Tabletop Exercises for Cyber Crime

graphic for the category of table top exercises related to a cyber attack

You Are Under a Cyber Attack: You hit send on the email, but nothing happens. Then your computer reboots. People are at your door saying the same thing is happening to them.

Your network has slowed to a crawl. Even your phone system is down. It's becoming clear this is something bigger than IT.

  • Cyber Crime for Associations Planning for Cyber Crime for Associations Graphic

    Planning for Cyber Crime at Associations

    Overview: Participants are the leadership/management of a fictional association. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

    Exercise Focus: Crisis Management / Communications / Business Resumption

  • Cyber Crime for Banks Cyber Crime for Banks

    Exercise for Cyber Crime for Banks

    Overview: Participants are the leadership/management of a fictional bank. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack...

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership.

    Exercise Focus: Crisis Management / Communications / Business Resumption

  • Cyber Crime for Credit Unions Cyber Crime for Credit Unions

    Cyber Crime for Credit Unions

    Overview: Participants are the management of a fictional credit union. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

    Exercise Focus: Crisis Management / Communications / Business Resumption

  • Cyber Crime for General Business Cyber Crime for General Business

    Cyber Crime for General Business

    Overview: Participants are the management of a fictional company. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

    Exercise Focus: Crisis Management / Communications / Business Resumption

  • Cyber Crime for Health Care Facilities Cyber Crime for Health Care Facilities

    Cyber Crime for Health Care

    Overview: Participants are the management team for a fictional Nursing Home. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

    Exercise Focus: Crisis Management / Communications / Business Resumption

  • Cyber Crime for Insurance Companies Cyber Crime for Insurance Companies

    Cyber Crime for Insurance Companies

    Overview: Participants are the leadership/management of a fictional insurance organization. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

    Exercise Focus: Crisis Management / Communications / Business Resumption

  • Cyber Crime for Law Firms Cyber Crime for Law Firms

    Cyber Crime for Law Firms

    Overview: Participants are the management team for a fictional law firm. Without warning, the internal network slows to a crawl, outgoing email refuses to send, and PCs start to mysteriously reboot. You are under attack... 

    This scenario targets how management will deal with a cyber-threat. This is NOT an IT/technology-based exercise, though IT can work in parallel to determine how they would handle such a situation and communicate with the leadership. 

    Exercise Focus: Crisis Management / Communications / Business Resumption