Strategic Cybersecurity Exercise Methodology

Our Strategic Cybersecurity Exercise Methodology utilizes a Work Package Approach that covers 7 Key Topics in order to successfully prepare and conduct a strategic cybersecurity exercise.

The Work Packages serve as milestones of the lifecycle of an Exercise from start to finish, whilst the Key Topics provide a structure for critical components in preparing an Exercise:

  • Key Topic 1: Identification of Needs and Limitations
  • Key Topic 2: Objectives of the Exercise
  • Key Topic 3: Assessment and Benchmarking Methodology
  • Key Topic 4: Customization Requirements
  • Key Topic 5: Target Audience
  • Key Topic 6: Threat Vectors
  • Key Topic 7: Working Groups

Our Strategic Cybersecurity Exercise Methodology takes into account 7 primary Key Topics in order to successfully prepare and conduct a strategic cybersecurity exercise.

The Work Package Approach

Work Package 1: Preparation

Work Package 1 deals with preparatory activities of the exercise, including coverage of all 7 key topics and creation of the training materials.

Work Package 2: Conduct

Work Package 2 deals with the set-up and conduct of the exercise event including moderation and facilitation, usage of software tools and data collection.

Work Package 3: Analysis

Work Package 3 deals with after-action activities of the exercise, primarily focused on the dissemination of data, identification of key outcomes and lessons learned as well as creation of the exercise report.

Key Topics

The goal of the Key Topics is to dissect the entirety of the exercise into tangible and actionable pillars that provide the baseline input for exercise preparations. As the exercise scenario is designed as bespoke, certain particularities related to the context and content need to be clarified in order to deliver the most applicable training materials

Contact Us for Demo

Talk to our experts to find the best training solution and content for your cybersecurity and compliance needs from our arsenal.

Contact Us for Demo

Talk to our experts to find the best training solution and content for your cybersecurity and compliance needs from our arsenal.