- Despite pace of the threat landscape, over a third of organizations leave a year or more between cyber crisis simulations and 42% don’t have regular cross-team incident planning
- Crisis exercises are confined to technical teams with 59% missing a member of the C-suite, 80% run without communications function and 87% neglecting customer teams
- Only 2% of organizations have run incident response scenarios related to pandemic response
Boston, MA and Bristol, England (August 12, 2020) – Today, a stark disconnect exists between the inadequacy of crisis exercising and the desire to build an effective cyber crisis response function, according to a new Osterman Research study published in association with Immersive Labs. The report, which surveyed senior security leaders at 402 UK and US-based organizations, found that nearly 40% of respondents were not confident that their teams would be able to handle a data breach if one happened that week.
Looking at the evolution of ransomware alone, the number of ransomware detections in business environments rose by 365% between Q2 2018 and Q2 2019, and global organizations have seen a 148% spike in ransomware attacks amid COVID-19. Meanwhile, more than a third of organizations surveyed say they space their tabletop exercises a year - sometimes two - apart, with most (65%) consisting of reviewing PowerPoint slides. In fact, slide-based sessions are nearly 20 times more common than practicing simulations and most (64%) ran three or fewer scenarios during their last exercise.
“If you did your ransomware training in January, you’re likely five ransomware techniques behind the curve now,” said James Hadley, CEO of Immersive Labs. “With three quarters of organizations agreeing that business continuity was at the forefront of their minds, it is time to close the gap between attackers and defenders and shake up the outdated status quo. This requires faster, shorter crisis drills run with the people you will be standing shoulder to shoulder with when the worst happens. Crisis exercises must be made more contemporary.”
Additional key takeaways from the research report are highlighted below, spotlighting the need for more –and modernized – cyber training across organizations, not just on the security team:
- Over reliance on plans contributes to low Incident Response (IR) confidence: Despite organizations’ low confidence in their IR preparedness, the majority (61%) of respondents think having an IR plan is the single most effective way to prepare for a security incident. In fact, twice the amount of respondents thought an IR plan was more effective than regular table-top crisis exercising. When they do perform crisis exercises, nearly 40% of all senior security leaders surveyed said the last exercise generated no action from the business.
- Only a fraction of people who will be involved in a real crisis are present in training: A quarter of organizations surveyed ran crisis exercises without senior cybersecurity leadership in attendance, and only 20% of exercises involved communications team members, although the survey showed impact on brand is more important in security leaders’ minds when running crisis exercises at 47%, than share price (24%) or liquidity (27%). Nearly half of security leaders said their organizations do not have a cross disciplinary cyber crisis group, of those who do, only 17% met monthly.
- The pandemic exacerbates challenges with the human factor: 20% of respondents said they find it impossible to effectively involve people in crisis response remotely from other geographies. Add to that, the human element of the cyber equation is being overlooked by crisis response exercises with only 15% saying they are focused on stress testing human cyber readiness.
- Technology investments can’t save an organization alone, it’s time to focus on people: Nearly 60% of respondents think the best way to prepare for a crisis incident is to buy more technology, and more are interested in covering themselves legally (38%) than running effective tabletop exercises and fire drills to train their teams (32%).
“Dusting off the three-ring binder crisis plan does not cut it today,” added Hadley. “In the first 30 minutes of a crisis, it is highly unlikely you’re thinking of your plan. It’s the real-life, crisis simulation training that prepares organizations to effectively respond to security incidents. Micro-drills, or very focused exercises, designed to address particular risks must make their way into the mix. Much like exercising to stay fit, this needs to happen with regularity in dynamic environments, and involve all the right people, in order to keep current and be effective.”
Immersive Labs is addressing this need for more hands-on, repeatable crisis training with the release of its Cyber Crisis Simulator that allows people to continually test their organization’s reactions to the latest real-world attacks and is designed to be relevant to everyone from legal and communications teams, to cybersecurity specialists. With the Cyber Crisis Simulator, this is delivered through a browser, allowing a resource for consistently improving and measuring cyber awareness.
About Immersive Labs
Immersive Labs is empowering organizations to equip, exercise, and evidence human cyber capabilities. We provide metrics that give security leaders insight into human cyber skills and readiness levels across their organization and improve these through dynamic labs and crisis scenarios that track the threat landscape. Immersive Labs is backed by Goldman Sachs and Summit Partners and our customers include some of the largest companies in financial services, healthcare, and Government, amongst others. For more information on Immersive Labs’ offering, please visit www.immersivelabs.com.
12 August 2020
During July 2020, Osterman Research surveyed 402 cybersecurity professionals familiar with the tabletop exercises conducted within their organizations. Discover what they learned by downloading the full report.
Latest Blog posts
Kaseya supply chain attack: Prepare to respond with the Cyber Crisis Simulator
27 July 2021
Disclosure Dilemmas: Vulnerable Stalkerware
19 July 2021
When Less Isn’t More: A Deep Dive into Exploiting the Less.js RCE
15 July 2021
Patch Newsday – 13 July 2021
14 July 2021
Stalkerware 101: Everything you need to know
13 July 2021
An investment into the cyber skilled workforce of the future
11 June 2021