{"id":5246,"date":"2022-06-24T19:45:00","date_gmt":"2022-06-24T23:45:00","guid":{"rendered":"https:\/\/prolifics.com\/us\/?p=5246"},"modified":"2025-09-17T21:50:21","modified_gmt":"2025-09-17T16:20:21","slug":"you-have-a-cybersecurity-plan-but-how-do-you-know-it-works","status":"publish","type":"post","link":"https:\/\/prolifics.com\/usa\/resource-center\/blog\/you-have-a-cybersecurity-plan-but-how-do-you-know-it-works","title":{"rendered":"You Have a Cybersecurity Plan &#8211; But How Do You Know It Works?"},"content":{"rendered":"<p>Enterprise cybersecurity programs take many forms to address unforeseen \u2013 and hopefully never occurring \u2013 data intrusions into your network. You\u2019ve authored policies and implemented systems, but ultimately time passes. When was the last time your organization tested the cyber readiness of your team? When did you last measure the responsiveness to an attack on your computer network?<\/p>\n<p>A \u201ctabletop exercise\u201d might be in your future. FEMA defines this process as \u201c\u2026an instrument to train for, assess, practice, and improve performance in prevention, protection, response, and recovery capabilities in a risk-free environment.\u201d<\/p>\n<p>Organizing a tabletop exercise may be the most effective evaluation to determine how your teams and your planning will react to a speculative or mock threat \u2013 such as a data breech or ransomware. The session can introduce a real-world scenario that: 1) utilizes your company\u2019s actual enterprise response plan; 2) measures your team\u2019s response and actions; and 3) provides for a gap analysis and evaluation of the plan and your teams reactions.<\/p>\n<p>Like the name suggests, a tabletop exercise is normally held in an informal or meeting-like setting. It introduces a pre-selected scenario to the group, allowing for key resources to interact with others and perform the expected (planned) actions as outlined in the response plan. These sessions may typically last 2-4 hours, though some may last several days depending on how elaborate the plan and scenario are.<\/p>\n<p>The outcome of the exercise gives you a highly effective, yet cost saving, test of your enterprise plan, resources and execution, all without endangering your data systems.<\/p>\n<p>A comprehensive guide to tabletop exercises can be found at the CISA.gov website <a href=\"https:\/\/www.cisa.gov\/publication\/cisa-tabletop-exercise-package\" target=\"_blank\" rel=\"noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">here<\/span><\/a>. You\u2019ll find scenarios, planning guides, evaluation criteria and feedback forms.<\/p>\n<p>A key to a successful response plan is the continual review, test and modification as your enterprise grows and matures.<\/p>\n<p>If you\u2019d like to discuss a tabletop exercise for your organization or need assistance in reviewing the results and addressing any issues or concerns, contact me at <a href=\"mailto:cybersecurity@prolifics.com\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">cybersecurity@prolifics.com<\/span><\/a>.<\/p>\n<h4>About the Author<\/h4>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/mike-hahn-1384665\/\" target=\"_blank\" rel=\"noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Michael Hahn<\/span><\/a> is Head of Security Practice for Prolifics, with more than 20 years of cybersecurity advisory and consulting experience to fortune 500 and government entities. As a technology leader and innovator, Michael has a track record of partnering with clients to enable unique, resilient and secure solutions within the IT space.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise cybersecurity programs take many forms to address unforeseen \u2013 and hopefully never occurring \u2013 data intrusions into your network. You\u2019ve authored policies and implemented systems, but ultimately time passes. [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":30035,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[49],"tags":[],"class_list":["post-5246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"builder_content":"","_links":{"self":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/5246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/comments?post=5246"}],"version-history":[{"count":0,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/5246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media\/30035"}],"wp:attachment":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media?parent=5246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/categories?post=5246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/tags?post=5246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}