{"id":13884,"date":"2021-07-08T13:00:18","date_gmt":"2021-07-08T12:00:18","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=13884"},"modified":"2021-09-14T11:49:25","modified_gmt":"2021-09-14T10:49:25","slug":"organise-a-cyber-crisis-exercise-in-a-large-company","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/","title":{"rendered":"Organise a cyber crisis exercise in a large company"},"content":{"rendered":"<p style=\"text-align: justify;\"><i><span data-contrast=\"auto\">Organising a cyber crisis exercise is not an easy task.&nbsp;From&nbsp;the preparation to the D-Day, a lot of&nbsp;unforeseen&nbsp;events&nbsp;can&nbsp;occur&nbsp;and the preparation&nbsp;teams&nbsp;need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/p>\n<h2><\/h2>\n<h2 style=\"text-align: justify;\"><strong>ORGANISING&nbsp;A CYBER CRISIS EXERCISE IN A LARGE COMPANY&nbsp;<\/strong><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">There are many reasons to organise a Cyber crisis exercise: evaluating the integration of Cyber security in the crisis management system, improving interactions between the different teams, and testing the capacity of the security division to make itself understood by top management.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">From a simple table-top process test to SOC\/CERT training to a large-scale exercise involving dozens of crisis&nbsp;teams&nbsp;and months of preparation, the resources&nbsp;<\/span><span data-contrast=\"auto\">allocated to a crisis simulation vary greatly<\/span><span data-contrast=\"auto\">.&nbsp;This article focuses on&nbsp;the&nbsp;last category.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2><\/h2>\n<h2><strong>WHAT\u2019S A TYPICAL CRISIS EXERCISE?&nbsp;<\/strong><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Looking at the figures, some of the largest crisis exercises in France have consisted of one day of activity, 150 people mobilised, 10-12 crisis teams in several countries, 30 facilitators, 20 observers and more than 300 stimuli. Being able to make a success of such an event requires both a high level of preparation and a very solid facilitation team on the D-day.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">One of the key issues found in these types of exercises is that there is only one take. It is therefore essential that ALL the actors take part in the game, and that the scenario involves all the participants. Preparation and facilitation are key in such exercises to make sure the time spent on the simulation is worthwhile. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2 aria-level=\"2\"><\/h2>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><strong>SIX MONTHS TO PREPARE<\/strong><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:80,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h2>\n<h4 aria-level=\"2\"><\/h4>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><strong>1\/&nbsp;Selecting&nbsp;the attack scenario&nbsp;<\/strong><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The first months of work are always devoted to the attack scenario. Ransomware, targeted fraud, attacking suppliers\u2026 the choice of weapons is large. In ambitious exercises, it is not rare to combine several attacks in one crisis: smoke screen launched by the attackers, identification of a second group during the investigation, etc. Whatever the scenario chosen, the key is to be as precise as possible:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">What are the attackers\u2019 motives?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">What path of attack did they take?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">When was the first intrusion?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The exercise is long and preparation beforehand is needed, especially when 150 players investigate an attack for several hours. Spear-phishing, water holing, code compromise, privilege escalation: the vulnerabilities used by the fictitious attacker are not real, but they must be plausible and \u201cvalidated\u201d by technical accomplices throughout the preparation. Similarly, for business impacts, they should be reviewed with business specialists: the level of fraud at which the situation becomes critical, critical activities to be targeted as a priority, most sensitive customers, etc. The choice and involvement of accomplices are essential and they should be integrated into the coordination team on D-day. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><strong>2\/ Building&nbsp;the script of the exercise&nbsp;<\/strong><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The&nbsp;script consists in defining minute by minute the information that will be communicated to the players. The calibration of the exercise rhythm is a complex point.&nbsp;The temptation to impose&nbsp;a strict&nbsp;rhythm is great to \u201cmaster\u201d the scenario&nbsp;but&nbsp;attention needs to be&nbsp;given&nbsp;to leave enough space&nbsp;for reflection.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The start of the exercise is another complex point: should&nbsp;the scenario&nbsp;start directly&nbsp;in&nbsp;a crisis situation&nbsp;or on&nbsp;an&nbsp;alert that will test the general mobilization process?&nbsp;Most often than not, the&nbsp;second option is chosen.&nbsp;That way, the&nbsp;technical teams (CERT, SOC, IT\u2026)&nbsp;&nbsp;can be mobilised&nbsp;for the entire duration of the exercise.&nbsp;ExCom&nbsp;members should have their diary freed up during that day&nbsp;as well.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><strong>3\/ Preparation of&nbsp;the stimuli&nbsp;<\/strong><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Technical reports, fake tweets, messages from worried customers, these are all useful stimuli for the players.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Videos are often used to&nbsp;captivate.&nbsp;Indeed, nothing is more striking than a fake&nbsp;BBC&nbsp;report relaying the current attack (logo, board, etc.&nbsp;the more realistic the better).&nbsp;For more realism, videos&nbsp;of people \u201cknown\u201d in the company (message from the CEO, interview of a factory boss,&nbsp;etc)&nbsp;can be used.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The same goes for the technical side: the duration of the exercises often does not allow the players to carry out the technical investigations themselves, but they will ask a lot of the facilitators.&nbsp;Everything must be ready to avoid panic:&nbsp;Malware analysis reports, application log extracts, IP address lists, etc.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">As mentioned in the introduction, the most ambitious exercises may require the creation of 300 stimuli to get through the day and remain credible&nbsp;\u2013&nbsp;is represents a&nbsp;lot of work.<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><strong>D-DAY&nbsp;<\/strong><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">On D-Day, early morning, a meeting is organised&nbsp;with all the animation team and observers for&nbsp;the&nbsp;final adjustments. A few hours later, the observers&nbsp;will&nbsp;go to their crisis cells and start the players\u2019 briefing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><strong>1\/ Starting on a good basis&nbsp;<\/strong><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">For&nbsp;many players, this may be their first exercise. The briefing is&nbsp;therefore&nbsp;essential to avoid&nbsp;confusion between fictional and real-life events:&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ul style=\"text-align: justify; list-style-type: circle;\">\n<li data-leveltext=\"%1.\" data-font=\"Times New Roman\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Players call the police in the middle of the exercise<\/span><\/li>\n<\/ul>\n<ul style=\"text-align: justify; list-style-type: circle;\">\n<li data-leveltext=\"%1.\" data-font=\"Times New Roman\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">The players contact a mailing list of 400 people without specifying that it is an exercise<\/span><\/li>\n<\/ul>\n<ul style=\"text-align: justify; list-style-type: circle;\">\n<li data-leveltext=\"%1.\" data-font=\"Times New Roman\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Real customers be called to be reassured<\/span><\/li>\n<\/ul>\n<ul style=\"text-align: justify; list-style-type: circle;\">\n<li data-leveltext=\"%1.\" data-font=\"Times New Roman\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">A production site is neutralized \u201cby prevention\u201d<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To avoid such situations, it is essential to iron out the rules of the game during the briefing: the players must communicate with each other, but they must go through the facilitation unit to contact external stakeholders. Throughout the day, the facilitators and accomplices in each team find themselves in the shoes of a client, a technical expert, a CEO, or a regulator, according to the players\u2019 requests. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><strong>2\/ Rely on an efficient facilitation team&nbsp;<\/strong><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The sequence of events depends on the efficiency of the animation cell. A successful exercise includes a lot of improvisation on the day. Stimuli may have to be readjusted according to the reactions of the players, the score is never fixed and the facilitation cell will be put to the test on the day of the exercise. The largest crisis exercises have particularly professional crisis management teams, including the head of the facilitators, PMO, technical manager, business manager, call management centre, etc. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">We suggest not to take any risks on D-Day and to recreate teams that are used to working together and know each other. Doing so is the best way to gain time that will prevent the organisation team from going into crisis itself.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organising a cyber crisis exercise is not an easy task.&nbsp;From&nbsp;the preparation to the D-Day, a lot of&nbsp;unforeseen&nbsp;events&nbsp;can&nbsp;occur&nbsp;and the preparation&nbsp;teams&nbsp;need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise&#8230;<\/p>\n","protected":false},"author":1246,"featured_media":13885,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,3977],"tags":[3407,3561,1749,2871,3410,3559,3560],"coauthors":[783],"class_list":["post-13884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-focus","tag-awareness","tag-comex-en","tag-crisis-en","tag-cyberattack","tag-cyberawareness-en","tag-exercice","tag-management-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Organise a cyber crisis exercise in a large company - Risk Insight<\/title>\n<meta name=\"description\" content=\"Organising a cyber crisis exercise is not an easy task.\u00a0From\u00a0the preparation to the D-Day, a lot of\u00a0unforeseen\u00a0events\u00a0can\u00a0occur\u00a0and the preparation\u00a0teams\u00a0need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Organise a cyber crisis exercise in a large company - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"Organising a cyber crisis exercise is not an easy task.\u00a0From\u00a0the preparation to the D-Day, a lot of\u00a0unforeseen\u00a0events\u00a0can\u00a0occur\u00a0and the preparation\u00a0teams\u00a0need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-08T12:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T10:49:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1780\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthieu Garin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthieu Garin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\"},\"author\":{\"name\":\"Matthieu Garin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6c4f0c30b01417df346ed7f46d56b935\"},\"headline\":\"Organise a cyber crisis exercise in a large company\",\"datePublished\":\"2021-07-08T12:00:18+00:00\",\"dateModified\":\"2021-09-14T10:49:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\"},\"wordCount\":1149,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"keywords\":[\"awareness\",\"COMEX\",\"crisis\",\"cyberattack\",\"cyberawareness\",\"exercice\",\"management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Focus\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\",\"name\":\"Organise a cyber crisis exercise in a large company - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"datePublished\":\"2021-07-08T12:00:18+00:00\",\"dateModified\":\"2021-09-14T10:49:25+00:00\",\"description\":\"Organising a cyber crisis exercise is not an easy task.\u00a0From\u00a0the preparation to the D-Day, a lot of\u00a0unforeseen\u00a0events\u00a0can\u00a0occur\u00a0and the preparation\u00a0teams\u00a0need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"width\":1780,\"height\":1068},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Organise a cyber crisis exercise in a large company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6c4f0c30b01417df346ed7f46d56b935\",\"name\":\"Matthieu Garin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/matthieu-garin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Organise a cyber crisis exercise in a large company - Risk Insight","description":"Organising a cyber crisis exercise is not an easy task.\u00a0From\u00a0the preparation to the D-Day, a lot of\u00a0unforeseen\u00a0events\u00a0can\u00a0occur\u00a0and the preparation\u00a0teams\u00a0need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/","og_locale":"en_US","og_type":"article","og_title":"Organise a cyber crisis exercise in a large company - Risk Insight","og_description":"Organising a cyber crisis exercise is not an easy task.\u00a0From\u00a0the preparation to the D-Day, a lot of\u00a0unforeseen\u00a0events\u00a0can\u00a0occur\u00a0and the preparation\u00a0teams\u00a0need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.\u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/","og_site_name":"RiskInsight","article_published_time":"2021-07-08T12:00:18+00:00","article_modified_time":"2021-09-14T10:49:25+00:00","og_image":[{"width":1780,"height":1068,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Matthieu Garin","twitter_misc":{"Written by":"Matthieu Garin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/"},"author":{"name":"Matthieu Garin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6c4f0c30b01417df346ed7f46d56b935"},"headline":"Organise a cyber crisis exercise in a large company","datePublished":"2021-07-08T12:00:18+00:00","dateModified":"2021-09-14T10:49:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/"},"wordCount":1149,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg","keywords":["awareness","COMEX","crisis","cyberattack","cyberawareness","exercice","management"],"articleSection":["Cyberrisk Management &amp; Strategy","Focus"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/","name":"Organise a cyber crisis exercise in a large company - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg","datePublished":"2021-07-08T12:00:18+00:00","dateModified":"2021-09-14T10:49:25+00:00","description":"Organising a cyber crisis exercise is not an easy task.\u00a0From\u00a0the preparation to the D-Day, a lot of\u00a0unforeseen\u00a0events\u00a0can\u00a0occur\u00a0and the preparation\u00a0teams\u00a0need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.\u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_74362160_Subscription_Monthly_M.jpg","width":1780,"height":1068},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/07\/organise-a-cyber-crisis-exercise-in-a-large-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Organise a cyber crisis exercise in a large company"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6c4f0c30b01417df346ed7f46d56b935","name":"Matthieu Garin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/matthieu-garin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1246"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=13884"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13884\/revisions"}],"predecessor-version":[{"id":16785,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13884\/revisions\/16785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/13885"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=13884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=13884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=13884"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=13884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}