Strategic Simulation Exercises
Analysis of technical and organizational vulnerabilities
Deutor is specialized in customer-specific Strategic Simulation Exercises, so-called Cyber War Games, which are based on real life cyber attacks and are designed to assist our customers to recognize external cyber threats, possible perpetrator motivation and modus operandi as well as to analyze which internal technical and organizational cyber vulnerabilities and risks exist. Based on those findings suitable measures will be defined and implemented to increase cyber security and make your company more cyber resilient.
Our Method
The Strategic Simulation Exercises / Cyber War Games are based on real life scenarios that Deutor supported as crisis managers. We take the real cyber attack and adapt it to your organization to help you analyse how well your organization is prepared to deal with such an attack.
Method
The Strategic Simulation Exercises / Cyber War Games are based on the principles, methods and procedures of the armed forces to handle a crisis and plan operations and has been adapted to the cyber threat environment. This method forces management to analyze the overall problem, the company specific cyber vulnerabilities and cyber risks and the implementation of suitable technical and organizational measures.
Aim
At the end of the seminar you will be able to assess how well your organization is prepared to deal with cyber attacks. You will be able to recognize the technical and organizational cyber vulnerabilities and understand which measures should be implemented in order to limit the damage to your organization and restore business as usual. You will also understand what is needed to develop and implement a cyber security strategy.
Target groups
Small and Medium-sized Enterprises (SMEs), Global Corporations, Government and Authorities, Critical Infrastructure and Armed Forces.
Procedure
The Strategic Simulation Exercises / Cyber War Games are carried out in 1-2 day workshops. The workshops are conducted interactively in small groups of a maximum of 8 people per team. They are not technical exercises, but aim to support the company in understanding the technical and organizational vulnerabilities and their risk to cyber threats and which measures should be implemented.