One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1654214
Date de publication 2020-04-14 12:00:00 (vue: 2020-04-14 13:00:56)
Titre Can incident response be fun?
Texte Cyber attacks are unfortunately inevitable. It’s important to security harden your networks as much as possible. But your organization must also be prepared for incident response. Effective incident response involves an awareness of various cyber risks and threats, having a plan to respond to the various ways they manifest, and having a team that can think quick on their feet when they actually occur. Sadly, many of the people in the cybersecurity industry who I speak with regularly tell me that many organizations aren’t ready for cyber incidents. Sometimes it takes a lot of caffeine and willpower for me to do my work. But I never need an excuse to play games. I’ll impulsively play a game on my phone while I’m on the subway. I unwind on my couch at home to play video games to relax. And when friends come to visit, I can’t wait to set up a good old fashioned board game. Games have a natural appeal to human nature. If you’ve heard of the word gamification before, you know that games don’t have to only be for entertainment. New York University’s Adam Penenberg studies gamification (turning learning or doing work into a game). He writes: “Turns out, gamification works great on students. And apparently employees like it just as much. Companies that train large volumes of staff are rushing to use games, in a variety of forms. The goal is the same: turn a boring, repetitive and difficult series of tasks into an enjoyable, interesting activity that gets better results. Games provide intrinsic motivation—that is, people play them because they want to—as opposed to bribing someone with a raise (an extrinsic motivation).” So what if gamification can prepare IT professionals to improve their incident response? Well, cybersecurity people are a bunch of nerds. And everyone knows nerds love tabletop roleplaying games like Dungeons and Dragons. CISO Michael Ball had an epiphany. He decided to turn incident response into a tabletop roleplaying game. His game is called Breach the Keep. I asked him what inspired him to invent the game. “I've done tons of executive training, both as the executive being trained, and as the trainer. Boring scripts, little engagement. No real team building. The CSIRT (computer security incident response team) has to be a team.  Not just a group you pull together in an emergency! They have to know on another's roles, and how to communicate with each other and the corporate stake holders before the chaos of a breach. None of the training I've seen to date engages the executives to develop the camaraderie of a team.” Roleplaying games are all about using your imagination, and they’re often set in a high fantasy setting. Breach the Keep is no exception. As the datasheet describes: “We will take you back in time into the realms of medieval and have a little fun with our version of Dungeons and Dragons. Through multiple scenarios we can help enhance your company’s team building abilities, identify gaps within the team and improve real world incident response time. Although the game is designed to imply information security type scenarios, we are going to use our imaginations and move the entire group back 400 years into the past. Instead of datacenters, we're protecting the castle’s keep.” Ball describes the roles in the game. “The CEO is the King or Queen. The CIO is Commander in Arms. CISO is the Mage or Viseer. HR (human resources department) is Chancellor. Corp Comms is the Town Cryer. Network Admins are Cavalry, and Security Analysts are Knights.” The datasheet explains some of the basics of the game. “Players will be giv
Envoyé Oui
Condensat “i've “players “the “turns “we “we’ve 400 abilities able about acted activity actually adam admins all also although analysts another's apparently appeal are aren’t arms ask asked attack attacks awareness back ball based basics because become before being better board boring both brain breach breaches bribing building bunch but caffeine called camaraderie can can’t castle’s cavalry ceo chain challenges chancellor chaos charge check cio ciso collaborating come comes command commander comms communicate companies company’s computer consulting corp corporate couch cryer csirt current currently cyber cyberattacks cybersecurity data datacenters datasheet date decided decisions department describes describes: designed develop difference difficult doing don’t done dragons dungeons each effective effectively emergency employees engagement engages enhance enjoyable enterprise entertainment entire epiphany every everyone exception excuse executive executives explains extrinsic face familiar fantasy fashioned feet forms friends fun game games gamification gaps get gets given goal going good great group had handle happens harden has have having heard help high him his holders home how human i've i’ll i’m identify imagination imaginations imply important improve impulsively incident incidents industry inevitable information inspired instead instinct intends interested interesting intrinsic invent involves it’s just keep king knights know knows large learning like little looking looks lot love mage make manifest manner many market marketspace medieval message michael mindset minutes more most motivation motivation—that move much multiple must natural nature need nerds network networks never new next none not notes notify number occur official often old once only opposed organization organizations other out overwhelming partners past penenberg people phone plan play players position possible practice prepare prepared private product professionals promote protecting provide providing public pull queen questions quick quickly raise ransomware ready real realms recently regularly relax repetitive resources respond responding response results right risks role roleplaying roles run rushing sadly same: scenarios scripts sector security seen series sessions set setting several should simultaneously some someone sometimes speak staff stake started strategize students studies subway tabletop tactics take takes taking tasks team tell them themselves these they’re think threats through time timely to—as together tons town train trained trainer training turn turning type unfortunately university’s unwind upon use using variety various vendors version video viseer visit volumes wait want ways we're website well what when where who will willpower win wire within word work works world writes: years york you’re you’ve your
Tags Studies
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: