{"id":11325,"date":"2023-07-03T17:00:00","date_gmt":"2023-07-03T11:30:00","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?p=11325"},"modified":"2023-06-20T18:58:30","modified_gmt":"2023-06-20T13:28:30","slug":"largest-security-london","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/largest-security-london\/","title":{"rendered":"What hit during the largest tabletop security exercise in London?"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><em>On May 9, 2023, the Wisdom of Crowds organization hosted the largest in-person cyber attack tabletop security exercise in London. 100+ people from government, healthcare, and financial services took part in the activity.<\/em><\/p>\n\n\n\n<p class=\"has-medium-font-size\">The exercise simulated a sophisticated cyber attack on a large financial institution. To access the <strong><a href=\"https:\/\/reconcybersecurity.com\/advanced-networking-course.html\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">institution&#8217;s networks<\/mark><\/a><\/strong>, the attackers employed some strategies, such as phishing, malware, and social engineering. Once they had access, they were able to steal sensitive data and disrupt operations.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The participants in the exercise were divided into teams and tasked with responding to the attack. They had to work together to identify the attack, contain the damage, and recover from the incident.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The exercise was a valuable learning experience for the participants. They learned knowledge about the most recent cyber threats, how to defend themselves against an assault, and how to enhance their <strong><a href=\"https:\/\/reconcybersecurity.com\/blogs\/it-knowledge\/cyber-incident-response-plan-a-comprehensive-guide-recon-cyber-security-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">incident response<\/mark><\/a><\/strong> procedures.<\/p>\n\n\n\n<h2 id=\"here-are-some-of-the-key-takeaways-from-the-exercise\" class=\"wp-block-heading has-large-font-size\">Here are some of the key takeaways from the exercise:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">Cyber attacks are becoming increasingly sophisticated.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">A set-out&nbsp;incident response plan must be in place.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Communication and collaboration are essential during an incident.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Training and awareness are key to preventing <strong><a href=\"https:\/\/reconcybersecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">cyber security<\/mark><\/a><\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\">The Wisdom of Crowds organization is planning to host more cyber attack tabletop exercises in the future. These tests are an effective technique to aid organizations&nbsp;in being ready for and responding to cyber-attacks.<\/p>\n\n\n\n<h2 id=\"introduction\" class=\"wp-block-heading has-large-font-size\">Introduction<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/06\/recon-cyber-security.webp\" alt=\"What hit during the largest tabletop security exercise in London?\" class=\"wp-image-11328\" srcset=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/06\/recon-cyber-security.webp 1000w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/06\/recon-cyber-security-300x200.webp 300w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/06\/recon-cyber-security-768x512.webp 768w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/06\/recon-cyber-security-380x253.webp 380w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/06\/recon-cyber-security-800x534.webp 800w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\">Businesses and organizations&nbsp;of all sizes face an increasing threat from cyberattacks. The <strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">WannaCry virus<\/mark><\/a><\/strong> and the Equifax data breach are two of the most notable cyberattacks in recent years.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">These assaults have made the value of cyber security more apparent. To protect their information and operations, businesses must be ready to respond to cyberattacks.<\/p>\n\n\n\n<h2 id=\"the-exercise-of-security\" class=\"wp-block-heading has-large-font-size\">The Exercise of Security<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The Wisdom of Crowds cyber attack tabletop exercise was a valuable opportunity for organizations to learn about cyber threats and how to respond to them. The exercise simulated a sophisticated cyber attack on a large financial institution. The participants were tasked with responding to the attack and containing the damage.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The exercise was a great success. The audience members gained a lot of knowledge about online threats and defensive measures. They also gained valuable experience in working together to respond to a cyber attack.<\/p>\n\n\n\n<h2 id=\"key-takeaways\" class=\"wp-block-heading has-large-font-size\">Key Takeaways<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-large-font-size\">There were several key takeaways from the exercise. These include:<\/p>\n<\/blockquote>\n\n\n\n<ul class=\"has-medium-font-size wp-block-list\">\n<li>Cyber attacks are becoming increasingly sophisticated.<\/li>\n\n\n\n<li>A properly set out incident response plan must be in place.<\/li>\n\n\n\n<li>Communication and collaboration are essential during an incident.<\/li>\n\n\n\n<li>Training and awareness are key to preventing cyber attacks.<\/li>\n<\/ul>\n\n\n\n<h2 id=\"conclusion\" class=\"wp-block-heading has-large-font-size\">Conclusion<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The Wisdom of Crowds cyber attack tabletop exercise was a valuable learning experience for the participants. They got information on the most recent <strong><a href=\"https:\/\/reconcybersecurity.com\/blogs\/it-knowledge\/what-are-the-social-media-compliance-risks-and-cybersecurity-threats-recon-cyber-security-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">cyber threats<\/mark><\/a><\/strong>, how to defend themselves against an assault, and how to enhance their incident response strategies.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The Wisdom of Crowds organization is planning to host more cyber attack tabletop exercises in the future. These training sessions are a useful tool for assisting businesses in preparing for and responding to cyber-attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"On May 9, 2023, the Wisdom of Crowds organization hosted the largest in-person cyber attack tabletop security exercise&hellip;\n","protected":false},"author":1,"featured_media":11327,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1059,241,1083,100,1065],"tags":[1343,1357,240,1361,1358,1352,1353,1342,1362,1359,1345,1355,1354,398,1363,1346,399,1347,1344,1364,1015,1348,1360,1350,1341,1349,446,601,1351,768,1356,1339,1340],"class_list":{"0":"post-11325","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security-news","8":"category-it-knowledge","9":"category-latest-news","10":"category-top-5-top-10","11":"category-top-5-and-top-10","12":"tag-catching-the-cybercriminal","13":"tag-cyber","14":"tag-cyber-security","15":"tag-cyber-security-analyst","16":"tag-cyber-security-analyst-day-in-the-life","17":"tag-cyber-security-career","18":"tag-cyber-security-course","19":"tag-cyber-security-examples","20":"tag-cyber-security-full-course","21":"tag-cyber-security-jobs","22":"tag-cyber-security-training","23":"tag-cyber-security-training-for-beginners","24":"tag-cyber-security-tutorial","25":"tag-data-security","26":"tag-getting-into-cyber-security","27":"tag-how-to-scale-security","28":"tag-information-security","29":"tag-information-security-analyst","30":"tag-information-security-training","31":"tag-is-cyber-security-a-good-career-option","32":"tag-it-security","33":"tag-journal-of-national-security-law-and-policy","34":"tag-learn-cyber-security","35":"tag-london-terrorist-attack-2005-documentary","36":"tag-most-dangerous-airports-in-the-world","37":"tag-national-security","38":"tag-network-security","39":"tag-security","40":"tag-security-culture","41":"tag-security-hacker","42":"tag-what-is-cyber-security","43":"tag-whats-happening-in-cybersecurity","44":"tag-women-in-cyber-security"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=11325"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11325\/revisions"}],"predecessor-version":[{"id":11330,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11325\/revisions\/11330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/11327"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=11325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=11325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=11325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}