Designing an Exercise to Prepare for a Cyber Attack

By |2022-06-03T20:14:26+00:00June 30th, 2019|1 Comment

Introduction

It seems there isn’t day that goes by without another story of a cyber attack or breach. It has almost become a “breach a day!” Not only is there confidential company or customer information exposure to worry about, these events are expensive on so many levels: Detection of the problem in the first place, recovery of data, the loss of information and disruption to the business, among other things. And, of course, this does not take into account the damage to a company’s reputation and loss of current and future business. The Ponemon Institute found the average annual cost of responding to cyber attacks was $12.7 million, up 96 percent over the previous five years.

Companies are spending millions of dollars to prevent these attacks from occurring, which is a wise and prudent investment. No one, however, is talking about how to deal with the impact of such a breach. We have surveyed our clients, professional colleagues and firms and found no one is planning for the impact.

We have done numerous exercises on the impact of a cyber breach and have found them to be the most effective and rich exercise narratives we have ever used in over thirty years of practice. Do you want to get your executives and incident management team ready for such a cyber attack? Then you need to do a cyber exercise.

What Makes It So Different?

One of the things I often hear continuity professionals say is that they “plan for the worse-case scenario.” Whenever I hear that come out of someone’s mouth, I immediately stop them; this is simply not true. We don’t plan for the worse-case scenario, we plan for what we think will happen, what is called a “routine” emergency. What we plan for may be a really bad situation, but there is not enough time, money or risk appetite to plan for the truly worse-case scenario.

“Routine” Emergency

To be clear, routine emergency does not mean “easy.” A routine emergency can still be difficult and challenging. In this context, “routine” refers to the relative predictability of the situation that permits advanced preparation. This risk is in our risk profile and we likely have been able to take advantage of lessons learned from prior experiences. You are likely to have thought about what to plan for and what is needed, and you have probably trained for them and done exercises for them. Our incident management, crisis communications, business continuity and disaster recovery plans are filled with strategies to manage routine emergencies.

“Crisis” Emergency

A crisis emergency is a much different animal. These types of events are distinguished by significant elements of novelty. This novelty makes the problem much more difficult to diagnosis and then handle. This type of emergency can have the following characteristics:

  • The threats have never been encountered before, therefore there are no plans to manage it.
  • It may be a familiar event, however, it is occurring at unprecedented speed and therefore developing an appropriate response is severely challenging.
  • There may be a confluence of forces, which, while not new individually, in combination pose unique challenges to the response.

The novel nature of a crisis emergency becomes a game-changer. Our plans, processes, training and exercises that may work well in routine emergency situations are frequently grossly inadequate in a crisis emergency, and may even be counterproductive. We realize that we have to start from scratch.

The crisis emergency also requires different capabilities; in other words, the plans and behaviors we use for routine emergencies just won’t work. The first thing we must do is to identify the elements of the novelty, determine what makes this situation so different from others. In a cyber attack or breach, this novelty can often surprise us. We might begin the process thinking it is one thing, and then over time, we realize it turned out to be something quite different. For example, we may think we are dealing with a routine IT problem or outage, and then over time, we see it is something more significant and sinister.

Once we have identified the real problem and understand that our routine plans won’t work, we have to improvise response measures that will be suitable to cope with the unanticipated aspects of the incident. In other words, we are in new territory; this hasn’t been done before. Created out of necessity, these responses may be actions quite different than ever done before. Handling a crisis emergency may feel like you’re building an airplane while flying it at the same time. It’s not pretty, but it may be necessary.

Lastly, in a crisis emergency, we must respond in creative ways and, at the same time, be extremely adaptable as we execute these new and improvised solutions. We have to be on “full alert” at all times, as we don’t know how the situation will change, and we must be prepared to shift or dart at a moment’s notice. All of this makes people quite anxious, and during an exercise, this anxiety often manifests itself in varying degrees of excessively loud voices or hushed voices, frantic activities and nervous laughter.

Six Design Aspects You Must Consider in this Exercise

To manage this very different type of exercise, you need to have six things in place to make it work:

  1. Management Support

Right off the bat, senior management needs to understand that this exercise is likely to produce many learnings and issues that will need to be resolved, and it will present topics that they have never thought about or deeply understood. This could easily make people feel uncomfortable, with quite a few unanswered questions at the end of the experience. As you explore the topic, you will also likely need to provide some cover to the IT and Information Security departments so that it doesn’t become a blame game or a witch hunt.

  1. A Willing IT Department

IT needs to be an active planner in the exercise. You need several excellent IT staff members who will not be players in the exercise to be part of the design process. You need them to help you determine what the cause will be. When you first begin, this will undoubtedly make them uncomfortable, because in the back of their minds, they are going to be fearful of being blamed. You’ll need to reassure them that’s not the goal of the exercise.

The first question you need to ask the IT department is, “Could we be hacked?” The answer will inevitably be “yes.” The next question is, “How could that happen?” The list is long but could include things such as phishing, watering holes, or infected flash drives. You just need to find a likely means, not a deep exploration of the intrusion.  

  1. Two Design Teams

You need two design teams: An IT/Information Security design team, and a standard Exercise Design team. The IT/Info Sec team needs to do a deep dive on the narrative and develop the timeline of issues that happened before the exercise’s scenario date, and then provide a very detailed timeline of what happens during the exercise. Once they have developed the breach timeline, the other design team can begin to develop their injects.

The standard Design Team should include key lines of business, Human Resources, Communications, Facilities, Security and any other key departments. Those team members should take the IT narrative and timeline, and develop their injects, which will tell the story of the IT problems from their perspective. Remember: In an exercise, if you don’t tell the players what’s happening, they don’t know what’s going on and will invent things. The injects are the way we tell them the story.

  1. The Right Exercise Type

There are three styles of exercises that can be used with a cyber narrative: Advanced Tabletop, Functional, or Full Scale. What they have in common is a Simulation Team. These exercises require a Simulation Team to make them work. The teams going through the experience need to have someone to speak to as they work through the problems. If you don’t have a Simulation Team, you will not be able to work through the issues to a deep enough level to gain value from the experience.

  1. Interwoven Narrative and Injects

The narrative for this exercise will have lots of nooks and crannies. It has a certain complexity that can’t be avoided. The story progresses through the injects, and the injects must “dance” with the IT narrative. The exercise players have to analyze the information, work with the Simulators to figure out what’s going on, and then improvise a plan. When they develop that plan, the Simulators have to adapt to the new plan and, in some cases, create injects “on the fly” to make it all work. The narrative and the injects are constantly ebbing and flowing together to tell the entire story.

  1. Make it Public

One of the key aspects of this narrative is the potential damage to the reputation of the company. To damage that reputation, we have to “out” the narrative. We usually do this early on in the exercise by having our “perpetrator” post the story on a social media platform such as Twitter. (NOTE: Of course, we don’t put a real post on Twitter. This is all done via “exercise magic.”) We often have our AV team produce videos in a similar style as a hacker video, such as those done by Anonymous. In exercises we have done, we play such a video for the participants, and watch as their jaws literally drop.

To make it even more interesting, we then create a second video by one of the local news stations, saying they are sending reporters to the company under siege seeking official comments and interviews with executives. Mission accomplished! Company outed! The players then have to deal with the fallout.

Communication Challenges

On first glance, you may not think this exercise presents unique communication challenges. Think again! There are many actions that are likely to occur in such an exercise that will severely challenge communications. In addition to ‘standard’ communications issues of putting out press releases and social media posts addressing the issue in general, bigger problems occur if the decision is made to cut the company’s internet connection. In even more severe cases, the decision may be made to cut the core network. If connectivity is cut, here are some of the communication challenges you might face:

  • If your phone and voicemail system is VOIP-based, you may lose your company phone system, severely limiting communication. 
  • If your employee hotline runs through your voice system, this could be lost.
  • If your company website is hosted in-house, it may go down, meaning your customers, employees, the general public and the media can’t find you. (If it’s hosted by a third party who hasn’t been affected by the breach, you may not have this problem.)
  • If company telephone bridges are running through your phone network, they may not be available.
  • If you bring down the core network, every computer becomes a standalone machine with no access to your company’s records. Your human resource information, employee contact information, vendor lists, or other key phone lists may be inaccessible.

How will you communicate? Once this breach is public and everyone knows, your need to be available, communicating and visually managing the situation is critical. Our clients with third-party or outsourced emergency notification systems (ENS) were ahead of the game. The big plus for them is being able to use their ENS for the following activities:

  • Employee information: Pushing information to employees about the company status, and providing talking points and other key pieces of information.
  • Conference bridges: Using toll-free conference bridges for employee, vendor, senior management, Board of Directors, and other key stakeholder phone calls.
  • Stakeholder groups: Using pre-defined groups that had been created for all of their key stakeholders to push information via phone, text or email.

If you don’t currently use an ENS, this may be one of the key learnings in the exercise. If you have an ENS but only use it for a limited set of contacts (i.e., your employees), you will quickly discover that there is a lot more that it can be used for which makes good business sense. Get the most out of your money by using your ENS for as many things as make sense.

Going Forward

For businesses, the risk of experiencing a data breach is higher than ever with almost half of organizations in North America suffering at least one security incident in the last 12 months. The C-suite and Board members can no longer ignore the drastic impact a data breach has on company reputation. Meanwhile, consumers are demanding more communication and remedies from businesses after a data breach occurs. 

If the future is anything like the past, cyber incidents in the business world are not going away anytime soon. Life will continue to be complicated. Make your next exercise  a cyber exercise. Focus it on the impact of a breach and how your company will deal with it. And based on the probability of a cyber event, you had better get going!

Recommended2 recommendationsPublished in IT Availability & Security

Share This Story, Choose Your Platform!

About the Author:

Regina Phelps is an internationally recognized thought leader and expert in crisis management, pandemic and continuity planning, and exercise design.  She is the founder of EMS Solutions Inc. (EMSS), headquartered in San Francisco, CA. Since 1982, EMSS has provided consultation and speaking services to clients on five continents.

Ms. Phelps is a frequent speaker at international continuity conferences and is consistently rated one of the top-rated speakers in her field. She is known for her approachable and entertaining speaking style and ability to break complex topics into easily digestible and understandable nuggets.

She is the author of four books, all available on Amazon:

Crisis Management: How to Develop a Powerful Program
Cyberbreach: What if your defenses fail? Designing an exercise to map a ready strategy
Emergency Management Exercises: From Response to Recovery
Emergency Management Exercises: From Response to Recovery Instructors Guide.

She can be reached at [email protected] or www.ems-solutionsinc.com.

One Comment

  1. KEVIN DINEEN July 3, 2019 at 5:45 pm

    As per usual Regina, excellent points that will help me and anyone doing TTs in cyber.

Leave A Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.