CLICK HERE TO DOWNLOAD THIS IMAGE & COLOR IT IN!Inside: CMMC ushers in a new era of tabletop demand, Red Hat and Oracle duel extortionists, and Discord displays what swift recovery really looks like. Plus, Ally’s latest upgrade lets facilitators refine reports like a master artisan.


We’re not fans of tabletop exercises just for compliance’s sake. But if compliance opens the door to more organizations running TTXs, then let it swing wide.
“For compliance” serves as a powerful phrase when it comes to loosening the coinpurse and igniting interest among stakeholders, but it’s just the first step in a company’s journey toward achieving cybersecurity posture maturity. When you’re guiding a TTX, frame compliance as the starting point, not the destination. Help your clients see the greater quest rewards:
Speaking of compliance, a big shift is unfolding in the federal contractor realm. The CMMC final rule is sparking new energy around tabletop exercises. If you guide government contractors, now is the time to rally them toward the exercise field. Under CMMC Level 2 and 3, any organization handling Controlled Unclassified Information (CUI) must prove their detection, response, and recovery processes are understood, tested, and improved over time.
That’s your opening. TTXs are not just a way to meet this requirement. They’re the best proof that a party can rally, respond, and rise together. Seize this opportunity to help clients convert compliance into confidence.
Your allies in IR,
Rob & Scout


ShinyHunters have entered the fray, escalating Red Hat’s breach from data theft to extortion. It’s a sharp reminder to temper supply-chain security before bandits strike. Get the rundown
When a third-party support vendor’s breach exposed Discord user data, the company showed resolve by cutting the cord, fortifying defenses, and alerting the realm. Read the field notes
Heavy lies the crown of cyber resilience. Kip Boyle examines how the board slashed Qantas executive bonuses in the wake of a cyberattack. Review the battle report
After attackers weaponized an unpatched flaw in its E-Business Suite, Oracle moved to seal the breach. Even enterprise titans must stay nimble when legacy systems draw fire. Study the scroll

Crafted by Stacey, Elvira, and Megh
Even the most legendary TTX reports can benefit from handmade tweaks. We get it. Sometimes the scribe misspells someone’s name (awkward), or maybe you want to want to polish the fine details before the report leaves your smithy. Now you can!
The first wave of Ally’s in-report editing features gives facilitators the power of perfection, enabling you to edit:
Need to cloak certain participants? We’ve also baked in the ability to anonymize participant names throughout the report, a nifty spell for sessions that call for confidentiality.
As always, we welcome your wisdom. Have feedback or a new feature in mind? Send it through the sidebar in the Ally app. Every suggestion helps us shape stronger tools for your next quest!


Between CMMC’s new compliance decree, extortionists testing the old guard, and leadership accountability crashing down like a hammer, you stand equipped with an arsenal fit for grand tabletop campaigns.
And with Ally’s new refinement tools, your post-battle reports can shine as bright as the exercises that forged them. Until next time, fellow Facilitators!
About Ally Security
Ally is here to support facilitators, which in turn creates a virtuous cycle where exercises take less time, provide more value, are run more frequently, and can make every organization can be better prepared.
The unexpected wins. The client curveballs. The chaos you couldn’t have scripted if you tried. Dear Asa is your space to share the stories that don’t make it into the official post-incident report. Script, submit, and enjoy a chance to be featured or quoted in an upcoming post.
