Takouba announced today the introduction of a new Cyber Resilience Program.
“With the rising tide of cyber-attacks occurring across the Internet, Takouba wants to offer an affordable program that business owners can use to improve their cyber-resilience” says James Rollins, Managing Partner.
The Cyber Program is based in part on the ISO22301 Business Continuity Management Program standards and National Institute of Standards Technology (NIST) Cybersecurity Framework. “We start by assessing your risks, then analyze your current cyber-security posture” said Rollins, “because it is important to establish a baseline and to understand your company’s most critical data dependencies.” Having a documented and consistent process for assessing your vulnerabilities becomes the foundation for the next steps.
Rollins explained that the problems most companies face are related to difficulty communicating the risks to management in order to get the resources to do something about their vulnerabilities. “CIOs and CISOs don’t have reliable methods or adequate resources to test their response plans. A good test should include executive management, so they can understand how a cyber-attack could affect them and the company.” The Takouba Cyber Resilience Program offers an inexpensive method to test response plans in a realistic, easy-to-understand way, using their new Sand Table Tactical Resilience Game methodology.
The Sand Table Tactical Resilience Game provides a-quickly changing scenario-based exercise platform. “By using the Sand Table game, cyber response teams and leadership can safely test their playbooks, communications and incident response coordination. This consequence based realistic game provides a superior training and exercise method, because it is built on simulated real-life cyber threats and industry vulnerabilities” says Jodie Ryan, a former Microsoft Cyber-security expert. Ryan also explained that this game is an excellent way to practice because, unlike a traditional tabletop exercise these dynamic scenarios force the impacted division’s responders to assess risk, formulate a response and pivot according the unfolding compromise.
Using the game, cyber security responders can identify gaps and vulnerabilities that may not have been spotted in the impact assessment phase. Once these gaps are identified, the CIO or CISO can prioritize resource allocation to risk mitigation. “The first step to fixing any problem is to raise situational awareness” says Rollins, “Without needed emphasis on your cyber-vulnerabilities, it is just a matter of time before your network is penetrated.”
Latest posts by James Rollins (see all)
- Worried About a Cyber Incident? Here’s How to Prepare - October 8, 2017
- Training Pipelines: 7 Ways to get your training investment to stick - February 12, 2017
- Dialing 911: 5 Things You Should Know About Cyber Attacks - January 19, 2017