SlideShare a Scribd company logo
Financial Services Security Forum
Breach Incident
Mock Table Top Exercise
© Copyright 2015. ISSA-LA. All Rights Reserved.
June 5, 2015
Incident Response Lifecycle (NIST 800-61)
Comply with Laws, Regulations, Standards, etc.
Typical Incident Response Management
Flow Chart
3
The Table-Top Exercise: What and Why
 Participants confronted with a potential incident
 Play the incident response plan
 Think through what-ifs and what-abouts
 Can take several days
 Identify areas of weakness
 Gain situational awareness
 Use to strengthen the incident response plan
4
FSSF Mock Table-Top Breach Incident
 Each table is a
different fictitious
financial institution
 Tables are diverse
 Approximately same
size
 Mix of banks and law
enforcement
 People from same
bank are at different
tables
 Every table assigns
roles to people similar
to roles on their own
incident response
teams
 Law enforcement can
take on a bank role
5
Mock Table-Top Norms
 No one is expected to be speaking ‘officially’
 No one is expected to be speaking for his/her
financial institution
 It is all “make believe”
 Imagine this as a graduate seminar in incident
response
 Our objective is to “think” through the incident as
deeply as we can
6
7
Scribe Wanted. Short Hours. No Pay
Ready to Go??
8
The Beginning: Have We Detected a
Breach?
 Table: Discuss how you might come to detect a
potential breach in your [fictitious] financial
institution
 Shared discussion among the tables
 Select “common answer” and move on …
9
Step 2: What Do We Do Now?
 Table: Discuss what your first steps are after
detecting a potential breach in your [fictitious]
financial institution
 Shared discussion among the tables
 Select “common answer” and move on …
10
Steps 3, 4, 5 …: And Then What?
 Table: Discuss what you do next in your [fictitious]
financial institution
 Shared discussion among the tables
 Select “common answer” and move on …
11

More Related Content

Similar to Fssf breach-incident-table-top

Elegant Spring Printable Stationery Minimalist Writi
Elegant Spring Printable Stationery  Minimalist WritiElegant Spring Printable Stationery  Minimalist Writi
Elegant Spring Printable Stationery Minimalist Writi
Aparna Harrison
 
Gre Analytical Essay Samples
Gre Analytical Essay SamplesGre Analytical Essay Samples
Gre Analytical Essay Samples
Lydia Jana
 
Interview Process Analysis
Interview Process AnalysisInterview Process Analysis
Interview Process Analysis
Write My Paper One Day Mercy College
 
lease write all your response in a single MS Word document coverin.docx
lease write all your response in a single MS Word document coverin.docxlease write all your response in a single MS Word document coverin.docx
lease write all your response in a single MS Word document coverin.docx
SHIVA101531
 
LiarS Poker Essay
LiarS Poker EssayLiarS Poker Essay
LiarS Poker Essay
Janet Rose
 
RUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott WilderRUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott Wilder
Edelman Digital
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis Management
Scott K. Wilder
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis Management
Scott K. Wilder
 
Cruelty To Animals Essay
Cruelty To Animals EssayCruelty To Animals Essay
Cruelty To Animals Essay
Mary Johnson
 
Essay On WomenS Reservation Bill In Hindi
Essay On WomenS Reservation Bill In HindiEssay On WomenS Reservation Bill In Hindi
Essay On WomenS Reservation Bill In Hindi
Tanya Collins
 
Essay On New Technology Creates New Problems
Essay On New Technology Creates New ProblemsEssay On New Technology Creates New Problems
Essay On New Technology Creates New Problems
Takyra Roberts
 
How To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot TextHow To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot Text
Lori Mathers
 
Steps To Writing A Persuasive Essay
Steps To Writing A Persuasive EssaySteps To Writing A Persuasive Essay
Steps To Writing A Persuasive Essay
Diana Meza
 
Risk Management Paper
Risk Management PaperRisk Management Paper
Risk Management Paper
Ryan Van Riper
 
Relationship Forecasting
Relationship ForecastingRelationship Forecasting
Research Report Sample Template (7) PROFESSI
Research Report Sample Template (7)  PROFESSIResearch Report Sample Template (7)  PROFESSI
Research Report Sample Template (7) PROFESSI
Lori Mitchell
 
Truth And Consequences Getting Solutions V4 20110909.C.
Truth And Consequences Getting Solutions V4 20110909.C.Truth And Consequences Getting Solutions V4 20110909.C.
Truth And Consequences Getting Solutions V4 20110909.C.
kathleenparis
 

Similar to Fssf breach-incident-table-top (17)

Elegant Spring Printable Stationery Minimalist Writi
Elegant Spring Printable Stationery  Minimalist WritiElegant Spring Printable Stationery  Minimalist Writi
Elegant Spring Printable Stationery Minimalist Writi
 
Gre Analytical Essay Samples
Gre Analytical Essay SamplesGre Analytical Essay Samples
Gre Analytical Essay Samples
 
Interview Process Analysis
Interview Process AnalysisInterview Process Analysis
Interview Process Analysis
 
lease write all your response in a single MS Word document coverin.docx
lease write all your response in a single MS Word document coverin.docxlease write all your response in a single MS Word document coverin.docx
lease write all your response in a single MS Word document coverin.docx
 
LiarS Poker Essay
LiarS Poker EssayLiarS Poker Essay
LiarS Poker Essay
 
RUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott WilderRUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott Wilder
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis Management
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis Management
 
Cruelty To Animals Essay
Cruelty To Animals EssayCruelty To Animals Essay
Cruelty To Animals Essay
 
Essay On WomenS Reservation Bill In Hindi
Essay On WomenS Reservation Bill In HindiEssay On WomenS Reservation Bill In Hindi
Essay On WomenS Reservation Bill In Hindi
 
Essay On New Technology Creates New Problems
Essay On New Technology Creates New ProblemsEssay On New Technology Creates New Problems
Essay On New Technology Creates New Problems
 
How To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot TextHow To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot Text
 
Steps To Writing A Persuasive Essay
Steps To Writing A Persuasive EssaySteps To Writing A Persuasive Essay
Steps To Writing A Persuasive Essay
 
Risk Management Paper
Risk Management PaperRisk Management Paper
Risk Management Paper
 
Relationship Forecasting
Relationship ForecastingRelationship Forecasting
Relationship Forecasting
 
Research Report Sample Template (7) PROFESSI
Research Report Sample Template (7)  PROFESSIResearch Report Sample Template (7)  PROFESSI
Research Report Sample Template (7) PROFESSI
 
Truth And Consequences Getting Solutions V4 20110909.C.
Truth And Consequences Getting Solutions V4 20110909.C.Truth And Consequences Getting Solutions V4 20110909.C.
Truth And Consequences Getting Solutions V4 20110909.C.
 

More from ISSA LA

Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
ISSA LA
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
ISSA LA
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
ISSA LA
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
ISSA LA
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
ISSA LA
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
ISSA LA
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015
ISSA LA
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranum
ISSA LA
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
ISSA LA
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
ISSA LA
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
ISSA LA
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panel
ISSA LA
 
Irari rules
Irari rulesIrari rules
Irari rules
ISSA LA
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
ISSA LA
 
Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!
ISSA LA
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prez
ISSA LA
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
ISSA LA
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
ISSA LA
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
ISSA LA
 

More from ISSA LA (20)

Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranum
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panel
 
Irari rules
Irari rulesIrari rules
Irari rules
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
 
Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prez
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Fssf breach-incident-table-top

  • 1. Financial Services Security Forum Breach Incident Mock Table Top Exercise © Copyright 2015. ISSA-LA. All Rights Reserved. June 5, 2015
  • 2. Incident Response Lifecycle (NIST 800-61) Comply with Laws, Regulations, Standards, etc.
  • 3. Typical Incident Response Management Flow Chart 3
  • 4. The Table-Top Exercise: What and Why  Participants confronted with a potential incident  Play the incident response plan  Think through what-ifs and what-abouts  Can take several days  Identify areas of weakness  Gain situational awareness  Use to strengthen the incident response plan 4
  • 5. FSSF Mock Table-Top Breach Incident  Each table is a different fictitious financial institution  Tables are diverse  Approximately same size  Mix of banks and law enforcement  People from same bank are at different tables  Every table assigns roles to people similar to roles on their own incident response teams  Law enforcement can take on a bank role 5
  • 6. Mock Table-Top Norms  No one is expected to be speaking ‘officially’  No one is expected to be speaking for his/her financial institution  It is all “make believe”  Imagine this as a graduate seminar in incident response  Our objective is to “think” through the incident as deeply as we can 6
  • 7. 7 Scribe Wanted. Short Hours. No Pay
  • 9. The Beginning: Have We Detected a Breach?  Table: Discuss how you might come to detect a potential breach in your [fictitious] financial institution  Shared discussion among the tables  Select “common answer” and move on … 9
  • 10. Step 2: What Do We Do Now?  Table: Discuss what your first steps are after detecting a potential breach in your [fictitious] financial institution  Shared discussion among the tables  Select “common answer” and move on … 10
  • 11. Steps 3, 4, 5 …: And Then What?  Table: Discuss what you do next in your [fictitious] financial institution  Shared discussion among the tables  Select “common answer” and move on … 11