My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025-05-27-minutes-it-study-session
>
Meetings
>
2025
>
10. October
>
2025-10-07 10:00 AM - Commissioners' Agenda
>
2025-05-27-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/2/2025 3:46:32 PM
Creation date
10/2/2025 3:44:53 PM
Metadata
Fields
Template:
Meeting
Date
10/7/2025
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
136417
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
90
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />11/19 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Conduct Exercise – Lumifi Cyber and Kittitas County <br />• Identify Lessons Learned – Lumifi Cyber <br />• Improve Cybersecurity Program – Kittitas County <br />The NIST-based methodology has the following components: <br />• Design. The design phase and planning for exercises typically starts at least <br />one month in advance. The major steps in the event design process are as <br />follows: <br />o Determine the exercise topic based on the focus of the plan being <br />exercised <br />o Determine the exercise scope based on the target audience <br />o Identify the objectives of the exercise <br />o Identify the individuals that should participate in the exercise and invite <br />them to the event <br />o Identify the staff for the exercise, including a facilitator and a data <br />collector <br />o Coordinate the logistics for the exercise event. <br />• Development. Typical documentation includes a briefing, a facilitator guide, a <br />participant guide, and an after-action report. <br />• Conduct. In this phase, the IR plan is actually exercised. Tabletop exercises <br />are usually conducted in a classroom -type setting. The facilitator provides a <br />briefing to the participants, then walks them through the scenario and initiates <br />a group discussion using a question from the facilitator guide. As the <br />discussion continues, the facilitator may inject additional questions <br />periodically. The data collector documents issues to be included in the after - <br />action report. Immediately following the facilita ted discussion, the facilitator <br />and data collector conduct an exercise debrief, in which they ask the <br />participants in which areas they excel, in which areas they could use additional <br />training, and which areas of the IT plan should be updated. <br />• Evaluation. The comments from the debrief, along with lessons learned during <br />the exercise, are captured in an after -action report. The report should include <br />background information about the exercise, documented observations made <br />by the facilitator and data collector, and recommendations for enhancing the <br />IR plan that was exercised. Outcomes of the evaluation could include updating <br />the IR plan or other security -related documents, briefing managers on the <br />results, and performing other actions.
The URL can be used to link to this page
Your browser does not support the video tag.