Getting Started With Tabletop Exercises

Getting Started With Tabletop Exercises

Tabletop exercises or simulations can be daunting and scary. Join me as I sit down with Sarah O'Kelley from Choice Cyber Solutions as we discuss some tips and tricks to success with your first Tabletop.

Tabletop exercises or simulations can be daunting and scary. Join me as I sit down with Sarah O'Kelley from Choice Cyber Solutions as we discuss some tips and tricks to success with your first Tabletop.

[00:00:00] Welcome to MSP 1337. I'm your host Chris Johnson, a show dedicated to cybersecurity challenges,

[00:00:14] solutions, a journey together, not alone.

[00:00:20] Welcome everybody to another episode of MSP 1337. This week we are running a little behind

[00:00:27] schedule. It is Wednesday on a normally released Tuesday schedule, but I have been fortunate

[00:00:33] enough to find some time on Sarah O'Kelly's calendar.

[00:00:38] Hey Chris, good to see you again.

[00:00:41] So it's been a little while. You always bring great content to the show and you know

[00:00:46] recently we were at CCF and you facilitated and helped a bunch of solution providers navigate

[00:00:55] the tabletop exercise and in reviewing some of the stuff that we got from feedback from

[00:01:03] that event and talking to some of the solution providers over at MSP Ignite. In fact they've

[00:01:09] asked that I put together sort of the same slide deck for a town hall to just talk through

[00:01:17] some of the key components of a tabletop exercise and really we don't even have a plan to do

[00:01:23] a simulation of any kind. We're just going to talk about definitions and why roles and

[00:01:28] responsibilities are so important in that planning and putting together tabletop exercise.

[00:01:34] But before we get into some of those pieces, Sarah I thought it would be a good idea actually

[00:01:39] per year's suggestion to talk about what how do we get to that tabletop exercise? What

[00:01:47] are the things that we need to think about and I think to some extent overcoming the objections

[00:01:51] around, well we don't need to do one of those. We're fine. And I think even remembering that it

[00:01:57] doesn't have to be a cybersecurity incident scenario. It could be you know fire drills or

[00:02:06] first-person shooter hurricanes floods all kinds of stuff can fall into this and really understanding

[00:02:12] things like the responsibility matrix and some of those things. So talk me through a little bit

[00:02:17] how you approach risk like more from the beginning. What gets you started on this conversation that

[00:02:23] you would have with a client or even internally at choice cyber? So many people approach incident

[00:02:32] response because they have to. So you know depending on what compliance framework that I have a

[00:02:38] client working with like in this day 171 or CMMC client there is specifically a control that says

[00:02:44] that the incident response plan must be tested on an annual basis. So so that's the driving factor

[00:02:51] for some clients but really I think it loses sight of incident response and business continuity or

[00:02:58] disaster recovery which are some of those other items that you mentioned. These are really tools to

[00:03:06] help the businesses resilience in times of turmoil. You know the same as you would have like a backup

[00:03:13] server for your for your confidential data to live on just in case something happens. A tabletop

[00:03:20] exercises a way to kind of test to drive the company's response to an incident or a disaster

[00:03:29] and kind of test out not necessarily whether you do all of the steps correctly but do you understand

[00:03:38] the order of operations? What is your internal communication during those times look like? Who are

[00:03:45] the decision makers that need to be at the table? Who's the backup if that decision maker is not

[00:03:51] at the table? The goal of it is to make sure that if and when an incident or disaster happens that

[00:04:00] the team can actually effectively navigate that with as little additional stress as possible.

[00:04:07] Because we know that they're by nature stressful it's either your company is in jeopardy,

[00:04:12] your well-being is in jeopardy people lose their brain when those things happen and the way that we

[00:04:20] future-proof is to practice you know the process frequently enough that it becomes a little bit of

[00:04:28] second nature to us. So with that in mind does that get into things like so we obviously the one

[00:04:35] if those are you listening were at CCF we did one that was talking about ransomware and we were

[00:04:40] talking about some of the responsibility the responsibility matrix a little bit like it was it was

[00:04:45] about a ransomware incident that targeted an RMM vendor and it was an actual scenario that took

[00:04:53] place that was out of Sissa but like along those lines we're talking about at this level from an

[00:04:59] internal perspective who are the people that need to be at the table so for the exercise like you

[00:05:05] know fill in the blank CEO or whoever it might be. But then I think to your point like if the CEO

[00:05:12] isn't present who's next? I mean even going so far as like thinking about how our governments run

[00:05:18] here in the US were thinking about things like if the president's gone then the vice president

[00:05:23] takes over. The vice president's over so on and so forth until you've moved all the way down to

[00:05:28] like the housing secretary and there's a continuous pattern and for anybody that's ever watched

[00:05:34] designated survivor knows that there's a plan of action to put those different people into scenarios

[00:05:43] where they aren't at the same place at the same time so that they can say well yep the whole

[00:05:49] leadership team's gone right. So creating an incident response plan which is separate from a policy

[00:05:57] so I want to make sure that like folks who are listening understand that your IR plan is essentially

[00:06:03] your runbook it's the order of operations. Your policy kind of dictates what should be happening

[00:06:09] but your IR plan should have a primary and secondary for every step of it. I also highly recommend

[00:06:15] people including in their incident response plan who is your contact or your cybersecurity insurance

[00:06:21] company? Who is your legal contact? Who is your PR or your marketing person? Because those are all

[00:06:26] people that we might not think of being IT focused as required for an incident response but the reality

[00:06:34] is that quite frequently you know those people have a lot of weight that they need to add in terms

[00:06:40] of like bigger picture not just the incident but how is the company presenting it? What is the legal

[00:06:47] obligation of the organization? Who keeps an eye on the client's contacts? For you know like okay we

[00:06:55] had something that we reasonably suspect to have been a breach in the data of one of our clients.

[00:07:01] What is our contractual obligation to notify that person? Sure. So these are all people that need

[00:07:06] to be informed or have representation in an incident response tabletop exercise because they will

[00:07:14] have that impact when an incident actually occurs. Let me ask you a question you made me think about

[00:07:20] you mentioned like you know notifying insurance or PR or some of those things it makes me think

[00:07:25] about like if I was looking at my insurance policy for cybersecurity as an easy one I shouldn't say

[00:07:32] easy but I was looking at that policy you know what are the terms of engagement that I have that I

[00:07:38] may not be aware of you know things like if we have determined in fact that we have an incident

[00:07:44] on our hands. What are the steps that come next? Does everybody understand what those steps are

[00:07:50] because as soon as you engage insurance or as soon as you invoke attorney client privilege

[00:07:57] now now a lot of things have changed and a lot of risk has now been potentially added to the

[00:08:02] equation around your company and the survivability of this event that's taking place. Right yeah there's

[00:08:10] a legal obligation that happens when you declare an incident. Right so one of the ways that I suggest

[00:08:19] that clients or MSPs who are holding in cybersecurity insurance proceed with this is to specifically

[00:08:25] ask their legal counsel and specifically ask the cybersecurity insurance company. Do they have a

[00:08:32] runbook that is their suggested process? From the legal standpoint asking your cyber or excuse me your

[00:08:42] legal contact what order they suggest do they want you to call them first and then the

[00:08:48] cybersecurity insurance company. Sure. But understanding what the impact of that's going to be so

[00:08:54] that you can then determine at what point in the chain does that decision happen? Right and

[00:09:01] in exactly who gets notified in what order. Again part of your incident response plan but we

[00:09:07] generally don't think of that and frankly if most companies had an incident tomorrow there would be

[00:09:14] a lot of scrambling to figure out who's supposed to get notified first. Well it makes me think like

[00:09:20] one could do or lack of a better word a tabletop exercise that just says how do we communicate?

[00:09:27] An incident has occurred so the we're going to go through this scenario the scenario is really

[00:09:31] advanced it's very sophisticated there's been an incident and leave it at that like we're agreeing

[00:09:38] that an incident is significant we're agreeing that an incident requires getting out the playbook

[00:09:44] and it requires us to go through the steps in there that say hey step one step two step three

[00:09:51] from where I'm sitting it sounds like that's something that all organizations should be doing

[00:09:56] potentially more frequently than once a year because you're fluid within an organization you know

[00:10:02] vendor A and vendor B may not be the same anymore. You may have changed insurance providers since

[00:10:07] you know 45 days ago for whatever reason or you've added a new policy that you know helps you know

[00:10:13] layer on top of your existing insurance maybe just added a PR reputation rider or something along those

[00:10:20] lines so it sounds like one could really boil down a tabletop exercise to I don't want to call

[00:10:27] it trivial but like to just say hey we're going to have a tabletop exercise that just looks at the

[00:10:32] communication plan because an incident has happened regardless of what kind it is. You'll test out

[00:10:40] ideally if you're running the tabletop exercise correctly or if you're whoever you're having come

[00:10:47] in and run it correctly you'll be testing that conversation process out because when you're doing

[00:10:56] a tabletop exercise as the facilitator part of your job is to ask questions. Sure. So one of my

[00:11:02] favorites is like okay you know there's an incident how are you alerting people and I'll have

[00:11:09] clients that will say like oh well you know we use Microsoft Teams I'm like okay Microsoft's totally

[00:11:13] down. Sure. You know what we call each other okay do you have a phone list? Yeah we use Microsoft

[00:11:20] Teams. You know so it's sometimes it's literally kind of coming in like how are you communicating

[00:11:26] in this that you have a backup option. You know do you have a second way of reaching people?

[00:11:34] Do you have a printed copy of your incident response runbook in your office because if Microsoft

[00:11:41] is down or if your if your file server is down and that's where you stored your one copy

[00:11:47] of your incident response plan everything's dead in the water at that point so some of it is the

[00:11:53] art of asking the what if. Sure and the what if being a realistic what if because we've all seen

[00:12:00] you know scenarios from Microsoft or Google or somebody's down and that's where we store things

[00:12:04] you know it makes me think about um you know the questions that often get asked if I was client

[00:12:09] facing and they're like so do you use this fill in the blank vendor or service and I think this

[00:12:14] is an interesting scenario where you know a defendable answer would be like we don't use that particular

[00:12:20] vendor because in the event that you were to go down from vendor a b or c we're using a different

[00:12:27] product or service now this obviously doesn't apply to every product or service but it's an example

[00:12:32] of like hey um we're using fill in the blank service provider for phones or fill in the blank

[00:12:37] or maybe we have our region set differently than the majority of our demographic for our end user

[00:12:43] clients because that way if they are impacted we're the core for all of their activities

[00:12:49] and now we're still able to you know handle that communication plan or facilitate some things

[00:12:55] that they may not was it gets into a lot of opportunity conversation around well hey you know what

[00:13:00] you're right redundancy is kind of important like if you're serious about this yeah we can definitely

[00:13:04] recommend adding a secondary service provider or some things that would allow for like in the event

[00:13:10] that teams doesn't work or on the blank there is a plan b option that will fill in the event

[00:13:16] of failure yeah and it's interesting because a lot of times people don't realize how critical those

[00:13:23] those solutions are that they're using until we say okay that's no longer an option for you

[00:13:29] how do you conduct business how long is this going to actually stop your ability to provide services

[00:13:34] to your clients or to to generate income you know how much money is it causing you without yeah how long

[00:13:42] you do without doing those things yeah exactly so when we talk about incident response one of the

[00:13:49] things we look at is like what is the criticality of each of these systems you know if back in the

[00:13:55] day where everybody was 100% on site it would be difficult for a company to be able to recover if

[00:14:02] they only had one ISP yeah so we always used to say like do you have a backup ISP you know with

[00:14:10] with working hybrid now or working fully remote which many organizations are doing there's a little

[00:14:15] bit more opportunity for redundancy because even if you Chris can't get online because there's

[00:14:22] the disaster in your area I may perfectly well be able to do that um but it's it's it's it's the

[00:14:28] process of calling out like oh here's actually where the gaps are and you you tease some of that

[00:14:35] out ahead of time of course when when we're sitting around theoretically at a table saying like oh

[00:14:39] what are our most critical solutions but you know the tabletop is really where we get to see where

[00:14:46] the holes in that process are yeah it made me think about um you brought up you know the room

[00:14:52] with the work from home or a lot of the especially with solution providers today that whether it was

[00:14:56] before or because of COVID the employees all all work remotely and it got me thinking about some

[00:15:02] of the the safe resident the trust marks CIS in a lot of frameworks they talk about you know the

[00:15:07] business continuity of like hours out what fill in the blank and I started thinking about like okay

[00:15:13] so if I'm work I work from home and my power is out or I don't have internet where I'm located

[00:15:19] what's the plan because what if my cell service goes out with that like I'm remote enough like

[00:15:23] I don't have power here at my house I'm probably not getting very good cell coverage because I'm

[00:15:28] pretty remote so is it like is there a uh in that playbook that says oh well when Chris is no

[00:15:34] longer able to work from home his his point of contact would be and fill in the blank coffee shop

[00:15:40] or that's maybe five miles away but like in my documentation does it actually have a phone number

[00:15:47] for the business that's there because what if cell service is directly impacted on a much broader

[00:15:51] scale but I can get to the internet or I can get to some things like you know I think sometimes

[00:15:55] we're quick to say oh well I would just go work with the local Starbucks if you're in a

[00:15:59] urban setting there could be like nine Starbucks within a three block radius which one is Chris

[00:16:03] that and is that important as part of your you know continuity planning to make sure that people know

[00:16:10] like hey if I want to get hold of Chris and I know that he we both work in a urban environment

[00:16:15] and he's like yeah I'll be at Starbucks but I don't know what's one it is it may take me a while

[00:16:20] to go and be at the same location he is and we may not have that kind of time yeah yeah

[00:16:25] and that's one of the reasons why it's so important to have folks understand who it who's the

[00:16:30] backup if I can't reach Chris and Chris is one of my decision makers there really needs to be a

[00:16:37] secondary decision maker that you know we we have some resilience around can can the company move on

[00:16:43] without one person you know yeah I think it's it's a big you know we we dance around the concept of

[00:16:51] risk management but that's really what we're talking about here we're talking about in the

[00:16:55] tabletop exercise identifying not just what are the risks to the business if something goes down

[00:17:03] which really ideally should be done ahead of time and as part of your your business continuity program

[00:17:09] but we're also looking at like what is what is the risk of some of the pieces falling apart

[00:17:16] you know do we have a single point of contact for something do we have only one person that has

[00:17:22] access to the admin panel you know these are the kinds of things that a tabletop exercise can

[00:17:29] tease out again the important piece here is the facilitation because anybody can just run the you

[00:17:37] know if you look at this as a tabletop exercise guides yeah there's all of these this is what's

[00:17:42] happening in this order but then you get into these juicy nuggets of here the here are the questions

[00:17:48] to ask here a perspective to contribute to it and so I think somebody who's got a little bit of

[00:17:54] practice with that especially somebody who's got some good facilitation skills they're kind of

[00:17:59] stepping their own opinions back and letting the group actually make the decisions and be guided

[00:18:06] in the right direction can really make this a really impactful business opportunity so

[00:18:16] we've got about 12 minutes or so and I thought it'd be a good idea to

[00:18:21] walk through some of the definitions and specifically not just the definitions but sort of the

[00:18:28] rules within doing a tabletop exercise and I think there's a lot to unpack with regards to the

[00:18:34] different rules and responsibilities with some of the things that we've talked about up until

[00:18:37] this point so there's there's basically four roles based on some of the things that came from

[00:18:44] Sissa in the exercise we did and obviously there could be more but the sort of the categories are

[00:18:50] going to be the players those are doing the tabletop exercise or going through this simulation

[00:18:55] there's the observers so I think it's important like if you only have four or five employees in your

[00:18:59] company it's not a bad idea to bring in a third party to participate as an observer to help fill

[00:19:05] in the gaps for roles that you might not be able to do by yourself and then facilitators which

[00:19:11] in the case of CCF and I think we're going to see you at ChannelCon no foreshadowing here doing

[00:19:18] something similar and then note takers and I think perhaps the most the most important role I think

[00:19:27] in a lot of these tabletop exercises is going to be that note taker because being able to capture

[00:19:33] emotion the after actions and I actually had this thought like maybe it's not a bad idea especially

[00:19:39] if everybody works remote to do some using zoom and record it be able to go back and look at some

[00:19:45] of the emotion and use some of that zoom AI note taking to help with some of this because

[00:19:50] I've done a lot of simulations and I can tell you there have been times where

[00:19:54] I really felt uncomfortable like I like even though I knew it was a simulation my brain was like wow

[00:20:00] this would be really devastating to our company if those actually happened yeah um I we record

[00:20:08] all of our tabletop exercises that we do for clients um and we make those recordings available

[00:20:14] but we also use them so that our note taker can go back through and make sure that they captured

[00:20:21] you know occasionally there'll be an offhand comment that we want to come back to we want to say oh

[00:20:27] you know Chris said you know that he wouldn't know who to call next and so we can make that an action

[00:20:34] item and pulling you know the end result of the tabletop but go through the kind of the lead-up

[00:20:41] actions that happen um you know we start the incident we we see what the aftermath is going to be

[00:20:49] and then it's the lessons learned so you know it's things like you know okay well

[00:20:56] we don't have a printed copy of the incident response so that's an action item coming out of it

[00:21:01] we have copies of that that are located in these specific areas so you know making sure that

[00:21:08] that note taker is really focused and if you don't have that note taker record it and then go

[00:21:13] back and pull the notes yourself you can do this as a one-person team if you have to yeah I

[00:21:18] I like what you said I think it's really important to remind everybody that the tabletop exercise

[00:21:24] is kind of like step two or step one and a half the after action i think is something that often

[00:21:31] gets missed like oh yeah we've referred to our implementation guide or our playbook and we've

[00:21:36] got this and like this is just an exercise and it's make believe pretend and you know on Mr. Rodgers

[00:21:42] everything ends with happy happy so like in the make believe world yeah it can be whatever you want

[00:21:48] it to be but when we go back for reality we got this and I think that's one of the things I want

[00:21:52] to point out too and you know i've talked about this before start with simple start with easy

[00:21:58] scenarios start with like I understand fully what the scenario that is taking place and impacting

[00:22:04] our businesses right now it's a possible reality now using things like oh well our MDM would catch

[00:22:10] that our xdr would catch that those are not okay things to say because the reality is this incident

[00:22:16] has happened and it's impacting your company so that means that something else has failed and to

[00:22:22] your point of saying the the xdr would have caught this well it didn't so what went wrong

[00:22:28] so circle that xdr as part of your after action in this conversation to go look like oh wait

[00:22:34] maybe it was a false positive it's been happening like over and over and over again

[00:22:38] but you categorized it wrong and so we got the xdr did catch it and then you told the xdr system

[00:22:44] that nope you're right it's it or i'm right it's a false positive you let it through and boom it's too late

[00:22:50] talk to me a little bit more I think we touched on this a little bit

[00:22:54] we understand the observers they can ask questions and I think when we look at sissa there's lots of

[00:22:59] questions that can get asked they put libraries of them and they follow the nist domain with

[00:23:02] identity identify protect respond etc i understand facilitators that's the role that is like i'm

[00:23:09] in starting this we're making this happen you're like the dungeon master and dnd

[00:23:14] we've talked about the note takers but I think one that is really important that is easy to get

[00:23:20] upside down and we talked about a little bit earlier let's talk about the players let's talk

[00:23:23] about the roles that are in this or in this scenario talk to me about things like why you would say

[00:23:29] not have the CEO or maybe departmentalizing having smaller table tops at a at a department level or

[00:23:37] maybe even making it like hey it's help desk i don't care if there's only four people in your

[00:23:41] company this is a help desk scenario we're gonna play that how do you approach that

[00:23:47] most IT teams regardless of their size feel a little bit more comfortable when you don't

[00:23:52] throw the c-suite on the first incident response policy or sorry the incident response tabletop

[00:23:59] exercise there's often a sense by the time that we get to the CEO that everything should run

[00:24:06] like clockwork and that's not actually the point of a tabletop exercise the point of a tabletop

[00:24:12] exercises to break it um and so I would say have have one that feels comfortable for your key

[00:24:20] responders yeah so that would be um you know the people that would be most likely to discover or

[00:24:27] have to escalate the problems the people that that that it would be escalated to and then any key

[00:24:33] decision makers um that would have you know any outreach to the vendor or any um you know who's

[00:24:41] the person that would then be communicating with the rest of the the senior leadership team

[00:24:48] so that you can kind of test out that segment of it and then potentially bring in the the c-suite

[00:24:56] folks the legal representative the the marketing people whoever else are going to be the

[00:25:02] enactors of some of those decisions um they can then come in but but weeding with a very clear

[00:25:09] example of the reason that we are doing this it our IT team has tested the incident response capacity

[00:25:16] however because that cannot exist in a vacuum it's important that we test this with other decision

[00:25:23] makers in this process and then bringing those folks in and at that point your IT team has gotten

[00:25:30] practice they're a little bit more comfortable with it and they can kind of show off their skills

[00:25:34] in front of the c-suite which always makes IT people happy um um and even if you don't have c-suite

[00:25:41] even if you don't have c-suite is to if you are the CEO or the owner take that hat off what this

[00:25:47] play out more from a standpoint of understanding where your bottlenecks are potentially going to

[00:25:52] come from if you aren't there who can make decisions on your behalf so maybe have someone else

[00:25:58] yeah your role in the conversation so that they have to think like okay Sarah's not here or Chris

[00:26:05] isn't here like what do we do and it reminds me of a of a story um I'll just give you the the high

[00:26:11] level because I think it's really important because it'll be a I know it'll be an episode later

[00:26:17] in the year um the after-action for a really crazy incident that involved um it was not had anything

[00:26:24] to do with ransomware but let's just say it involved the car rolling into a building causing

[00:26:29] flooding and so like that's the gist of it right mm-hmm and I I asked the question I'm like well what

[00:26:34] were the big takeaways like you guys you know it's a great story you know that they it sounds like

[00:26:39] a little bit of a fairy tale outcome of like the you know everybody wins kind of thing and he goes

[00:26:45] the after-action was uh we procrastinated too long and I'm like wow that's a really big

[00:26:51] yeah that's just that's a huge observation to have especially at the owner or C-suite level to say

[00:26:57] we procrastinated like when you think about what we're talking about here in a tabletop exercise

[00:27:02] every second counts every minute counts right I think that's a really interesting observation like

[00:27:08] we were too slow in the way we handled the situation um and I think that's a great observation to

[00:27:13] have but I think there's also the flip side I don't necessarily think that it's called procrastination

[00:27:19] I think maybe it was like some of the pieces weren't where they needed to be because I also don't

[00:27:23] want someone to go I'm calling I'm calling the attorney yeah yeah don't pull the don't pull the stop

[00:27:29] the train chain yeah for for something that might not be required oh it's saying that we need

[00:27:35] to patch the system got it wrong I was looking at the wrong board my bad yeah well and this is

[00:27:42] one of the reasons why having a chain of escalation is really critical as well um because we can

[00:27:48] get caught up in oh we think that this is a really significant issue when in reality it might be

[00:27:54] not or there might be a valid reason for it that we just didn't know because we're not in the

[00:27:59] right department or the right team so um giving people an opportunity to test it out is really the

[00:28:07] important part of it um I did a tabletop exercise not too long ago and the client was just like well

[00:28:13] well you know we haven't seen something like this happen in next number of years and I did not

[00:28:19] say it in the moment because it wasn't the right time sure but I wanted to say well nobody planned

[00:28:24] for a pandemic with any significance prior to 2020 because that would never happen and here we are

[00:28:33] and no no joke but like people still have fax machines and quite honestly the evolution of the

[00:28:40] Nigerian Prince asking for help still exists both in the form of the fax machine and in every

[00:28:46] iteration that we see come through via email so that would tell me that well the incident to your

[00:28:52] organization may be true today one word change one sort of slip up or one sort of like oh that

[00:28:59] looks like a shiny object I should click on and it makes it different than what you thought could

[00:29:04] ever happen to your organization yeah I mean when we look at like the MGM hack that was you know

[00:29:11] that was ostensibly by the book um you know like nobody was specifically totally blame right

[00:29:21] you know like nobody internally that is a mistake that I would wager over 50% of IT help desk support

[00:29:29] would have said oh no this is legit yeah so you know it's like we can have all of the best intent

[00:29:36] in the world you can have all of the best tools in the world it doesn't mean that you are

[00:29:42] you have future proofing for incidents um so there's there's two more things I want to cover one

[00:29:48] I'll just glaze over so the facilitation rule I mean I'm not gonna give all the details here it'll

[00:29:54] come out again later I'm sure for most people but the facilitation exercise that part of it is

[00:30:00] to remind everybody that don't use make-believe scenarios you know the sky diver the shark jumping out

[00:30:06] of the water even if it could possibly happen don't ever start with scenarios that are difficult

[00:30:13] to approach um I've had some crazy ones happen in my career both as a tech director and and

[00:30:20] CISO and and another job rolls Sarah you've and I have both experienced some of those together

[00:30:26] but there's no fault there's no dumb suggestions unless you're genuinely trying to be you know

[00:30:32] funny and then that I think needs to be dealt with because a tabletop exercise

[00:30:38] there's a lot of money on the table right like a simulation with all your staff in the room

[00:30:43] you're not talking to clients you're not you know prospecting and taking on new leads this is a

[00:30:48] internal conversation that you're spending money on your staff to be there so make sure you make

[00:30:53] the most of it and then the the second thing that I wanted to talk about this is probably what we

[00:30:59] can use to to wrap up this this call or this um episode is let's talk about what merits

[00:31:07] classifying an incident I think that's one that often gets overlooked and often misused and

[00:31:14] we can all laugh about the example of like the phone rings and whoever answers the phone like oh

[00:31:19] yeah the breach yeah hold on they're in the they're in the conference room talking about it right

[00:31:23] now let me patch you through um those are not good things to say out loud yeah I think more

[00:31:30] than that understanding why you shouldn't use that word is where this comes into play on and

[00:31:35] other words as well yeah and this I would say is critical in your incident response policy

[00:31:42] and in your incident response plan is who is allowed to use that word are we training everybody

[00:31:50] in the company to not use that word and not speak to anybody externally yeah um do we all

[00:31:58] understand what an incident constitutes and an incident can be constituted by different qualifications

[00:32:05] depending on your organization sure but understanding that the term incident means that it is a

[00:32:12] violation of security policies either suspected or in truth and that is different from a breach

[00:32:19] because a breach now brings you into responsibilities to other people responsibilities to the

[00:32:25] government to report um you know there are a number of things that that that means and this is where

[00:32:32] a good policy should delineate all of that so that it's right in front of you everybody's being

[00:32:38] educated on what those terms mean and who gets to use them in many organizations the only person who

[00:32:47] can declare an incident is somebody who is at like a director level of IT or the SISO or the CTO

[00:32:56] and they limit that to that person specifically to try to avoid those kinds of

[00:33:03] traps that we get caught in when somebody opens it up and says a word too early yeah

[00:33:08] so along those lines I think what we're really getting at today is we're mostly talking about cyber

[00:33:14] cyber incidents which would be incident but like um tabletop exercises if you want to start and

[00:33:20] not jump all the way to cyber incidents you know flooding uh you know uh storms that you know

[00:33:27] you know having a server be no longer available because it got flooded with water um that's not

[00:33:34] what we're referring to when we start talking about security incidents and when we would call out

[00:33:39] breach but it doesn't mean you can't start with a an incident response plan or talk through your

[00:33:44] business continuity plans and use some things that maybe are easier to talk through and then build

[00:33:51] up to doing one that's more cyber specific so that you're not like having to overwhelm my team

[00:33:56] by coming in there and saying hey let's talk through you know uh ransomware just hit client

[00:34:00] acme corporation and what we do and they're like um that should never happen because we've done all of

[00:34:07] these things it's like okay that's fair I understand where you're coming from so let's do one that's more

[00:34:12] likely to happen from your perspective uh on round one like so the you know fill in the blank right

[00:34:20] there's plenty of justice still I mean I like stolen laptop that's a good one um you know like

[00:34:26] particularly if it's a senior leadership somebody who's got that you know like okay how do we

[00:34:30] what is our order of operations if we have a laptop that's reported stolen uh

[00:34:35] encrypted uh let's check right yeah you immediately like oh no yeah yeah do you have encryption

[00:34:41] on it awesome okay great so this is not so much of an incident but we still need to report it

[00:34:46] how do we do the reporting so you you do get to kind of have a cradle to grave with it um you know

[00:34:52] definitions are critical right that's that you just are highlighting some of the things that

[00:34:56] like okay well what does that mean to report what are we reporting what's relevant don't don't

[00:35:00] share more than you need to yeah exactly um just because you have a responsibility to report incidents

[00:35:07] to the DOD within 72 hours it's like does that mean that you report a stolen laptop well that depends

[00:35:13] you know so we get to we get to kind of practice it on smaller areas um another one that

[00:35:19] is that said yeah well I mean I file servers what happens if your file server goes down

[00:35:26] you know that could be that could dovetail into a um you know backup recovery uh exercise

[00:35:33] so you can pick things out that would help improve your security posture without necessarily

[00:35:40] going to going to the red alert yeah I like that I think because again we're trying to raise

[00:35:46] the level of maturity with this process and doing a tabletop exercise as opposed to hey guys

[00:35:52] uh if you want to get lunch today you're gonna get this right we we know that that's not the goal

[00:35:56] we want we want to see some level of failure and stumbling in this process because that means

[00:36:02] we're highlighting areas that we need to improve upon and I can honestly say that if you do the

[00:36:08] tabletop exercise and you really went through the motions and the entire exercise and there really

[00:36:13] wasn't a lot of change that needs to be made awesome then it's time to mature the exercise to

[00:36:18] something that's a little bit more difficult the one you just went through yeah well and if

[00:36:23] you're not revamping it on a regular basis you're not staying current with your text deck you're

[00:36:29] not staying current with your processes sure so this is not a one and done by any stretch of the

[00:36:34] imagination well I think that's a good place to just wrap this up Sarah in last thoughts to share

[00:36:40] with the audience before we send them on their way late in the week um look at tabletop exercises as

[00:36:49] an opportunity for exploration and growth as opposed to you have to be perfect um because there's

[00:36:57] always lessons learned there are always business opportunities that come up as a result of it

[00:37:03] when we look at it as what can we learn about ourselves and how can we grow it becomes an amazing

[00:37:08] process Sarah well said and thank you for being on the show for those of you listening this has

[00:37:13] been an episode of 1337 thanks have a great week