Tabletop Exercises for Cyber Crime

graphic for the category of table top exercises related to a cyber attack

You Are Under a Cyber Attack: You hit send on the email, but nothing happens. Then your computer reboots. People are at your door saying the same thing is happening to them.

Your network has slowed to a crawl. Even your phone system is down. It's becoming clear this is something bigger than IT.

Cyber Crime for Associations

Planning for Cyber Crime at Associations

Overview: Participants are the leadership/management of a fictional association. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

Exercise Focus: Crisis Management / Communications / Business Resumption

Cyber Crime for Banks

Exercise for Cyber Crime for Banks

Overview: Participants are the leadership/management of a fictional bank. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack...

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership.

Exercise Focus: Crisis Management / Communications / Business Resumption

Cyber Crime for Credit Unions

Cyber Crime for Credit Unions

Overview: Participants are the management of a fictional credit union. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

Exercise Focus: Crisis Management / Communications / Business Resumption

Cyber Crime for General Business

Cyber Crime for General Business

Overview: Participants are the management of a fictional company. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

Exercise Focus: Crisis Management / Communications / Business Resumption

Cyber Crime for Health Care Facilities

Cyber Crime for Health Care

Overview: Participants are the management team for a fictional Nursing Home. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

Exercise Focus: Crisis Management / Communications / Business Resumption

Cyber Crime for Insurance Companies

Cyber Crime for Insurance Companies

Overview: Participants are the leadership/management of a fictional insurance organization. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

Exercise Focus: Crisis Management / Communications / Business Resumption

Cyber Crime for Law Firms

Cyber Crime for Law Firms

Overview: Participants are the management team for a fictional law firm. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

Exercise Focus: Crisis Management / Communications / Business Resumption