The Importance of Design Teams in Creating a Targeted Cyber Breach Exercise

By Regina Phelps|2022-05-06T17:59:41+00:00August 15th, 2016|0 Comments

Businesses and organizations defend against unending attempts to steal their computer data or damage their systems. Few, however, have serious plans for how they will respond to the impact of an actual breach. And even fewer stress-test those plans. Exercising a cyber-breach scenario forces real-time decision-making and actions. Creating an exercise with a cyber-incident scenario is infinitely more complicated than creating one with a “normal” emergency scenario, and requires special care in design.

Where to Begin?

Let’s say you are tasked with creating a cyber-breach exercise. You’re probably not quite sure how to go about it. What you need to make this exercise “spot on” is a highly-tailored narrative and highly-specific injects built around a set of pre-defined technology and information security incidents. You can’t do that alone; you need help. And you don’t need just any help, you need the right help. What you need are TWO Design Teams.

Why You Need Two Design Teams

You need two Design Teams because you need two very distinct and different sets of skills. First, you need a Technology Design Team that is very technical, detailed, and deeply in the weeds of the scenario. You should spend a lot of time picking the right narrative and then dissecting it. The Technology Design Team’s main focus should be to identify all the different affected systems and their interdependencies and connection points.

You will also still need a Business Unit Design Team, but the Technology Design Team needs to do their work first, because you can’t create the overall exercise injects until you know the technology issues and failures. Think of it like a Christmas tree – the technology issues, failures, and problems are the trunk and branches; they provide the solid foundation for the story. The business unit injects are the reaction to those issues – like ornaments hanging on the tree. You can’t hang the ornaments without the trunk and branches, and you can’t design the business unit injects until you know the IT failures.

This author’s firm, EMSS, always establishes the technology design first, followed by the business design. We then circle back with the technology team to review the business unit injects to make sure they align with the stated technology issues.

Technology Design Team

For a cyber-based scenario, there are often five to eight members on the Technology Design Team. (Because of their experience in the company, some members can cover multiple topics.) You’ll likely need subject matter experts in the following areas:

•  Information Security                                                •  Database

•  Infrastructure                                                            •  Network Operations Center

•  Application Development & Support                    •  Help Desk

•  Network                                                                      •  Storage

Business Unit Design Team

Your Business Unit Design Team has one primary goal – to develop the exercise injects that play off the cyber-breach story, see Table 1. (As mentioned, the Business Unit Design Team shouldn’t hold meetings until the Technology Design Team has completed its work.) The type of members needed for your Business Unit team will depend on the overall cyber-breach narrative. If you have a physical impact in the story as well as a cyber impact, you will also need to include facilities and security on your Business Unit team.

A top-notch Business Unit Design Team member will have several qualities; they should have:

  • A good basic knowledge of the overall business.
  • At least a year or more with the company in order to know some of the ins and outs of the place.
  • Subject matter expertise in an area you will likely be touching on in the narrative.

A typical Design Team will include members from the following departments:

  • Representatives from all of the key lines of business (to help you develop highly specific business injects).
  • Facilities.
  • Physical Security.
  • Human Resources.
  • Communications.
  • Investor Relations.

Note that the departments listed above are typical of Design Teams. Your organization may benefit from having team members representing a different ‘slice’ of your business.

Phelps-20160907

Table 1, Sample Injects

The “Other” Role for Your Design Team Members to Play

Design Team members usually make great Simulation Team members. Because they have been involved in exercise design and inject creation, they know the exercise intimately and are already a cohesive team. (They can help on the Simulation Team, but would not be players in the exercise because of their knowledge of the injects. The author’s book reviews this in greater detail.  See below for a link to the book.) If you plan to ask them to be Simulators in addition to their design job, in the interest of fair disclosure regarding the time commitment for the project, be sure to include that task when you ask for their participation at the beginning of the process. Besides the time commitment needed as a Business Unit Design Team member (see next section), here is the additional time your Designer-turned-Simulator needs to carve out (times are approximate):

  • Simulation Team orientation: Ninety minutes to two hours (usually occurring a few days before the exercise).
  • Exercise day: However long you have scheduled the exercise.

Design Team Meetings

In our experience, most Design Team meetings last between 90 minutes and two hours. They work equally well when held face-to-face or as a conference call. However, you might wish to do the first meeting face-to-face to make sure everyone is on point. EMSS routinely holds Design Team meetings by conference call, and find them to be a highly efficient and effective use of everyone’s time.

How Many Meetings and How Often to Have Them

For an “average” cyber exercise, EMSS usually holds around four meetings with each team, for a total of eight meetings (four technology, four business). However, for a large Functional or Full-scale exercise, it’s entirely possible to need between six and eight meetings for each team. It all depends on the scenario complexity, the length of the exercise, the sophistication of the team, and the team’s familiarity with the exercise design process itself.

Design Team meetings are usually held every other week. You don’t want to lose the team’s momentum by waiting too long between meetings. Conversely, the team needs time to do their homework (e.g., doing their ‘trench coat’ research or writing injects).

Who Does What?

The Technology Design Team has two major tasks: To develop the cyber-breach narrative, and to develop the cyber-breach injects. The Business Unit team develops the injects that reflect the impact of the technology situation on the business side of the organization. (And, as mentioned before, hopefully, both sets of team members will act as Simulators on the day of the exercise.)

Summary

Both Design Teams are critical to a successful cyber exercise. Selecting the right team members will make your exercise credible, exact, and challenging. It will also engage more people in your program and help to build a culture of awareness and support for your program.

Working with Design Teams is just one aspect of designing a cyber-breach exercise. Regina Phelps has just authored Cyber Breach: What if your defenses fail? Designing an exercise to map a ready strategy. This book shows Business Continuity Planners, Crisis Managers, and their IT counterparts how to stage a cyber-incident exercise that will test preparedness, surface unconsidered circumstances, and sharpen the responsiveness of everyone from top executives to line technologists.

The book focuses on Advanced Tabletop, Functional, and Full-scale exercises, and covers everything from broad strategies to minute-to-minute decision-making. It also provides very specific, step-by-step instructions – starting from the earliest planning to after-action reports. Find it on Amazon at http://tinyurl.com/j6skbh8.

Regina Phelps can be reached at: [email protected] and
www.ems-solutionsinc.com
.

Recommend0 recommendationsPublished in Enterprise Resilience

Share This Story, Choose Your Platform!

About the Author: Regina Phelps

Regina Phelps is an internationally recognized thought leader and expert in crisis management, pandemic and continuity planning, and exercise design.  She is the founder of EMS Solutions Inc. (EMSS), headquartered in San Francisco, CA. Since 1982, EMSS has provided consultation and speaking services to clients on five continents.

Ms. Phelps is a frequent speaker at international continuity conferences and is consistently rated one of the top-rated speakers in her field. She is known for her approachable and entertaining speaking style and ability to break complex topics into easily digestible and understandable nuggets.

She is the author of four books, all available on Amazon:

Crisis Management: How to Develop a Powerful Program
Cyberbreach: What if your defenses fail? Designing an exercise to map a ready strategy
Emergency Management Exercises: From Response to Recovery
Emergency Management Exercises: From Response to Recovery Instructors Guide.

She can be reached at [email protected] or www.ems-solutionsinc.com.

Leave A Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.