What are the various types of exercises drills tabletop exercise functional exercise
Why
Provide safe space
Enhance operational resilience
Buys time and mental capacity
When
first takeover after implementation of tools
change in threat level where presentations style sand box / cyber range production systems
HOW
Design
Develop
Conduct
Evaluate
Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.
Keeping employees engaged with regards to Information Security is a challenge. Even though the industry has plenty of innovative and seemingly fun training programs to offer it seems that the desired effects do not materialize. Information Security is a complex topic that overwhelms especially those colleagues in a low-tech environment – making it fun, easy to understand and more transparent by involving the employees themselves is key.