Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

Incident Response: Why a Tabletop Exercise Is Essential

Attorney Ronald Raether on Building a Cybersecurity Culture
Ronald Raether, partner, Troutman Sanders

Raether will be a featured speaker at ISMG's Fraud and Breach Summit in Chicago and Seattle. Get more details on his session, as well as other speakers at the summits in Chicago May 14th 2019 and Seattle June 4th 2019

See Also: Are You APT-Ready? The Role of Breach and Attack Simulation

Tabletop exercises are a critical way to make sure an organization's incident response plan is effective and everyone knows their roles, says Ronald Raether of the law firm Troutman Sanders.

In a video interview at Information Security Media Group's recent Legal & Compliance Summit in New York, Raether discusses:

  • How incident response is evolving;
  • The value of tabletop exercises;
  • Common mistakes in creating and testing incident response plans.

Raether leads the cybersecurity, information governance and privacy practice and is a partner in the financial services litigation practice group at Troutman Sanders. He is known as an interpreter between businesses and information technology, and has assisted companies in navigating federal and state privacy laws for over 20 years. Raether's understanding of technology led him to be involved in legal issues that cross law firm boundaries, including experience with data security, data privacy, patents, anti-trust, and licensing and contracts.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.