Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More

Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls

For an organization to be resilient, key personnel must be acutely aware of their roles and responsibilities before, during and after a high severity cybersecurity incident. A cybersecurity crisis scenario simulation can be invaluable to pressure test both the assembled teams and the documented processes designed for such circumstances.

A crisis simulation can give participants invaluable experience of realistic situations and can enable them to hone their skills in a safe and controlled environment.

By guiding your organization through a realistic scenario, a cyber crisis drill can help you:

  • Determine the effectiveness of incident response capabilities.
  • Determine the effectiveness of existing practices.
  • Identify areas for potential refinement or improvement.
  • Update documentation and process based on lessons learned.

The 4 Most Common Cybersecurity Crisis Mistakes We See

Trustwave often facilitates Cyber Security Crisis Simulation Exercises through our Consulting and Professional Services division, and we wanted to share the four most common security shortfalls that we see.

  1. Your crisis team shouldn’t be concentrated only around IT and security disciplines. The attendees for simulations are commonly only IT and Security-focused individuals. However, a real crisis requires a multidisciplinary team comprised of Legal, Finance, PR, Communications, Marketing, Risk, IT, Security and HR. You must bring a holistic perspective to an actual incident, so make sure you have key representatives from each discipline on the crisis team and in your simulations so you can practice working together.
  2. Make a plan, and most importantly, use it. Many organizations have Incident Management or Disaster Management Plans, which contain directions on how to handle an incident. That’s great. Creating a plan is the first step. However, we frequently find that these documents are out of date or underutilized. At a minimum, you should review these plans annually – taking into account any new team members or structures of the business. Most importantly, the plan needs to be utilized in the heat of the moment. Many times, documentation is not consulted during simulations or even during real events, usually because of the constrained timeframes in play or the absence of team members who may be more familiar with the documentation. Ensure all multidisciplinary representations are familiar with the plan and are well-practiced in how to execute it.
  3. Assign a scribe and document everything. Each simulation or real crisis can help inform the next event. Notes taken, even during simulated incidents, can be invaluable during a post-incident review or follow-up process to capture lessons learned and record the point in time rationale for decisions made during the incident. We commonly find that critical information is not accounted for and documented. Assign a scribe to document the incident, whether simulated or real, as it unfolds. Knowledge is power.
  4. Adopt a ‘follow the sun’ model to ensure your crisis response is not limited to working hours. Many organizations are fortunate to have a number of highly experienced people at their disposal who have a wealth of experience and knowledge. But the nature of crisis scenarios is that they often occur at the least convenient time, and as such, individuals cannot be relied upon to be always available. If possible, make sure each function of your crisis team has a designated backup team member ideally located in a different time zone -- who are knowledgeable, practiced and have the authority to execute the plan if a crisis happens outside of the main team’s working hours. A ‘follow the sun’ model will ensure a swift and efficient crisis response. A few hours of delay can be the difference between a successful crisis response and a morning disaster.

 

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo