rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781718503823

Cybersecurity Tabletop Exercises From Planning to Execution

by ;
  • ISBN13:

    9781718503823

  • ISBN10:

    1718503822

  • Format: Paperback
  • Copyright: 2024-10-29
  • Publisher: No Starch Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99 Save up to $11.55
  • Rent Book $48.44
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Cybersecurity Tabletop Exercises From Planning to Execution [ISBN: 9781718503823] for the semester, quarter, and short term or search our site for other textbooks by Lelewski, Robert; Hollenberger, John. Renting a textbook can save you up to 90% from the cost of buying.

Summary

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks.

The book is divided into two main parts. In Part I: The Tabletop Exercise Process, you’ll learn:
  • Why you should perform tabletop exercises and what their organizational benefits are 
  • Effective planning and logistics tips, including how to gain executive sponsor support
  • How to develop realistic scenarios, injects, and storyboards
  • Facilitation techniques to ensure active participant engagement
  • Evaluation methods and follow-up activities

The example scenarios in Part II include:
  • Technical tabletops covering phishing campaigns, ransomware attacks, and zero-day vulnerabilities
  • Executive-level exercises that focus on high-impact incidents
  • Cross-functional cases such as physical security breaches, social media compromises, and insider threats

With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture.

Author Biography

Robert Lelewski has more than 20 years of experience in IT, cybersecurity, incident response, and risk management. He started out as a computer forensic consultant before joining IBM's global incident response team. Later, he pivoted to helping organizations prepare for a cybersecurity event as the Director of Proactive Incident Response with Dell Secureworks. Currently, he is the VP of Cyber Security Strategy at Zurich Insurance’s Global Ventures. Over his career, he has conducted hundreds of tabletop exercises, and has been a consultant to organizations ranking from small regional banks to Fortune 50 companies across the globe. In addition, Robert holds multiple degrees and numerous industry certifications, including CISSP-ISSMP, CISA, CISM, CRISC, CIPM, CDPSE, and GCIH.

John Hollenberger is a seasoned cybersecurity consultant with over 16 years of experience in web and host-based vulnerability assessments, incident response, digital forensics, PCI compliance, and Data Loss Prevention. As a Senior Security Consultant of Proactive Services, he develops tabletop exercises, reviews and creates incident response plans, and conducts security assessments for a wide range of organizations. John holds degrees and certifications including a BA, CISSP, CISA, CISM, CRISC, GCIH, GWAPT, and Security+.

Table of Contents

Acknowledgments
Introduction

Part I: The Tabletop Exercise Process
Chapter 1: Why Perform Tabletop Exercises?
Chapter 2: Planning and Logistics
Chapter 3: The Development Process
Chapter 4: Facilitating the Exercise
Chapter 5: Evaluation and Next Steps

Part II: Example Scenarios
Chapter 6: Engaging a Technical Audience
Chapter 7: Engaging an Executive Audience
Chapter 8: Engaging the Business

Appendix: Reporting Templates
Index

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program