CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls

For an organization to be resilient, key personnel must be acutely aware of their roles and responsibilities before, during and after a high severity cybersecurity incident. A cybersecurity crisis scenario simulation can be invaluable to pressure test both the assembled teams and the documented processes designed for such circumstances.

A crisis simulation can give participants invaluable experience of realistic situations and can enable them to hone their skills in a safe and controlled environment.

By guiding your organization through a realistic scenario, a cyber crisis drill can help you:

  • Determine the effectiveness of incident response capabilities.
  • Determine the effectiveness of existing practices.
  • Identify areas for potential refinement or improvement.
  • Update documentation and process based on lessons learned.

The 4 Most Common Cybersecurity Crisis Mistakes We See

Trustwave often facilitates Cyber Security Crisis Simulation Exercises through our Consulting and Professional Services division, and we wanted to share the four most common security shortfalls that we see.

  1. Your crisis team shouldn’t be concentrated only around IT and security disciplines. The attendees for simulations are commonly only IT and Security-focused individuals. However, a real crisis requires a multidisciplinary team comprised of Legal, Finance, PR, Communications, Marketing, Risk, IT, Security and HR. You must bring a holistic perspective to an actual incident, so make sure you have key representatives from each discipline on the crisis team and in your simulations so you can practice working together.
  2. Make a plan, and most importantly, use it. Many organizations have Incident Management or Disaster Management Plans, which contain directions on how to handle an incident. That’s great. Creating a plan is the first step. However, we frequently find that these documents are out of date or underutilized. At a minimum, you should review these plans annually – taking into account any new team members or structures of the business. Most importantly, the plan needs to be utilized in the heat of the moment. Many times, documentation is not consulted during simulations or even during real events, usually because of the constrained timeframes in play or the absence of team members who may be more familiar with the documentation. Ensure all multidisciplinary representations are familiar with the plan and are well-practiced in how to execute it.
  3. Assign a scribe and document everything. Each simulation or real crisis can help inform the next event. Notes taken, even during simulated incidents, can be invaluable during a post-incident review or follow-up process to capture lessons learned and record the point in time rationale for decisions made during the incident. We commonly find that critical information is not accounted for and documented. Assign a scribe to document the incident, whether simulated or real, as it unfolds. Knowledge is power.
  4. Adopt a ‘follow the sun’ model to ensure your crisis response is not limited to working hours. Many organizations are fortunate to have a number of highly experienced people at their disposal who have a wealth of experience and knowledge. But the nature of crisis scenarios is that they often occur at the least convenient time, and as such, individuals cannot be relied upon to be always available. If possible, make sure each function of your crisis team has a designated backup team member ideally located in a different time zone -- who are knowledgeable, practiced and have the authority to execute the plan if a crisis happens outside of the main team’s working hours. A ‘follow the sun’ model will ensure a swift and efficient crisis response. A few hours of delay can be the difference between a successful crisis response and a morning disaster.

 

Latest Trustwave Blogs

Trustwave, Telarus Announce Strategic Global Partnership

Trustwave is partnering with Telarus, a leading technology services distributor (TSD), which will allow it to leverage Trustwave’s comprehensive offensive and defensive cybersecurity portfolio and...

Read More

Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense

Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect...

Read More

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More