First responders have proven time and time again the valuable help they provide to people in need. Right now, we’re seeing their bravery with the historic hurricanes, fires and floods impacting millions of people. What makes first responders confident in the face of such danger? One word: practice. And this lesson is translating to the private sector in areas you wouldn’t normally expect.

A new type of training for cybersecurity

One area is in cybersecurity, where tabletop exercises have been the norm for the past decade to help teams prepare. These paper-based exercises are kind of like a table read that actors do before they film a movie or TV show. They can be dry, lacking authentic feeling or emotion.

Last year IBM introduced the world to the industry’s first commercial cyber range at IBM X-Force Command in Cambridge, Massachusetts. The facility immerses teams from all walks of a company — security, boards of directors, IT, HR, legal, communications, etc. — into a real-life cyberattack. The experience teaches the importance of leadership in crisis and the critical role of communications during an incident.

The need to practice is acute, with 2 out of 3 security professionals admitting in a recent survey that their organizations aren’t prepared to appropriately respond to a cyberattack. Some recent headline-making data breaches have shown that the response to a breach can often make it worse for the impacted company.

Take command of your security posture: Visit the IBM X-Force Command Center

Practice makes perfect for NBC

NBC’s Today Show was recently given exclusive access to an exercise run for 30 members of the Financial Services Information Sharing and Analysis Center (FS-ISAC). Members experienced a cyberattack on a fictitious bank and were thrown into action over several hours. See how they responded and the lessons learned.

To learn more about IBM X-Force Incident Response and Intelligence Services (IRIS), please visit the X-Force IRIS website.

More from X-Force

Being a good CLR host – Modernizing offensive .NET tradecraft

14 min read - The modern red team is defined by its ability to compromise endpoints and take actions to complete objectives. To achieve the former, many teams implement their own custom command-and-control (C2) or use an open-source option. For the latter, there is a constant stream of post-exploitation tooling being released that takes advantage of various features in Windows, Active Directory and third-party applications. The execution mechanism for this tooling has, for the last several years, relied heavily on executing .NET assemblies in…

Abusing MLOps platforms to compromise ML models and enterprise data lakes

15 min read - For full details on this research, see the X-Force Red whitepaper “Disrupting the Model: Abusing MLOps Platforms to Compromise ML Models and Enterprise Data Lakes”.Machine learning operations (MLOps) platforms are used by enterprises of all sizes to develop, train, deploy and monitor large language models (LLMs) and other foundation models (FMs), as well as the generative AI (gen AI) applications built on top of these models. The rush to leverage AI throughout enterprises has meant that security has been often…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today