Skip to Content
Cybersecurity Tabletop Exercises
book

Cybersecurity Tabletop Exercises

by Robert Lelewski, John Hollenberger
October 2024
Intermediate to advanced content levelIntermediate to advanced
200 pages
5h 16m
English
No Starch Press

Overview

Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organizationâ??s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your teamâ??s ability to prevent and respond to cyberattacks.

The book is divided into two main parts. In Part I: The Tabletop Exercise Process, youâ??ll learn:

  • Why you should perform tabletop exercises and what their organizational benefits are
  • Effective planning and logistics tips, including how to gain executive sponsor support
  • How to develop realistic scenarios, injects, and storyboards
  • Facilitation techniques to ensure active participant engagement
  • Evaluation methods and follow-up activities

The example scenarios in Part II include:

  • Technical tabletops covering phishing campaigns, ransomware attacks, and zero-day vulnerabilities
  • Executive-level exercises that focus on high-impact incidents
  • Cross-functional cases such as physical security breaches, social media compromises, and insider threats

With examples tailored for various roles, youâ??ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether youâ??re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organizationâ??s cyber incident response capabilities and overall security posture.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor
Security in Computing, 6th Edition

Security in Computing, 6th Edition

Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp

Publisher Resources

ISBN: 9781098182489Errata Page