CYBER INCIDENT
TABLETOP
EXERCISE
Facilitated by: <insert name here>
FACILITATOR
•Tell about yourself
•Credentials
•Experiences
•Knowledge
•Notable achievements
•Something interesting about you
EXERCISE OBJECTIVES
•Increase cybersecurity awareness to senior officials of cyber risk management, cyber related
planning, and other issues related to cyber incident prevention, protection, response, and
recovery of critical systems.
•Assess cybersecurity integration into an organization’s all hazards preparedness.
•Examine cybersecurity incident information sharing, escalation criteria, and related courses of
action.
•Examine cybersecurity incident management structures.
•Review cyber resource request and management processes.
•The primary goal is to identify gaps in cybersecurity.
ASSUMPTIONS AND ARTIFICIALITIES
•This exercise will be conducted in a no-fault environment and will evaluate the existing plans,
policies, and procedure as if players were responding to a real-world emergency.
•Earnest effort has been made to create a plausible and realistic scenario to evaluate and validate
identified objectives.
•The exercise is not to be viewed as a test of inspections of individual performance.
•There is no hidden agenda and there are no trick questions.
•The timeline here does not reflect actual times –ransomware is known to start extremely quickly
as low as three seconds after the file has been executed.
•Realistically once the IT department has been notified the majority of the data has already
been encrypted.
ANATOMY OF A RANSOMWARE ATTACK
Send
Email
Bypass
spam
filter
Hit users
inbox
User clicks
link
AV Fails
Malware
delivered
•Launch
processes
cmd.Exe
•Copies
Malware
•Adds reg
entry
Connects
with C&C
Encrypts
files
Ransom
Note
Delivered
Attempts
to move
laterally
across
Enterprise
IOC 1: GONE PHISING
•11:00 AM –A <insert organization
here> employee reports to the IT
department that he received an email
from HR directing all employees to
update their timesheets in the
Employee Timesheet Portal. The
employee clicked a link in the email
that opened what looked like the
portal. However, after entering the
user credentials, the employee
received an unfamiliar error page.
INCIDENT DISCUSSION QUESTIONS
•Do employees know what constitutes
suspicious cybersecurity activities or
incidents?
•Do they know what actions to take
when one arises?
•What established processes exist for
employees to report cybersecurity
incidents?
•Would any additional reports or
notifications be made? If so, are designated
points of contact identified?
•What incident severity level or tier is a
suspicious email?
ADDITIONAL QUESTIONS
•What training do you provide in support of your cybersecurity incident response plan, business
continuity plan, disaster recovery plan, emergency operations plan incident annex, or other
related plans?
•Does your organization provide basic cybersecurity and/or IT security awareness training to all IT
users (including managers and senior executives)?
•How often is training provided?
•Does it cover:
•General jurisdiction, department, and/or agency policy review
•Roles and responsibilities
•Password procedure
•Whom to contact and how to report suspected or suspicious activities?
…CONTINUED
•What security-related training does your organization provide to, or contractually require of:
•IT Managers
•System and Network Admins
•Vendors
•Other IT personnel having access to system-level software
•Discuss your organizations reporting mechanism.
•Discuss your organization’s intrusion detection capabilities and analytics that alert you to a cyber
incident.
THINGS TO CONSIDER
•User training –do users know what suspicious emails look like? Are you sure?
•User reporting –do users know how to report an email? Are you sure?
•Alerting and analysis –are there systems in place to notify IT of impending doom?
•Know your network –do you know what is accessible from each device?
•Inventory, heuristics
•ADKAR –five tangible and concrete outcomes that people need to achieve for lasting change
•AWARENESSof the need for change
•DESIREto support the change
•KNOWLEDGEof how to change
•ABILITYto demonstrate skills and behaviors
•REINFORCEMENTto make the change stick
IOC 2: NOTICABLE
MASS MAILINGS
•3:00 PM –<insert organization here> IT
Service Desk receives five reports of
emails similar to the one reported
earlier. Further investigation reveals
that phishing emails were sent to 42
employees across all <insert
organization here> departments over a
two-day period. The emails directed
users to a spoofed website designed to
capture usernames, passwords, and
deliver a payload.
INCIDENT DISCUSSION QUESTIONS
•What is the incident severity level or tier of
this incident once multiple spoofed emails
are reported? What would prompt a
change in tiers?
•What immediate remediation and
protective actions would be taken at your
organization?
•Who is responsible for those actions?
•Have these options been documented
in plans?
•How are they activated?
•Would any additional reports or
notifications be made? If so, are the
primary, secondary, and tertiary points of
contact identified?
ADDITIONAL QUESTIONS
•What are the requirements and/or processes to notify organization leadership of a cyber incident
at each severity tier?
•Are these criteria the same across the organization?
•What resources and capabilities are available to analyze the intrusions?
•Internally?
•Externally through government partners?
•Through the private sector?
…CONTINUED
•What is the role of cybersecurity in contracts with third-party support vendors and crucial
suppliers.
•Have you discussed these types of concerns and risks with them?
•What mechanisms and products are used to share cyber threat information within your
organization and external to your organization (e.g. distribution lists, information sharing portals,
broadcast messaging)?
THINGS TO CONSIDER
•Does your IT team have an offline disaster recovery plan?
•Do you have a cybersecurity strategic plan?
•Cybersecurity policies
•Do you conduct regular internal security meetings?
•Do you conduct regular cybersecurity awareness trainings?
•Do you have an incident response plan?
IOC 3: USER
COMPLAINTS
•3:25 PM –<insert organization here> IT Service
Desk receives calls and emails that the file
shares are not opening and the user is
receiving an error when attempting to “Open a
word doc I have always been able to open.”
INCIDENT DISCUSSION QUESTIONS
•What immediate remediation actions
would be taken?
•Who is responsible for those actions?
•Are redundant systems in place if the
impacted system is compromised?
•What is the incident severity tier of this
event?
ADDITIONAL QUESTIONS
•Do you have defined cybersecurity incident escalation criteria, notifications, activations, and/or
courses of action?
•If so, what actions would be taken at this point? By who?
•Who would this incident be reported to?
•Would any additional reports or notifications be made (e.g., to law enforcement for reasons
related to public safety)?
•Are points of contact identified?
•Would leadership be notified?
•Does the organization report cybersecurity incidents to outside organizations? If so, to
whom?
•What, if any, mandatory reporting requirements do you have?
•Are these criteria the same across the organization?
…CONTINUED
•What immediate protection and mitigation actions would be taken? Who is responsible for those
actions?
•What, if any, mandatory reporting requirements do you have? Are additional reporting
requirements in place for the loss of personally identifiable information (PII)?
•At what point in the scenario would you contact law enforcement?
•Law enforcement relationships
•What are your expectations of state and federal government?
•Are processes and resources in place for evidence preservation and collection?
THINGS TO CONSIDER
•Be prepared, an incident can happen at any time.
•Test your backups
•Test your response plan –being ready for the event know knowing the actions you need to take are key
to restoration efforts
•Do a simulation event
•There are no surefire ways to defend, only ways of mitigation
•Assess your vulnerabilities
•Know your risks
•Risks can be taken, have a plan for each risk you accept.
•Business continuity plan
•How will you sustain while systems are being restored?
•What is your mean time to repair?
•Identify CRITICALsystems
HOT WASH REPORT
•List the top three organizational strengths.
•List the top three organizational items requiring improvement.
•Set a plan to meet to discuss improvement strategies
•Develop highest needs
•Create a completable list of all improvements needed.
•Assign tasks and set expectations, goals, and timelines.
•Consider funding needed, funding sources
•Hot wash remarks/comments.