Access "Tabletop exercises sharpen security and business continuity"
This article is part of the April 2009 issue of Real-world solutions for data loss prevention
If you're an NFL fan in April, you're well familiar with mock drafts. These pretend exercises portend to make a best guess at whom your favorite football franchise will select on Draft Day. Granted, while teams may be worth hundreds of millions of dollars, the NFL isn't playing the same high-stakes game as the federal and state governments. So when a state such as Delaware calls all hands on deck for a mock exercise simulating a coordinated attack on information systems and communications, there's more at stake than who will be taking snaps for the next 10 seasons. Lives, critical infrastructure and national security are on the line. Delaware's Dept. of Technology and Information (DTI) had conducted tabletop incident response exercises since 2005 to great results. Year after year, new insight was gained into technology and processes that weren't up to speed or needed a tweak. But the tabletop format was losing steam and organizers feared what had long been an effective evaluation tool would lose its value. IT people in particular aren't engaged for long ... Access >>>
Premium Content for Free.
Tabletop exercises sharpen security and business continuity
Delaware's Dept. of Technology and Information conducts annual incident response exercises that test the readiness of state agencies to respond to real attacks. Learn how simulated cyberattacks and incident response exercises help organizations prevent future attacks and maintain business continuity.
Data loss prevention benefits in the real world
by Rich Mogull
DLP promises strong data protection via content inspection and security monitoring, but real-world implementations can be complex and expensive; these eight real-world lessons help you use DLP to its fullest.
- Tabletop exercises sharpen security and business continuity
Tying log management and identity management shortens incident response
Tying log management to user identity shortens incident response and forensics investigation cycles. Learn how compliance has mandated that organizations determine not only when incidents occurred, but who is responsible for unauthorized access.
- Tying log management and identity management shortens incident response
Sell the business on virtualization security
Executive management sees virtualization as the cure-all, but CISOs need to ensure it is done securely. Learn how virtualization can help you position security as a business enabler.
SaaS security risks must be addressed
Realize quickly that software as a service and cloud computing are the future computing infrastructures IT must secure.
Web browsers remain vulnerable to user mistakes
Hackers continue to bore holes in Web browsers, exploiting users with social engineering tricks to gain unauthorized access to systems and data.
- Sell the business on virtualization security
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...