Ben Di Marco
[Willis Towers Watson]
Ben is a data privacy, incident response and cyber insurance expert with over 13 years of experience practicing as a solicitor in both Australia and the United States.
He has end-to-end understanding of data incident, technology and cyber insurance risks. Ben has providing triage and strategic advice to over 160 domestic and international organisations following suspected data events and advised financial service, medical, insurance, government and information technology clients on privacy governance.
Tutorial: Conducting Cyber Tabletops – A Practical Guide on How to Develop a Scenario Exercise
A consistent industry theme is that organisations of all shapes and sizes should conduct cyber table top exercises.
By working through breach scenarios organisations can improve their ability to respond to a real cyber threat. Despite proven benefits few Australian organisations have the confidence to perform scenario tabletops.
This often stems from difficulty in understanding how a cyber scenario should be developed, and how effective tabletop exercises are delivered.
There is no one size fits all approach for workshops however common key principles exist. The purpose of this tutorial is to provide audience members with an overview of the steps involved in preparing for and delivering cyber tabletop exercises, and strategies to maximise the benefit of a scenario workshops.
Some of the issues this session will explore include:
a) Preparation that should be undertaken prior to developing a tabletop workshop such as incident response plan development, IR team identification, accountability assessments, threat identification and gaps analysis resilience;
b) Identifying the individuals within the organisation and any third parties that should be involved in the cyber risk scenario;
c) The factual investigations that should be performed to help develop an appropriate cyber risk scenario, including how to identify industry specific risks, incorporating legal and regulatory items, and leveraging available information on breach costs and reputational harm example;
d) How a tabletop should be customised to the organisation’s incident response process and what critical thinking issues the scenario should raise for participants;
e) Options for delivering the workshop scenario including event structure, formulating what information to provide to participants, developing evolving scenario elements and facilitating discussion items; and
f) How to incorporate information and lessons learned from a tabletop to improve the organisation’s resilience and ability to respond to an event.
He has end-to-end understanding of data incident, technology and cyber insurance risks. Ben has providing triage and strategic advice to over 160 domestic and international organisations following suspected data events and advised financial service, medical, insurance, government and information technology clients on privacy governance.
Tutorial: Conducting Cyber Tabletops – A Practical Guide on How to Develop a Scenario Exercise
A consistent industry theme is that organisations of all shapes and sizes should conduct cyber table top exercises.
By working through breach scenarios organisations can improve their ability to respond to a real cyber threat. Despite proven benefits few Australian organisations have the confidence to perform scenario tabletops.
This often stems from difficulty in understanding how a cyber scenario should be developed, and how effective tabletop exercises are delivered.
There is no one size fits all approach for workshops however common key principles exist. The purpose of this tutorial is to provide audience members with an overview of the steps involved in preparing for and delivering cyber tabletop exercises, and strategies to maximise the benefit of a scenario workshops.
Some of the issues this session will explore include:
a) Preparation that should be undertaken prior to developing a tabletop workshop such as incident response plan development, IR team identification, accountability assessments, threat identification and gaps analysis resilience;
b) Identifying the individuals within the organisation and any third parties that should be involved in the cyber risk scenario;
c) The factual investigations that should be performed to help develop an appropriate cyber risk scenario, including how to identify industry specific risks, incorporating legal and regulatory items, and leveraging available information on breach costs and reputational harm example;
d) How a tabletop should be customised to the organisation’s incident response process and what critical thinking issues the scenario should raise for participants;
e) Options for delivering the workshop scenario including event structure, formulating what information to provide to participants, developing evolving scenario elements and facilitating discussion items; and
f) How to incorporate information and lessons learned from a tabletop to improve the organisation’s resilience and ability to respond to an event.