An incident response tabletop exercise is a discussion-based practice that uses a hypothetical situation to coach a technical or executive audience through the cybersecurity incident response life ...
Zeus Kerravala is the founder of and principal analyst at ZK Research. Follow him on Twitter @zkerravala. Partnering with an outside organization on these exercises can offer additional benefits.
The tabletop is ready to grow up. Whether your program is ready to grow with it depends less on the technology than on your organization’s willingness to test its processes against something that ...
With all the focus on artificial intelligence lately, this article provides a deep dive into incident response preparation and the importance of developing actual intelligence (of actual humans!).
It's Monday morning, 8 a.m. You walk into the office and, on your computer screen, you witness something you've only ever experienced in your nightmares. "Boom! Your organization is hit with a ...
SAN FRANCISCO, March 23, 2026 /PRNewswire/ -- Cytactic today announced the launch of its in-platform Simulation Engine, introducing a new model for how organizations rehearse and validate cyber ...
In today’s digital age, securing sensitive healthcare data is paramount. With the rise in cyber threats targeting healthcare organizations, the Department of Health and Human Services (HHS) has taken ...
While more organizations have breach response plans in place, many are not testing these plans - or are doing a subpar job of conducting tabletop exercises, security experts say (see: Breach Response: ...
Bill Edwards is a retired Army Colonel, Iraq War veteran and President of Federal and Public Safety at Building Intelligence Inc. Security and safety program development is a process that begins with ...
The Cybersecurity and Infrastructure Security Agency said that last week's inaugural tabletop with the private sector, coordinated by the Joint Cyber Defense Collaborative at the Microsoft facility in ...
In the first installment of our cybersecurity series, we discussed the importance of developing and implementing practical Information Security policies and procedures within your organization as well ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results