№ files_lp_4_process_2_60048
File format: docx
Character count: 28225
File size: 4748 KB
Guidance manual describing structure, scenario, objectives, and discussion modules for a cybersecurity tabletop exercise focused on insider threat incidents affecting organizational systems and supply chain partners.
Year:
2023
Update Date:
September 2023
Organization:
Cybersecurity and Infrastructure Security Agency (CISA)
Program:
CISA National Cyber Exercise Program (NCEP)
Document Type:
Situation Manual / Tabletop Exercise Package
Topic:
Insider Threat and Cybersecurity Incident Response
Framework Reference:
National Institute of Standards and Technology (NIST) Cybersecurity Framework
Framework Functions:
Identify, Protect, Detect, Respond, Recover
Threat Type:
Insider Threat – Cyber
Scenario Theme:
Supply chain vulnerability exploited by a former employee at a third-party vendor and accidental disclosure of personally identifiable information (PII)
Exercise Format:
Tabletop Exercise
Exercise Modules:
Module 1; Module 2
Included Sections:
Handling Instructions; Exercise Overview; General Information; Discussion Questions; Acronyms; Case Studies; Attacks and Threats; Contacts and Resources
Information Classification:
Unclassified
Traffic Light Protocol Options:
TLP:CLEAR; TLP:GREEN; TLP:AMBER; TLP:AMBER+STRICT; TLP:RED
Participating Entities:
Federal, state, local, and private sector organizations
Contact Program:
CISA National Cyber Exercise Program
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.
The file will be delivered to the email address provided at checkout within 12 hours.
Don’t have cryptocurrency yet?
You can still complete your purchase in a few minutes:- Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
- In the app, tap Send.
- Select network, paste our wallet address.
- Send the exact amount shown above.
The final amount may vary slightly depending on the payment method.
The file will be sent to the email address provided at checkout within 24 hours.
The product description is provided for reference. Actual content and formatting may differ slightly.
Year:
2018
Region / City:
United States
Topic:
Article Submission Guidelines
Document Type:
Guidelines
Organization:
Academy of General Dentistry
Author:
Not specified
Target Audience:
AGD members and leaders
Period of Validity:
Ongoing, with deadlines for monthly articles
Approval Date:
Not specified
Amendment Date:
Not specified
Year:
2015
Region / city:
N/A
Topic:
Printer Compatibility with Windows 10 Mobile
Document Type:
Technical Specification
Author:
Microsoft
Target audience:
Developers, Device Manufacturers
Validity period:
N/A
Approval date:
N/A
Modification date:
N/A
Year:
2015
Region / City:
New Delhi
Topic:
Insider Trading Regulations
Document Type:
Regulatory Form
Organization:
Securities and Exchange Board of India (SEBI)
Author:
SEBI
Target Audience:
Promoters, Key Managerial Personnel, Directors, and Related Parties
Effective Period:
From May 15, 2015
Approval Date:
Not specified
Date of Changes:
Not specified
Context:
Regulatory document for compliance with insider trading regulations outlining the securities held by specific individuals at a given time.
Year:
2023
Region / City:
Hong Kong
Subject:
Securities regulation, insider trading
Document Type:
Legal consultation conclusion
Issuing Authority:
Securities and Futures Commission (SFC)
Relevant Legislation:
Securities and Futures Ordinance (SFO)
Effective Period:
Subject to legislative process
Date of Publication:
8 August 2023
Key Amendments:
Expansion of territorial reach, alignment of mens rea provisions
Implementation Scope:
HKEX-listed securities, overseas-listed securities, derivatives
Stakeholders:
Licensed corporations, registered institutions, market participants
Year:
2022
Region / City:
Not specified
Theme:
Insider Trading
Document Type:
Corporate Policy
Organization:
Chenghe Acquisition Co.
Author:
Chenghe Acquisition Co.
Target Audience:
Directors, Officers, Employees, Professional Advisors, Business Consultants
Effective Date:
April 27, 2022
Period of Application:
Ongoing
Approval Date:
Not specified
Amendment Date:
Not specified
Year:
2025
Region / city:
Kazakhstan
Topic:
Insider information, Securities transactions
Document type:
Internal policy
Organization:
KazMunayGas NC JSC
Author:
Compliance Service
Target audience:
Employees, persons performing management functions, related parties, persons with access to insider information
Period of validity:
From 30 September 2025
Approval date:
Not specified
Date of changes:
Not specified
Year:
Not specified
Country:
Tanzania
Region / City:
Dar es Salaam
Subject:
Securities market regulation and insider trading
Document Type:
Academic research paper
Research Methodology:
Doctrinal legal analysis and empirical legal inquiry
Legal Framework Analyzed:
Capital Markets and Securities Act (CMSA); Company Act 2002
Institutions Mentioned:
Dar es Salaam Stock Exchange; Securities regulatory authority
International Standards Referenced:
International Organization of Securities Commissions (IOSCO)
Key Concepts:
Insider trading; non-public material information; securities regulation; market surveillance; investor protection
Economic Context:
Development of capital markets in Tanzania and transition to a market-oriented economy
Case References:
Michael Naalehu Shirima v African Banking Corporation Tanzania Limited
Keywords:
Insider Trading; Capital Markets; Securities Authority; Surveillance Technology; Tanzania
Year:
2024
Organization:
Cybersecurity and Infrastructure Security Agency (CISA)
Type:
Tabletop Exercise Package
Sector:
Dams and Hydropower
Purpose:
Assess cyber resilience and response to significant cyber incidents
Audience:
Federal, state, local, and private sector organizations involved in dam operations
Scenario:
Network compromise from insider threat causing operational shutdown
Framework:
National Institute of Standards and Technology Cybersecurity Framework Functions (Govern, Identify, Protect, Detect, Respond, Recover)
Contact:
CISA National Cyber Exercise Program (NCEP), [email protected]
Year:
2024
Note:
Region / City
Theme:
Active Shooter Response and Resilience
Document Type:
Tabletop Exercise Package
Agency / Organization:
Cybersecurity and Infrastructure Security Agency (CISA)
Target Audience:
Faith-based organizations, emergency response teams, community resilience planners
Year:
2023
Region / City:
N/A
Topic:
Cybersecurity, Public Health
Document Type:
Exercise Package
Organization:
Cybersecurity and Infrastructure Security Agency (CISA)
Author:
N/A
Target Audience:
Healthcare and public health sector organizations
Effective Period:
N/A
Approval Date:
October 2023
Revision Date:
N/A
Year:
2024
Region / City:
N/A
Topic:
Cybersecurity, Resilience Building
Document Type:
Situation Manual
Organization / Institution:
Cybersecurity and Infrastructure Security Agency (CISA)
Author:
N/A
Target Audience:
Organizations conducting cybersecurity tabletop exercises
Period of Validity:
N/A
Approval Date:
N/A
Date of Changes:
N/A
Year:
2024
Note:
Region/City
Topic:
Cybersecurity, Emergency Services
Document Type:
Tabletop Exercise Package
Organization/Institution:
Cybersecurity and Infrastructure Security Agency (CISA)
Target Audience:
Emergency services, cybersecurity professionals
Year:
2024
Note:
Region / City
Topic:
Cybersecurity in the Food and Agriculture Sector
Document Type:
Tabletop Exercise Package
Organization:
Cybersecurity and Infrastructure Security Agency (CISA)
Context:
A tabletop exercise document designed to test the cyber resilience of food processing/manufacturing facilities in response to cyber attacks, specifically using phishing as an entry point.
Year:
2009
Region / City:
Global
Topic:
Network Security, Threat Management
Document Type:
White Paper
Organization / Institution:
Microsoft Corporation
Author:
Avi Ben-Menahem, Tanmay Ganacharya, Moshe Golan, Ziv Mador, Evgeney Ryzhyk, Tom Bolt, Jim Harrison, Adwait Joshi, Scott Lambert, Vladimir Lifliand, Duane Okamoto, Eli Pozniansky, Evgeny Skarbovsky, Jeff Williams
Target Audience:
IT Professionals, Network Administrators
Period of Validity:
Not specified
Approval Date:
2009
Date of Changes:
Not specified
Year:
[Insert Year]
Region / City:
[Insert Region/City]
Topic:
Emergency preparedness, response, and recovery for outdoor events
Document Type:
Exercise Manual
Organization:
Cybersecurity and Infrastructure Security Agency (CISA)
Author:
[Insert Author]
Target Audience:
Exercise participants (planners, facilitators, evaluators, and players)
Period of Validity:
[Insert Start and End Dates of Exercise]
Approval Date:
[Insert Date]
Amendment Date:
[Insert Date]
Year:
2025
Region:
Eastern UK / Essex
Document Type:
Risk Assessment / Guidance Summary
Authority:
Home Office, Department for Education
Target Audience:
School Leaders, Designated Safeguarding Leads, Staff
Legislation:
Counter Terrorism and Security Act 2015
Guidance Referenced:
Prevent duty guidance (Home Office, 2023); Working together to safeguard children (DfE, 2023); Keeping children safe in education (DfE, 2025)
Primary Threats:
Extreme Islamist Terrorism, Extreme Right Wing radicalisation
Referrals Data:
Education 40%, ERW, Fascination with extreme violence, Mass Casualty Attacks; Age distribution under 18 (67%), 18–24 (16%), 25+ (16%)
Training Requirements:
Prevent Awareness, Safeguarding Updates, Induction Programs
Local Procedures:
Prevent referral processes, information sharing, liaison with safeguarding partnerships
Next Review Date:
Specified in document
Year:
2008
Region / City:
Maine, USA
Topic:
Environmental Protection, Water Resources
Document Type:
Legislative/Regulatory
Authority/Institution:
Board of Environmental Protection
Author:
Not specified
Target Audience:
Commercial Facility Operators, Environmental Protection Authorities
Effective Period:
Ongoing since September 30, 2008
Approval Date:
Not specified
Amendment Date:
November 3, 2002
Document History:
Approved
Overview:
Microsoft Threat Modeling Tool 2016
Purpose of Tool:
Create data flow diagrams (DFDs) and analyze potential threats to products or services.
Supported Scenarios:
Data flow analysis, threat identification, and mitigation strategies.
Features:
Threat identification, STRIDE methodology, standard mitigations, and custom template creation.
Installation:
Installation instructions for the tool.
How to Run:
Instructions for using the tool for threat modeling.
Analysis of Output:
Reports detailing identified and mitigated threats.
Author:
Microsoft Trustworthy Computing
Target Audience:
Security professionals and developers interested in threat modeling.
Date of Approval:
Not specified
Date of Changes:
Not specified
Context:
This is a user guide for the Microsoft Threat Modeling Tool 2016, explaining its purpose, features, and usage for creating and analyzing threat models based on the STRIDE methodology.
Year:
2026
Region / City:
Chernobyl, Former Soviet Union
Subject:
Military Technology, Environmental Modification, Nuclear Disaster
Document Type:
Documentary, Report
Institution:
Kla.TV
Author:
Werner Altnickel
Target Audience:
General Public, Scholars of History and Military Technology
Period of Action:
1986, 1997, 2002
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2023
Region/City:
United States
Subject:
Health and Wellness Review, Applicant Evaluation, Medical Condition Assessment
Document Type:
Form
Organization:
Job Corps
Author:
Job Corps Health and Wellness Director
Target Audience:
Health professionals, Disability Coordinators, Job Corps staff
Period of Validity:
Ongoing
Approval Date:
Not specified
Date of Changes:
Not specified