Posts Tagged ‘AutoTableTop’
AutoTableTopâ„¢ 2.1 Imminent Release: Multi-Stage Exercises, Free-Form Roles, and AI-Controlled Participants
tGEN announces the release of AutoTableTopâ„¢ version 2.1, delivering the most significant capability upgrade since the platform’s version 2.0 launch in October 2025. This release introduces a three-stage timeline system, free-form participant roles, AI-controlled participants, and exercise-type terminology enforcement – capabilities that bring AutoTableTopâ„¢ closer to replicating the dynamics of a real-world incident without adding cost or complexity.
Read MoreThe Stryker “Wiper” incident
The Stryker Corporation cyberattack of March 11, 2026 represents a structural shift in the cyber threat landscape. This was not a ransomware attack for financial gain — it was a state-aligned destructive wiper operation conducted by Handala, an Iran-linked hacktivist group assessed by multiple intelligence firms as a front for Void Manticore, a destructive operations unit within Iran’s Ministry of Intelligence and Security (MOIS). The stated motivation was retaliation for U.S. military strikes in Iran.
Read MoreThreatGEN® Showcasing AutoTableTop™ 2.0 for ICS/OT at SCADA User Group as Tier 1 Sponsor
ThreatGEN® is proud to announce our participation as a Tier 1 Sponsor at the upcoming SCADA User Group March 31st Event in Houston, Texas. This exclusive gathering brings together operational technology (OT) and industrial control systems (ICS) professionals from utilities and critical infrastructure organizations to exchange knowledge, tackle real-world challenges, and advance the state of OT cybersecurity practice.
Read MoreAutoTabletopâ„¢ 2.0 Released: Incident Response Exercises with AI Innovation
ThreatGEN announces the official release of AutoTabletopâ„¢ 2.0, delivering unprecedented value for organizations preparing for cybersecurity incidents and crisis management scenarios.
Read MoreUpcoming webinar – Strengthening Pipeline Cybersecurity, The Power of Tabletop Exercises on June 12
Join ThreatGEN and UTSI International for an engaging, one-hour webinar designed specifically for energy and pipeline industry professionals. Discover how modern tabletop exercises, powered by advanced simulation and generative AI, can transform your organization’s cyber resilience. Learn from industry leaders Clint Bodungen (President, ThreatGEN) and Shaun Six (President, UTSI International) as they share practical strategies, real-world scenarios, and proven methodologies for implementing effective tabletop exercises in pipeline operations.
Read MoreAutoTableTopâ„¢ Version 2.0 Ushers in a New Era for Incident Response Exercises
ThreatGEN anounces AutoTableTopâ„¢ version 2.0, a major upgrade to its flagship automated tabletop exercise platform, with availability set before June 1, 2025.
Read MoreRockwell Advisory PN1633 Tabletop Scenario for AutoTableTopâ„¢
A critical vulnerability (CVE-2023-3595 and CVE-2023-3596 in Advisory ID PNI1633) has been discovered in Rockwell Automation’s FactoryTalk Linx product, which is widely used for industrial automation. The flaw allows for remote code execution and denial-of-service attacks, potentially giving attackers administrator-level access and control over industrial systems.
Read MoreBetter Outcomes through Iteration with AutoTableTopâ„¢
Discover how ThreatGEN’s AutoTableTopâ„¢ revolutionized incident response training in our latest case study. Using a realistic simulation scenario involving the Municipal Water Authority of Aliquippa, teams demonstrated remarkable improvements across four iterative exercises. Participants tackled challenges like unauthorized PLC access and water pressure disruptions, refining their strategies to achieve a peak performance score of 95/100. Key advancements included enhanced firewall configurations, multi-factor authentication implementation, and robust public communication planning.
Read MoreSolarWinds 2019 Scenario
Sometime around January 2019, hackers from a group known as SolarStorm gained access to SolarWinds’ network using either a zero-day vulnerability in a third-party service or application, a brute-force attack or social engineering.
Read MoreMulti Team Communication
How does AutoTableTopâ„¢ support different teams interacting with the AI for their specific needs?
Read More