Lore & Order Vol. 7: Using Compliance as a Sales Tool

Lore & Order Newsletters
Cyber Trends, Threats, Guides, and News
CLICK HERE TO DOWNLOAD THIS IMAGE & COLOR IT IN!

Welcome to This Month’s Dispatch from Ally Security

Inside: CMMC ushers in a new era of tabletop demand, Red Hat and Oracle duel extortionists, and Discord displays what swift recovery really looks like. Plus, Ally’s latest upgrade lets facilitators refine reports like a master artisan.

Table Talk: Compliance as a Catalyst

We’re not fans of tabletop exercises just for compliance’s sake. But if compliance opens the door to more organizations running TTXs, then let it swing wide.

“For compliance” serves as a powerful phrase when it comes to loosening the coinpurse and igniting interest among stakeholders, but it’s just the first step in a company’s journey toward achieving cybersecurity posture maturity. When you’re guiding a TTX, frame compliance as the starting point, not the destination. Help your clients see the greater quest rewards:

  1. Reduced downtime
  2. Stronger customer confidence
  3. Cross-functional collaboration
  4. Lasting readiness

Speaking of compliance, a big shift is unfolding in the federal contractor realm. The CMMC final rule is sparking new energy around tabletop exercises. If you guide government contractors, now is the time to rally them toward the exercise field. Under CMMC Level 2 and 3, any organization handling Controlled Unclassified Information (CUI) must prove their detection, response, and recovery processes are understood, tested, and improved over time.

That’s your opening. TTXs are not just a way to meet this requirement. They’re the best proof that a party can rally, respond, and rise together. Seize this opportunity to help clients convert compliance into confidence.

Your allies in IR,

Rob & Scout

Asa's Field Intel: Inspiration for Your Next TTX

1. Bleeping Computer: Red Hat Data Breach Escalates as ShinyHunters Joins Extortion

ShinyHunters have entered the fray, escalating Red Hat’s breach from data theft to extortion. It’s a sharp reminder to temper supply-chain security before bandits strike. Get the rundown

2. Discord: Update on a Security Incident Involving Third-Party Customer Service

When a third-party support vendor’s breach exposed Discord user data, the company showed resolve by cutting the cord, fortifying defenses, and alerting the realm. Read the field notes

3. Kip Boyle: Inflection Point - Hackers Didn't Just Steal Data; They Stole the CEO's Bonus

Heavy lies the crown of cyber resilience. Kip Boyle examines how the board slashed Qantas executive bonuses in the wake of a cyberattack. Review the battle report

4. IT Pro: Oracle Patches EBS Amid Extortion Attacks

After attackers weaponized an unpatched flaw in its E-Business Suite, Oracle moved to seal the breach. Even enterprise titans must stay nimble when legacy systems draw fire. Study the scroll

Ally's Build Chronicle: In-Report Editing

Crafted by Stacey, Elvira, and Megh

Even the most legendary TTX reports can benefit from handmade tweaks. We get it. Sometimes the scribe misspells someone’s name (awkward), or maybe you want to want to polish the fine details before the report leaves your smithy. Now you can!

The first wave of Ally’s in-report editing features gives facilitators the power of perfection, enabling you to edit:

  • Report title
  • Report date
  • Participant names
  • Participant roles
  • Action item priority

Need to cloak certain participants? We’ve also baked in the ability to anonymize participant names throughout the report, a nifty spell for sessions that call for confidentiality.

As always, we welcome your wisdom. Have feedback or a new feature in mind? Send it through the sidebar in the Ally app. Every suggestion helps us shape stronger tools for your next quest!

End of Turn

Between CMMC’s new compliance decree, extortionists testing the old guard, and leadership accountability crashing down like a hammer, you stand equipped with an arsenal fit for grand tabletop campaigns.

And with Ally’s new refinement tools, your post-battle reports can shine as bright as the exercises that forged them. Until next time, fellow Facilitators!

About Ally Security

Ally is here to support facilitators, which in turn creates a virtuous cycle where exercises take less time, provide more value, are run more frequently, and can make every organization can be better prepared.

Book a demo!
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Have a great IR story? Tell Asa!

The unexpected wins. The client curveballs. The chaos you couldn’t have scripted if you tried. Dear Asa is your space to share the stories that don’t make it into the official post-incident report. Script, submit, and enjoy a chance to be featured or quoted in an upcoming post.

Share my story