Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Moving to a State of Resiliency: Why War Games Are the Key

By Brian Kelly
rackspace-wargames2

Conducting regular war games or tabletop exercises with unpredictable circumstances helps to test employees’ responses and build their muscle memory of how to respond to pressure during an actual incident. Image courtesy of Rackspace

February 7, 2019

Resiliency, here defined as the ability to deliver under pressure, is essential to any successful cybersecurity program. Almost every security article or analyst study today echoes this thought. As we’ve been saying for a while, “it’s not a matter of if, but when a company gets attacked.” And so, with that as a baseline, the goal is to coordinate an effective response plan that (ideally) deflects the attack and minimizes the damage done by the bad guys.

But you can’t simply learn resiliency; there isn’t a book or set of checkmarks you can apply to a list that means you are resilient. Instead, it’s real-world training like War Gaming that delivers the closest “I’ve been there” experience and creates the muscle memory needed to respond effectively when an incident – and all the fear, confusion and paralysis it can bring – occurs.

 

The Effectiveness of War Gaming is Based in Learning and Behavioral Science

Have you heard this before?

People generally remember:

  • 10% of what they read
  • 20% of what they hear
  • 30% of what they see
  • 50% of what they see and hear

Often misrepresented as Edgar Dale’s “Cone of Learning,” the numbers themselves originated in 1967 when a Mobile oil company employee published a non-scholarly article assigning numerical value to Dale’s original “Cone of Experience,” which, itself, was intended to be used as an intuitive model of the concreteness of various kinds of audio-visual media.

Despite originally being a model for the concreteness of various kinds of audiovisual media, the, the order intuitively makes sense – as we engage more of our senses, retention increases.

And it’s something that HR and learning coordinators across enterprises large and small have latched onto – if we want employees to understand policies and procedures, we need to do more than hand them a book. 

In order to achieve the highest concreteness or “stickiness” – Dale’s model suggests we “simulate, model or experience a lesson” or “Do the Real Thing” (for what it’s worth, 90% of that should stick). For cybersecurity, this means simulating a real incident and progressing through the situation to its natural conclusion – also known as War Gaming.

What’s interesting, then, is that according to a McKinsey study, a scant 3% of digital business practices have conducted cyberwar games to help ensure they are ready to respond to a cyberattack (“Doing the Real Thing”).

Instead what we’ve seen are businesses severely impacted by mismanagement of the response element of handling a cyber breach.

Could Yahoo have merited an additional $350M from Verizon if they had an incident response (IR) plan in place and hadn’t taken years to reveal all of its 3 billion user accounts were exposed?

Could Equifax have avoided sending to people to a phishing site – fortunately a white hat site intended to test the company’s security response – if it had enacted a wargames framework?

The obvious answer is that we’ll never know. But at Rackspace, we adhere to the adage that those who don’t learn from history are doomed to repeat it. As our Director of Security Operations Christina Galligan puts it: “I like to see how our CSOC (customer security operations center) manager, how our PR team will respond when they’ve been up for 36 hours handling a crisis.”

Our approach to war gaming stems from our perspective on the authenticity of training. As mentioned above, more and more organizations have made significant strides in looking to engage all the senses of an employee undergoing training; but, at the same time, what they’ve not come to grips with is that while this might increase rote motor – or even brain – function, these trainings are happening in a controlled environment with limited outcomes.

Consider this article from the ACRL (Association of College & Research Libraries) that notes: it’s vital to move from learning styles (like the pyramid above) to thinking about teaching modes. “The different modes (visual, auditory, kinesthetic, etc.) need to change as your subject matter does. If you are teaching someone how to drive a car, we really, really hope you are giving your student a kinesthetic experience and not simply verbally explaining how to drive.”

The same is absolutely true in the world of cybersecurity. The chaos of reality is, in a word, real. No plan survives contact with the enemy. So simply performing a training where there are 3 neat, clean options or outcomes isn’t going to get the job done. In the same way that no one will really know how to drive a car until they’ve sat behind the wheel, started the car, applied the brake and moved in reverse or forward, a CSOC manager isn’t going to know how to truly handle incident response until they’ve been put through the paces.

“When the balloon goes up,” if organizations haven’t prepared, all manner of chaos can break loose, especially during the first 24 hours after a breach. It’s during this period that people aren’t always thinking straight and things can happen that can lead to litigation. You must try to prepare for every eventuality, so when you’re reacting, it’s like a drill, it’s muscle memory, as opposed to an emotional response, which is what happens most of the time.

And it’s muscle memory that must be built across the entire organization, not just in the security organization. To risk using a cliché, but an apt one, an organization is only as strong as its weakest link. What happens if the cyber incident response team has been through the training, but the legal team doesn’t have their processes in place or the communications team doesn’t have a buttoned-up plan for effectively communicating the right information at the right time?

Additionally, when you have an adversary in your environment, you don’t know if email or other means of communication are also compromised, so it’s important that – from top to bottom – each employee understands how to handle the stress.

So, given all this, what does a War Game program look like? What are the goals and how can organizations begin to enact such approaches?

From inception of our security practice, we have developed three main goals or objectives that we continuously work towards:

  1. Operational maturity
  2. Operation effectiveness
  3. Operational resiliency

 

  1. Operational Maturity – the nexus of people, process and technology that forms the backbone your security operations.

 

We measure operational maturity by;

  • Evaluating the team we’ve put in place – what certifications they possess, what education and skills they’ve been gaining;
  • Measuring the processes we have in place – how defined or automated they are; and
  • Quantifying the technology we leverage – what capabilities it possesses and what benefits it drives. 

 

This gives us the foundation on which we build our overall security.

 

  1. Operational Effectiveness – the ability to deliver the potential that exists within our operational maturity.

 

For operational effectiveness, we look at how we pull everything together to deliver the operation. Here we examine things like how many investigations can we perform a week, how accurately are we able to triage those investigations, how quickly can we shut down an attack when we find one.

This helps us to establish our capabilities moving forward building a more realistic picture of what our organization can truly accomplish.

 

  1. Operational Resiliency – the ability to deliver under pressure.

 

Operational resiliency is the toughest to measure and quantify and is precisely why organizations need to enact simulation training like a War Gaming type of program. To revisit the car analogy above, resiliency is not just driving the car, but driving it during 5 p.m. rush hour traffic in extreme weather conditions like rain, sleet or snow.

Measuring resiliency involves quantifying how an organization can come together to deliver effectively while under extreme duress. Or, how does a business execute a unified incident response plan when an “Armageddon” scenario is playing out?

Resiliency is also an important topic industry-wide as thought-leaders like Bank of America’s Chief Security Scientist Sounil Yu posit that the 2020s will be the “Age or Recovery (or Resiliency).” In the same way that systems and functions with more resilient architectures and designs that expect failure (containers, immutable infrastructure, serverless architectures), so should our organizational models and processes expect failure and plan for how to recover – and how to recover gracefully.

A War Games program can be defined in three key phases to help achieve the goal of operational resiliency. What’s also important is that these three phases are “escalating,” and by that we mean that each phase builds atop the other.

 

Phase 1: Extended Tabletop

Overview: In Phase 1, we tabletop a hypothetical breach that poses risk to the enterprise (both security organization and the business writ large).

Stakeholders: the key stakeholders are a set of cross-functional leaders from the CSOC, ISOC (internal security operations center), Legal, PR, Engine Room and Customer Experience.

Validation Objective: In Phase 1, we look to identify and assess communication process documentation for coordination between business stakeholders (like the CSOC and legal or ISOC and PR) to respond to the threat.

 

Phase 2: Collaborative Hands-On Exercise

Overview: Moving to Phase 2, we utilize a “red-team”, or an independent team, to step through attack scenarios, broken down by phases of the attack lifecycle, targeting the enterprise.

Stakeholders: The stakeholders are similar to Phase 1 – CSOC, ISOC, Legal, PR, Engine Room, Customer Experience – but we also add in the IMOC (incident management operations center).

Validation Objective: Here we start evaluating the actual “gaming” portions of War Games as we assess a live-practice of the documented processes between business stakeholders as they work to respond to the threat.

 

Phase 3: Integrated Sustained Global Simulation

Overview: The culmination of the escalating activities, in Phase 3, we again leverage a red-team, but this time to simulate a pervasive cyber-attack with global business impact.

Stakeholders: Again, the stakeholders are similar to Phases 1 & 2, but also building in scope. Here we add in the global SOC and global legal teams to the existing group of CSOC, ISOC, Legal, PR, Engine Room, Customer Experience and IMOC teams.

Validation Objective: In Phase 3, we assess Rackspace’s adoption of learning from previous exercises to respond, in real-time, to a simulated cyber-attack on the network.

Throughout all stages, we engage in one core business value – full transparency. Mistakes will be made – in fact we want them made here, so they don’t happen in real life – and when they are, we are open about them and address them in an up-front and honest manner.

Then we aggregate these results which give us the ability to compare year over year to see how we’re doing, where we’re weak and where we can improve.

We believe that the principles behind models like a “cone of learning” – even if the numbers are debating – are important and, importantly, necessary for achieving operational resiliency.

Ultimately our goal is to deliver trust and confidence in the cloud. And when you achieve demonstrable resiliency, you can show your customers just that.

 

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

 

KEYWORDS: cybersecurity awareness security resiliency security risk management tabletop exercises

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kelly brian
Brian Kelly is Chief Security Officer at Rackspace, responsible for protecting the company and its customers from the constantly-evolving risks and threats that exist in the IT world, as well as focusing on the physical security of Rackspace facilities. He has more than 35 years of experience, beginning in the United States Air Force, where he rose to the rank of Lieutenant Colonel.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • enterprise wide cybersecurity training

    The first line of defense: Why employees are the key to stronger cybersecurity

    See More
  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • cyber-security-freepik-(80327).jpg

    We are at war; a cyber war

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!