A tabletop exercise is a computer-generated cyber attack to test the organization’s incident response framework, identify process gaps, and improve the team’s capability to handle a live cybersecurity incident. Here are the steps to set up and perform a tabletop exercise:
1. Define Objectives:
- Describe explicitly what the tabletop exercise will accomplish. Set goals like, for example, testing incident response processes, communication processes, or decision-making effectiveness.
2. Establish Scenario:
- Set an objective and challenging scenario consistent with the organization’s threat environment. Depending on the type of incident, the systems involved, and the impacts on operations, you’ll need to consider all this.
3. Assemble Participants:
- Invite key stakeholders such as incident response team members, IT employees, communications professionals, lawyers, and department heads. • Provide access from different levels of organisation.
4. Provide Background Information:
- Tell the participants about the situation and background beforehand. This could be information about the nature of the event, affected systems, and other contexts.
5. Conduct the Tabletop Exercise:
- Facilitate the practice by delivering the situation and leading people through the mock incident. Encourage transparency, collaboration, and decisions. Try to navigate through a simulation timeline through different stages of the event.
6. Explore Response Procedures:
- Evaluate the effectiveness of incident response policies. Pay attention to how the participants recognize, contain, exterminate, and heal from the simulated event. Go over decisions and evaluate the coordination between teams.
7. Assess Communication Protocols:
- Review communication in the organization and with external stakeholders. : test communication mechanisms, including incident notifications, and clear the information flow.
8. Review Lessons and Needs for Change:
- Encourage participants to point out problems, barriers, and opportunities. Record the lessons learned and suggestions for improving the incident response strategy.
9. Debriefing Session:
- Do a debriefing immediately after the exercise. : Report observations, solicit feedback from participants, and document learnings. Discover strengths and weaknesses.
10. Document Lessons Learned:
- Write a full report that describes the tabletop exercise, the scenario, the responses of the participants, the shortcomings, and recommendations. Use this information to improve incident response.
Possible Incident Response Topics for Tabletop Activities:
Ransomware Attack:
Try a ransomware attack and determine whether the organization can detect, react, and recover.
Data Breach:
Find out how the organization handles data breaches, from notification procedures to legal issues to PR.
Insider Threat:
Simulate an insider threat to test how the organization is alerting and preventing risk from within.
Distributed Denial of Service (DDoS) Attack:
Measure how well the business can handle a DDoS attack and preserve essential services during the disruption.
Supply Chain Compromise:
Analyze the organization’s response to a supply chain compromise, including third-party vendor relations and dependencies.
Credential Compromise:
Simulate an attack in which users’ credentials get stolen and see how the organization can determine and recover from it.
Phishing Campaign:
Assess the organization’s reaction to a phishing attack, from employee awareness to incident reporting and response.
Critical Infrastructure Failure:
Imagine what would happen in a major infrastructure failure, including power, water or communication systems.
Cloud Service Outage:
Suppose a critical cloud service goes down — test your company’s emergency preparedness and communications strategy.
Malicious Insider Activity:
Review the company’s reaction to insider-level malicious activity, such as data breach or sabotage.
Personalize the tabletop exercise scenario to your organization’s requirements and risk tolerance. Conduct such exercises regularly to keep the incident response team well-equipped for changing cybersecurity threats.


