2025-08-04 –, Florentine E
This talk provides a comprehensive overview of Table Top Exercises (TTX), highlighting their critical role in cybersecurity preparedness. The importance of TTXs is underscored, highlighting their ability to simulate incident response without real-world consequences. This guide emphasizes the importance of crafting challenging scenarios that push teams beyond their comfort zones, preparing them for worst-case scenarios while maintaining clarity and focus. The ultimate goal is to facilitate continuous improvement and ensure organizational resilience through annual TTX iterations.
Tabletop exercises are vital to the success of security within businesses, providing a simulated environment where teams can practice their responses to various scenarios. As someone who has written and conducted several of these exercises, I've observed common challenges that companies face during these sessions. One significant hurdle is the fear of failure; participants often worry about looking bad and are reluctant to embrace mistakes. However, I believe it's important to teach people that failure is not only acceptable but can actually contribute to creating a more secure environment. By learning from errors made during tabletop exercises, teams can strengthen their strategies and improve their overall security posture. Embracing a mindset where failure is seen as a stepping stone to success can transform the way businesses approach security, making them more resilient and prepared for real-world threats.
Madison Rocha is a Sr. Cybersecurity Consultant with a background in developing robust security frameworks and implementing cutting-edge protective measures. With a strategic approach to IT governance with hands-on technical acumen as a Sr. Consultant, she brings a blend of theoretical knowledge and practical expertise to the forefront of cybersecurity challenges. Her technical prowess extends to evaluating and securing environments, working with critical infrastructure, participating in red, blue, and purple teams, facilitating TableTop (TTX) exercises, and creating robust Identity Access Management (IAM) solutions. As she continues to contribute to the field of cybersecurity, she remains committed to expanding her knowledge and skill set, ensuring that she is at the cutting edge of cybersecurity defenses and strategies.