Proj S40 – Cybersecurity Exercise Platform

Introducing Proj S40 – Cybersecurity Exercise Platform

Team members

Athena Chua Xuan (CSD), Tan Kay Wee (DAI), Tay Wei Han Joel (CSD), Abram Tan Jia Han (CSD), Kishen S/O Durairajoo (CSD), Ankita Parashar (CSD)

Instructors:

  • Lim Kwan Hui

Writing Instructors:

  • Rashmi Kumar

  • Bernard Tan

Our Video

Cybersecurity

 

With cyber threats on the rise, organizations face growing risks to their systems and data. To help companies better prepare and respond, we are collaborating with one of Asia’s largest cybersecurity firms. This partnership strengthens cyber resilience through expert guidance and advanced threat protection. Together, we aim to ensure businesses stay ahead of emerging cyber risks.

Ensign Exercise platform (EEP) (2)

Table Top Exercises (TTX)

 

Tabletop exercises are discussion-based simulations designed to help organizations test and improve their incident response plans. Participants, including key stakeholders and decision-makers, engage in structured scenarios that simulate cybersecurity incidents, natural disasters, or business disruptions.

 

These exercises help teams assess their readiness, identify gaps in their response strategies, and enhance coordination in a controlled, low-risk environment. The goal is to improve decision-making, refine protocols, and ensure a swift, effective response to real-world crises.

Problem Statement

How might we automate this processes to reduce labor and man-hours while maintaining or improving accuracy and effectiveness?

Current Stages and Painpoints

Description
  • Aligns project objectives and scope with the client

  • Collects detailed client requirements and context

  • Helps the team understand the client’s environment to build realistic scenarios

Pain Points
  • Undocumented requirements

  • Incomplete or inconsistent document formats

 

 

Description
  • Develops exercise materials (scenarios, injects, artefacts) manually using PowerPoint and Excel

  • Customised content tailored to each participant group

Pain Points
  • Manual creation is time-consuming and detail-intensive

  • Requires creativity and customization for each group

Description
  • Exercise conducted over 1–2 days, either physically or virtually

  • Materials are shared in phases using an automated email scheduler

Pain Points
  • Uploading artefacts to the scheduler is inefficient and time-consuming

  • Frequent scheduler crashes cause last-minute troubleshooting and stress

Description
  • Participant actions are observed and evaluated using the NIST Cybersecurity Framework (CSF)

  • Observations are mapped to CSF categories, scored using a rubric, and compiled into a report with recommendations

Pain Points
  • Mapping observations to CSF categories is tedious and time-consuming

  • Observations are handwritten, making digitisation inefficient

  • Observers must multitask between tracking, recording, and engaging participants

(This stage is not implemented as part of the solution)

User Flow

Key Features

Generation Workflow

Evaluation

Menu

ornament-menu

Contact the Capstone Office :

+65 6499 4076

8 Somapah Road Singapore 487372

Please fill in your information below and feedback

Contact the Capstone Office :

8 Somapah Road Singapore 487372

8 Somapah Road Singapore
487372

Welcome back!

Log in to your existing account.

Contact the Capstone Office :

+65 6499 4076

8 Somapah Road Singapore 487372

Welcome back!

Log in to your existing account.