Professional Documents
Culture Documents
Preparing For A Cyberattack: Playing Cyberwar Games
Preparing For A Cyberattack: Playing Cyberwar Games
29% 54%
Of Organizations feel Of Security and IT
that their reactive Leaders have very
approach to security limited visibility of
is a major threat to their organizational
their security program data, making data
security difficult
• Traditionally used in
military to prepare for battle
• Uses
• Assessing
capabilities
• Planning
• Training
• Systematic Risk
Identification
Tabletop Exercise
• Adversary is represented
through the scripted
scenario events
Red and Blue Teams
Scenarios
Scope
Business Threat
functions
Defensive
Define
Cyber
System
Technologies
environment
and posture
Asset Vs Sample Threats
APT – Advanced
Customer data Persistent Threats