{"version":"1.0","provider_name":"3B Data Security Blog","provider_url":"https:\/\/3bdatasecurity.com\/3bds-blog","title":"Cyber Incident Exercising \u2013 Strengthening Cyber Resilience","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pDpcLPbhMR\"><a href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/cyber-incident-exercising-strengthening-cyber-resilience\/\">Cyber Incident Exercising \u2013 Strengthening Cyber Resilience<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/cyber-incident-exercising-strengthening-cyber-resilience\/embed\/#?secret=pDpcLPbhMR\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Incident Exercising \u2013 Strengthening Cyber Resilience&#8221; &#8212; 3B Data Security Blog\" data-secret=\"pDpcLPbhMR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-10.jpg","thumbnail_width":1750,"thumbnail_height":525,"description":"Cyber incidents don\u2019t wait for organisations to get prepared\u2014and when teams haven\u2019t rehearsed their response, panic and missteps can turn a manageable breach into a full-scale crisis. This blog explores how Cyber Incident Exercising (CIE) brings realism, pressure, and measurable performance into cyber readiness. Featuring expert insight from Andrew Bassi and real-world case studies, it highlights why traditional tabletop exercises are no longer enough, what CIE reveals about people, processes, and technology, and how organisations can build true resilience before an attack strikes."}