Cyber Recovery Table-Top Exercises
Cyber attacks are a real and vital threat to organizations’ continuity of operations and security of information. Many have prepared technical response plans but many companies have not, and fewer still have developed Business Continuity Plans to keep operations going should an attack occur. Testing, at this point, is often an afterthought.

Risk Masters International has developed a program to test Cyber Recovery, for both organizations with plans and those without.

  • Preparedness Testing, for organizations that have developed a Cyber Recovery Plan:
    • Test the comprehension of the plan by recovery participants
    • Identify gaps and inconsistencies in the plan
    • Measure the speed of recovery and identify ways to improve it
    • Compare probable recovery timing with Recovery Time Objectives
    • Validate the potential effectiveness of the plan
  • Diagnostic Assessment, for organizations that have not yet developed a Cyber Recovery Plan:
    • Identify strengths and weaknesses in the current level of preparedness to recover
    • Assign roles and responsibilities for developing a plan and for carrying it out
    • Determine the speed of recovery and identify ways to improve it
    • Compare probable recovery timing with Recovery Time Objectives
    • Build an on-going preparedness and recovery capability

These Table-Top Tests, conducted in a safe conference room setting, simulate various attack scenarios that cannot be carried out in a “live” manner. The scope of the tests includes:
  • Organization for preparedness and recovery from cyber attacks
  • Recovery from theft of information, including privacy ramifications
  • Recovery from destruction of application software and data
  • Recovery from ransomware attacks
Clients may choose to conduct as many tests as they like from among the following modules:

Business Response Technical Response
  • Preparedness – Business Response
    • RTO and RPO reconsideration
    • Web site defacement recovery
    • Cyber-focused organization
    • Business preparations and exercising
  • Preparedness
    • NIST Cybersecurity Framework Assessment
    • Hardware and software updates
    • Cyber organization
    • Drills and tests
  • Theft of information
    • Organizational decision making and response
    • Privacy breach response
    • Management communication
    • Technical repair
  • Theft of information
    • Identification of an attack
    • Measurement of loss
    • Management communication
    • Clean-up
  • Destructive attack
    • Technical recovery time estimate
    • Determination of business impact
    • Communication with customers
    • Reconstruction of lost information
  • Destructive attack – Technical Response
    • Recovery in Place
    • Reconstruction of data and software
    • Elimination of Advanced Persistent Threats (APTs)
    • Validation of accuracy and completeness
  • Ransomware attack
    • Backup and storage strategy
    • Validation of backups
    • Business decisions
    • Technical recovery

Contact: Steven Ross, (917) 837-2484,
Website Builder