More Open Source Security episodes

How to actually test a disaster plan with David Bernstein thumbnail

How to actually test a disaster plan with David Bernstein

Published 4 May 2026

Duration: 34:58

A three-part disaster recovery framework emphasizing simplicity, clear roles, and collaboration, utilizing structured testing via HSEEP, real-world validation, and continuous improvement through exercises, while addressing pitfalls and balancing realism with psychological safety.

Episode Description

Josh and David finish up the disaster recovery and emergency planning trilogy. In this one David tells us how to test the plan he told us how to build...

Overview

The podcast discusses disaster recovery and emergency planning, emphasizing practical, simplified approaches to creating effective strategies. Key principles include the "KISS" methodology, which advocates for clear, straightforward plans that outline roles and responsibilities without unnecessary complexity. Post-plan actions focus on testing through tabletop exercises, which simulate incidents to identify gaps in preparedness. These exercises range from simple discussion-based scenarios to more complex functional simulations, balancing detailed realism with the need for focus. The Homeland Security Exercise and Evaluation Program (HSEEP) is highlighted as a resource for structured testing, stressing a continuous improvement cycle: plan, train, exercise, evaluate, and refine. Real-world testing is critical, as illustrated by a data center incident where a generator failure during a test triggered a real crisis, underscoring the need to validate systems like failover processes in controlled environments. The discussion also distinguishes between hot, warm, and cold disaster recovery sites, stressing the importance of verifying physical and operational readiness through exercises before assuming a plans viability.

The podcast further explores the design and execution of emergency preparedness exercises, emphasizing objective-driven scenarios that target specific goals, such as response time metrics, rather than arbitrary complexity. Clear terminology, like differentiating "vulnerability" from "exploit," is highlighted to prevent misunderstandings during high-stakes situations. Gamification techniques, such as using dice or cards to simulate unpredictability, are discussed as tools to test reactions but caution against letting them distract from core planning objectives. No-fault exercises are prioritized to evaluate processes rather than individual performance, ensuring constructive feedback over blame. Common pitfalls, such as overemphasizing perfection or creating overly stressful environments, are warned against to maintain the focus on learning and improvement. The discussion also touches on psychological factors, like avoiding unfair pressure on participants and addressing diverse personalities within teams. Finally, it connects disaster planning to broader contexts, including using fictional scenarios like Star Trek episodes to explore real-world security risks through frameworks such as MITRE ATT&CK, illustrating how creative approaches can deepen understanding of enterprise security challenges.

Recent Episodes of Open Source Security

27 Apr 2026 Open Source Pledge with Vlad-Stefan Harbuz

Challenges in open source sustainability include undervaluing maintainers, dependency tracking issues, fragmented tooling, burnout, governance flaws, and paradoxical tool sustainability, necessitating financial support, sustainable governance, and collective action for long-term project viability.

20 Apr 2026 Building a plan for disaster with David Bernstein

Adaptive emergency management and disaster recovery demand dynamic strategies, structured frameworks like ISO 22301/NIST, cyclical preparedness, stress testing, stakeholder alignment, and resilience through collaboration and continuous learning to tackle evolving digital and physical risks.

13 Apr 2026 Open Source Malware with Paul McCarty

Open Source Malware (OSM) addresses the gap in detecting intentional malicious open-source components by cataloging threats, de-obfuscating code, extracting indicators of compromise, and providing post-incident data, while tackling challenges like persistent malicious packages, limitations of traditional tools against interpreted languages, fragmented collaboration, AI risks, and the need for improved CI/CD security, audit tools, and balanced AI-human oversight.

6 Apr 2026 Package management challenges with Andrew Nesbitt

Challenges in package management across ecosystems demand standardization to address fragmentation in naming, versioning, and dependencies, interoperability gaps between system-level and language-specific tools, SBOM scanner inconsistencies, and cross-ecosystem complexity, urging collaboration on shared specs and protocols despite cultural and practical barriers.

30 Mar 2026 Open Source Security at scale with Michael Wisner

The Alpha Omega Project addresses open-source security by targeting leverage points like Node.js and Python ecosystems, advocating for systemic solutions, dedicated security roles, sustainable funding, and registry infrastructure improvements to counter fragmented practices and downstream risks.

More Open Source Security episodes