SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Executive cyber crisis exercises are often treated as a means to validate organizational readiness. In practice, they expose an underlying problem: most organizations are structurally unprepared to manage a cyber crisis at the speed and scale at which it unfolds.
Across simulations, the same patterns emerge, revealing systemic gaps in decision making, communication, and coordination. These gaps are not theoretical. They directly translate into delayed response, increased impact, and loss of control during real incidents.
The following ten systemic gaps are consistently observed when moving from tabletop scenarios to operational reality.
Organizations invest heavily in incident response and crisis management documentation. However, during execution, teams struggle to operate these plans under pressure.
Plans often lack:
Observation: The maturity of crisis management documentation does not equate to readiness for executing it.
At the point of escalation, a critical delay occurs. Organizations lack precise criteria for transitioning from a security incident to a confirmed business crisis.
Common points of friction include:
Observation: Ambiguity at the moment of activation introduces avoidable latency in the most critical stage of a crisis.
While technical detection capabilities have matured, executive decision-making frameworks have not kept pace.
Leaders are often forced to decide without:
Observation: The velocity of decision making is the limiting factor, while detection rarely is.
Communication breakdowns are one of the earliest and most damaging failure points.
Observed issues include:
Observation: Failures in communication amplify operational disruption and accelerate the loss of trust.
Most organizations define alternative communication channels. Few validate them under realistic conditions.
Common failures include:
Observation: Redundancy without validation provides a false sense of resilience.
Legal, regulatory, and public relations functions are often brought in only after technical escalation.
This delay results in:
Observation: Crisis response is inherently cross-functional, and delayed integration creates downstream risk.
In a crisis, information propagates externally faster than it stabilizes internally.
Simulations consistently demonstrate:
Observation: Organizations do not control the narrative timeline; they must be prepared to operate within it.
Automated infrastructure responses can behave unpredictably under adversarial or abnormal conditions.
Observed impacts include:
Observation: Automation increases operational speed but also amplifies failure modes when not bounded by control mechanisms.
Recovery strategies frequently underestimate the complexity of restoring operations.
Key challenges include:
Observation: Recovery is a coordinated, multi-layered validation process, not a technical reset.
The most significant gap is the lack of rehearsed coordination at the executive level.
During crisis conditions:
Observation: Organizational alignment must be practiced and cannot be improvised during a crisis.
An emerging 11th gap: AI capabilities are underutilized in crisis decision support
While organizations are rapidly adopting AI for detection and automation, its role in real-time support of crisis decisions remains underdefined and underutilized.
During crisis conditions, teams must operate with:
AI has the potential to support:
However, most organizations lack:
Observation: There is a persistent AI gap in the decision layer. AI is widely applied for detection, but not for supporting executive decision making, where its impact during crisis conditions could be most significant.
Cyber crisis readiness is not defined by the presence of controls, but by the organization’s ability to execute coordinated decisions under pressure.
This requires:
Executive cyber exercises should not be treated as validation exercises. They are diagnostic tools that expose structural weaknesses in how organizations operate under stress.
The objective is not to confirm preparedness.
The objective is to reveal where preparedness breaks.
Organizations that internalize and act on these findings will improve their resilience. Those that do not will encounter the same gaps under real-world conditions, where the cost of failure is significantly higher.
Learn more about SANS Cyber Crisis Exercises here.


Devashri is a security researcher and enterprise security engineer specializing in DevSecOps automation, software supply chain security, and governance of large-scale vulnerability and compliance systems.
Read more about Devashri Datta