Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Deloitte Brings Cyber War Games to the Enterprise

Deloitte’s Cyber Risk Services group has launched new “cyber war-gaming and simulation services” that aim to unite those tasked with managing enterprise-wide responses to cyber-attacks.

Deloitte’s Cyber Risk Services group has launched new “cyber war-gaming and simulation services” that aim to unite those tasked with managing enterprise-wide responses to cyber-attacks.

According to Deloitte, its cyber threat war-gaming approach relies on thinking from the military and academia and incorporates lessons learned from war-game simulations conducted for multi-national companies, government entities, regulatory bodies and industry groups.

Deloitte Logo

Deloitte co-authored the “After Action” report (PDF) for Quantum Dawn 2, a simulated systemic cyber attack on the U.S. financial system back in June 2013. More than 500 individuals and over 40 financial institutions participated in the excercise, which simulated a situation in which rogue code initiated a flood of erroneous trades and market oscillations that could lead to shutting down the market.

According to Deloitte, while many organizations conduct technical rehearsals of their incident response plans, that alone may not be enough.

Cyber War Rooms

Deloitte’s says its cyber threat war-gaming services go further than most incident response rehearsals and involve CEOs, CFOs, risk officers, talent officers, legal counsel, and corporate communications teams, as well as technical responders.

“Deloitte’s approach raises understanding and awareness of cyber threats among this wide range of responders, many of whom have typically had little exposure to IT security functions,” the company said.

Deloitte explained that its war-gaming services include a range of pre-packaged exercises and an inventory of threat scenarios and action components that can be customized to each organization’s risk profile.

“Business leaders are coming to accept that even with the best security defenses in place, cyber incidents will occur,” said Ed Powers, national managing principal of Deloitte’s Cyber Risk Services. “Although a well-constructed incident response manual is necessary, this alone does not create the reflexive judgment capability that organizations may need if a security incident becomes a true business crisis. War-gaming trains diverse teams of responders to act rapidly to reduce the business disruption and costs often associated with cyber incidents, as well as to minimize brand and reputation damage.”

Advertisement. Scroll to continue reading.

“When a cyber attack threatens critical operations,” said Mary Galligan, a director in Deloitte’s Cyber Risk Services, “business leaders may need to make quick decisions to off-line core systems or applications. Executives may need to guide communications with media, customers, investors and regulators. Collaboration with law enforcement and industry peers may also be essential in limiting the exposure of critical infrastructure.” Galligan was formerly the FBI Special Agent in Charge of Cyber and Special Operations for the FBI’s New York office.

“Resilience,” notes Emily Mossburg, principal in charge of resilient services for Deloitte, “doesn’t start when an incident occurs. Preparedness for cyber attacks is a multi-layered challenge. It includes the design of infrastructure and applications, the building of necessary support relationships, and a broad, ongoing program to build a cyber-aware culture throughout the organization.”

Related: Cyber War Rooms: Why IT Needs New Expertise To Combat Today’s Cyberattacks

Related: BreakingPoint Provides War Game Training Using its Network-Crushing Device

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.