Running your first cybersecurity tabletop exercise (TTX)

Photo credit: Stranger Things

What is a cybersecurity tabletop exercise (TTX)?

No, it’s not Monopoly.

Step 1: Identify your participants

Step 2: Design scenarios

Step 3: Define the objectives

Step 4: Set the rules

Step 5: Conduct the exercise

Step 6: Evaluate the results/follow-up



Be Happy, Be Awesome! We deliver high-quality digital services to citizens and businesses in Singapore 😊

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Team Merlin

Software | Security | Quality enthusiasts doing the right things