It seems like every day the news reports that another organization has suffered a data breach: Solarwinds, Equifax, Yahoo, to name just a few. No company is immune to this sort of malicious occurrence. Businesses must assume the worst and prepare accordingly. One of the most effective ways for companies to prepare for cyber-attacks is to develop an effective incident response plan (IRP) and to test the IRP and the response team regularly.
Tensyl’s experts have extensive experience performing sophisticated incident response (IR) investigations. We have seen first-hand what works and what can go wrong. We leverage our IR experience to assess companies’ IR readiness. We develop operationally-friendly incident IRPs that detail the process for identifying and escalating security incidents, containment and recovery, and the roles and responsibilities of the response team, among other things. We also perform comprehensive IR preparedness assessments to identify material gaps or significant shortcomings in a client’s IR policy, plan and procedures, and to evaluate the company’s ability to effectively detect and respond to a security incident.
There is perhaps no better way to test an IRP’s efficacy than to run a cyber security threat simulation, or cyber table top. Tensyl leverages its IR experience to build tailored, realistic cyber security threat simulations that identify potential gaps in IRPs as well as test the response team’s readiness. Tensyl’s simulations walk clients through the essential elements of a security incident investigation using multiple attack scenarios to ensure that all key decision-makers have a firm understanding of their respective roles and responsibilities. The ultimate objective of the training is to provide our clients with an opportunity to better familiarize itself with the roles, procedures, and responsibilities of effectively managing an incident response event.