here’s How to Run a Tabletop Exercise

Tabletop exercises can give you a strong action plan for your cybersecurity efforts. Learn how to run a tabletop exercise efficiently here.


Make Sure You Don’t Forget These Crucial Steps in Your Plan

If your organization is interested in improving their cybersecurity strategies, one of the best first steps is an incident response tabletop exercise. Before you can improve your strategy, you have to understand where your weaknesses are, and what you need to improve upon. An exercise like this sheds light on what’s not working within your current processes and gives you an actionable plan to improve upon.

How should you approach running a tabletop exercise? Let’s dig in.

You can run exercises for just about any cybersecurity risk, but an exercise isn’t going to be beneficial for your company if it’s one that you would never experience. The first thing you should do is identify your specific risks. If there are certain threats that you know you’re at risk for or situations that you’ve already encountered, these are the scenarios you’ll want to target.

When you think about these risks, you can’t consider options as something that “would never happen to you.” Instead, you need to be aware of the tools that you’re using, your network, and the threats that they pose to your organization in order to make sure that you’re running through the right scenarios.

The next thing you’ll want to do is ensure that when you go through the tabletop exercise, all the right people are in the room. With issues like these, it’s easy to assume that only IT and technology professionals need to be involved, but that’s actually not the case. While IT staff are going to be the people in the trenches working on resolving the issue, they’re not going to be the ones making the majority of the decisions.

Let’s say that a server needs to be shut off to restore an issue or install a patch — but shutting this server off will impact the network for your entire company. This choice is going to come from senior leadership, so you’ll want to make sure they’re involved in the exercise.

For other situations, like potential legal issues, notifications to insurance carriers, or communicating with your customers and clients, your senior leadership will be the ones calling the shots. For your tabletop exercise to be successful, you’ll want to make sure they’re on the same page with your IT and technology teams when a crisis occurs.

Once you’re ready to actually run through the exercise, having a facilitator can help ensure that the process goes smoothly, and you come out of it with a solid action plan. This facilitator might be an existing cybersecurity leader in your organization, or if you don’t have anyone in this role, a partner who can lead you in your cybersecurity efforts.

If you’re not sure where to start, a cybersecurity expert can help show you the way. Partners like Inversion6 can spot risks and threats better than anyone, and because they live and breathe cybersecurity, they’ll be able to provide you with the most efficient and effective action plans for your team.

In the event of a real crisis, they can even be available to provide support as you work through the recovery process. Interested in learning how you can jumpstart your cybersecurity processes? Get in touch with us today to learn more.
 

Post Written By: Inversion6
Inversion6 and our team of CISOs are experts in information security, storage, and networking solutions. We work alongside your team to implement technology solutions that are smart, flexible, and customized to fit your needs.

Related Blog Posts

Let's TALK

Our team of experts in information security, storage, and networking works alongside your team to implement technology solutions that are smart, flexible, and customized to fit your needs. Ready to learn how we can help strengthen your technology environment? Fill out the form below to get started.

TALK TO AN EXPERT