• Events and Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events and Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Email and Collaboration Security
      • Managed Firewall

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Copilot
      • Microsoft Fabric
      • Microsoft Funding Opportunities

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Copilot
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

How to Conduct an Effective Tabletop Exercise

  • Written by: Trevor Meers
  • May 11, 2022
Employees at Conference Table Conducting Tabletop Exercise

Tabletop exercises provide one of the most effective methods for testing your incident response (IR) plan, short of experiencing an actual breach. 

Incident response planning in general has moved up the priority list for most organizations as weekly reports prove that no one is immune to cyberattack. But unless you test your incident response plan, you won’t really know if it covers all the right steps. A tabletop exercise throws your team into a simulated breach, which quickly helps everyone start recognizing the incident response plan as a real-world lifeline, not just a dusty policy statement. Most mature organizations conduct a tabletop exercise at least once a year, and some conduct several each year to cover various parts of the organization. 

The guidelines below help you plan and carry out a tabletop exercise (also known as a TTX) that pays immediate dividends in finding places to improve your incident response plan and focusing your team’s attention on the potential challenges (if you want to take a deep dive into tabletop exercise planning and don’t mind government-speak, review the CISA Tabletop Exercise Package).

Write Clear Objectives and Outcomes 

The exercise’s organizers should have a specific idea of how the tabletop fits into the overall strategy for testing your incident response plan. And since the incident response plan will drive the tabletop exercise, make sure that all participants have a copy of the incident response plan before the exercise. Let everyone know that they’re expected to review it prior to the exercise and to bring a copy to the meeting.  

Invite the Right People 

With a clear concept of your exercise’s purpose, you’ll know whom to have participate and what kind of scenario to use. The best tabletop exercises include representatives beyond the IT team. While your tech folks will be tasked with the immediate jobs of understanding and stopping a breach, key decisions require perspectives beyond the IT staff. For example, an operations representative should be there to explain the real-world ramifications if someone from IT always suggests “shut it down” as a solution to a breach. Representatives from the public relations and legal teams can help manage messaging and highlight legal traps to avoid. And, if you can get them to come, it’s best to have a member of the C-suite attend so they get a firsthand sense of the potential risks and what it will take to mitigate them. If you’ve identified a full Disaster Recovery team, inviting those people will probably check most of the above boxes.  

Create Meaningful Scenarios 

The scenario’s quality determines much of the success of the tabletop exercise. An experienced cybersecurity expert can help craft a scenario that reflects the latest real-world threats. They can pace the reveal of information to mimic how actual breaches develop. They can build in multiple attack vectors like the ones you’ll see in real life. The scenario should also bring in third-party concerns, such as clients calling to ask why your services aren’t working or issues that start cascading through your supply chain. The best scenarios typically take a key leader out of the equation by declaring them unreachable during the crisis. That prevents everyone from saying, “We’ll just call the boss, and she’ll know what to do.” 

Take it Seriously, But Encourage Honesty 

Managers should set the tone by treating the entire exercise with urgency. Don’t let participants short-circuit the process by skipping steps or brushing something off as unrealistic. Following the defined steps is all part of the exercise. This prepares you for the fact that, in some industries, you may not be able to file a cyber insurance claim for a real incident without showing a full root cause analysis (RCA) of the breach. So work the problem as described in the scenario and require everyone to be specific with their answers. But cultivate an atmosphere where people can admit it when they don’t know what to do. After all, you run these exercises to identify exactly those kinds of gaps. 

Use an Outside Facilitator  

You’ll usually get better results with an experienced third-party expert facilitating the process. They’ll work with the test’s leader to plan a strong scenario, and they’ll keep everyone on track during the actual exercise. They know how to ask the right questions and won’t be held up by internal politics. The facilitator also helps drive everyone to identify action items at the end. 

Commit to Follow-Up Steps 

Your session should include an immediate discussion about how the exercise went (what CISA calls a “hot wash”). Task someone (your facilitator often handles this step) to write down and assign specific to-do items from the meeting. Those often include updating portions of the incident response plan, getting more information about how your backup system works, etc. Set a deadline for completing the to-do list and/or holding a follow-up meeting to check progress. 

HBS consultants lead dozens of tabletop exercises every year for clients of all sizes. Contact us today to learn how we can help you get the most from your next exercise. 

Related Content

Incident Response Tabletop Exercise Scenarios

Incident Response Tabletop Exercise and Scenarios

Enhance your cybersecurity with our realistic tabletop exercises. Practice incident response and identify plan changes with our sample scenarios.

Learn More »
Incident Response Testing Levels Graphic

How to Test Your Cybersecurity Incident Response Plan

Here’s how to choose the right test in order to confirm that your cybersecurity incident response plan actually works like you think it will.

Explore More »
Incident response planning blog

Creating an Incident Response Plan

Creating an incident response plan is critical for the stability of any organization, and setting one up does not have to be stressful with these tips.

Read More »
  • Business Continuity, Disaster Recovery, Incident Response, IT Leadership
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Standard Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
Any purchase is governed by the HBS Standard Terms and Conditions.
©2026 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.