<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="37156" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/innovator-isttx" lastchanged="2026-05-08T02:17:47+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>DORA &amp; NIS2 Tabletop Exercises</title><productcode>ISTTX</productcode><vendorcode>IC</vendorcode><vendorname>Innovator Class</vendorname><fullproductcode>IC-ISTTX</fullproductcode><version>1.0</version><objective>&lt;p&gt;Upon completion of the training, participants will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Translating DORA and NIS2 requirements into training concepts&lt;/li&gt;&lt;li&gt;Planning and facilitating tabletop exercises in a structured manner&lt;/li&gt;&lt;li&gt;develop realistic crisis scenarios (e.g., ransomware, third-party failure)&lt;/li&gt;&lt;li&gt;To evaluate decision-making processes and responsiveness&lt;/li&gt;&lt;li&gt;Identify vulnerabilities and develop countermeasures&lt;/li&gt;&lt;li&gt;to establish a sustainable TTX program within the company&lt;/li&gt;&lt;/ul&gt;</objective><audience>&lt;ul&gt;
&lt;li&gt;CISO / Information Security Officer&lt;/li&gt;&lt;li&gt;IT Managers and Security Officers&lt;/li&gt;&lt;li&gt;BCM and Risk Manager&lt;/li&gt;&lt;li&gt;Compliance and Audit Officers&lt;/li&gt;&lt;li&gt;SOC employees&lt;/li&gt;&lt;li&gt;Security Incident Manager&lt;/li&gt;&lt;li&gt;Security consultants and IT service providers&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;h4&gt;Day 1 &amp;ndash; Fundamentals &amp;amp; Design of Tabletop Exercises&lt;/h4&gt;&lt;h5&gt;Module 1: Regulatory Context (DORA &amp;amp; NIS2)&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Resilience Testing Requirements&lt;/li&gt;&lt;li&gt;Incident Response &amp;amp; Crisis Management in a Regulatory Context&lt;/li&gt;&lt;li&gt;Expectations of Regulators and Auditors&lt;/li&gt;&lt;li&gt;Common vulnerabilities encountered in practice&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: Fundamentals of Tabletop Exercises&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Distinction from penetration testing and red teaming&lt;/li&gt;&lt;li&gt;Objectives and Benefits of TTX&lt;/li&gt;&lt;li&gt;Roles and Responsibilities (Management, IT, Legal, Communications)&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Designing a TTX&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Development of realistic scenarios&lt;/li&gt;&lt;li&gt;Building an Inject Structure (Escalation and Dynamics)&lt;/li&gt;&lt;li&gt;Defining exercise objectives and KPIs&lt;/li&gt;&lt;li&gt;Development of a training manual&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Practical exercise&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Developing your own scenario in groups&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Day 2 &amp;ndash; Implementation, Evaluation, and Operationalization&lt;/h4&gt;&lt;h5&gt;Module 4: Conducting a Tabletop Exercise&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Live simulation of a realistic scenario (e.g., a ransomware attack involving a third-party outage)&lt;/li&gt;&lt;li&gt;Role-based implementation (Management, IT, Communications)&lt;/li&gt;&lt;li&gt;Facilitation techniques and managing the exercise&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 5: Evaluation &amp;amp; Lessons Learned&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Structured debriefing (Hot Wash / Debriefing)&lt;/li&gt;&lt;li&gt;Identification of vulnerabilities&lt;/li&gt;&lt;li&gt;Assessment of Responsiveness&lt;/li&gt;&lt;li&gt;Documentation of the results&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 6: Mapping to DORA &amp;amp; NIS2&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identification of Regulatory Gaps&lt;/li&gt;&lt;li&gt;Prioritization of measures&lt;/li&gt;&lt;li&gt;Preparing for Audits and Inspections&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 7: Establishing a TTX Program&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Integration into ISMS and BCM&lt;/li&gt;&lt;li&gt;Developing a regular exercise routine&lt;/li&gt;&lt;li&gt;Definition of Key Performance Indicators&lt;/li&gt;&lt;li&gt;Scaling within the company&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>Upon completion of the training, participants will be able to:


- Translating DORA and NIS2 requirements into training concepts
- Planning and facilitating tabletop exercises in a structured manner
- develop realistic crisis scenarios (e.g., ransomware, third-party failure)
- To evaluate decision-making processes and responsiveness
- Identify vulnerabilities and develop countermeasures
- to establish a sustainable TTX program within the company</objective_plain><audience_plain>- CISO / Information Security Officer
- IT Managers and Security Officers
- BCM and Risk Manager
- Compliance and Audit Officers
- SOC employees
- Security Incident Manager
- Security consultants and IT service providers</audience_plain><contents_plain>Day 1 – Fundamentals &amp; Design of Tabletop Exercises

Module 1: Regulatory Context (DORA &amp; NIS2)


- Overview of Resilience Testing Requirements
- Incident Response &amp; Crisis Management in a Regulatory Context
- Expectations of Regulators and Auditors
- Common vulnerabilities encountered in practice
Module 2: Fundamentals of Tabletop Exercises


- Distinction from penetration testing and red teaming
- Objectives and Benefits of TTX
- Roles and Responsibilities (Management, IT, Legal, Communications)
Module 3: Designing a TTX


- Development of realistic scenarios
- Building an Inject Structure (Escalation and Dynamics)
- Defining exercise objectives and KPIs
- Development of a training manual
Practical exercise


- Developing your own scenario in groups
Day 2 – Implementation, Evaluation, and Operationalization

Module 4: Conducting a Tabletop Exercise


- Live simulation of a realistic scenario (e.g., a ransomware attack involving a third-party outage)
- Role-based implementation (Management, IT, Communications)
- Facilitation techniques and managing the exercise
Module 5: Evaluation &amp; Lessons Learned


- Structured debriefing (Hot Wash / Debriefing)
- Identification of vulnerabilities
- Assessment of Responsiveness
- Documentation of the results
Module 6: Mapping to DORA &amp; NIS2


- Identification of Regulatory Gaps
- Prioritization of measures
- Preparing for Audits and Inspections
Module 7: Establishing a TTX Program


- Integration into ISMS and BCM
- Developing a regular exercise routine
- Definition of Key Performance Indicators
- Scaling within the company</contents_plain><duration unit="d" days="2">2 jours</duration><pricelist><price country="DE" currency="EUR">1390.00</price><price country="CH" currency="CHF">1390.00</price><price country="AT" currency="EUR">1390.00</price><price country="SE" currency="EUR">1390.00</price><price country="SI" currency="EUR">1390.00</price></pricelist><miles/></course>