• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Firewall
      • Managed SaaS Security

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring
      • Managed Email and Collaboration Security

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog
lang: en_US

Incident Response Tabletop Exercise and Scenarios

  • Written by: Trevor Meers
  • Updated: June 3, 2025

Incident Response Tabletop Exercise Scenarios

Every effective cybersecurity program must include regular tabletop exercises. This allows your team to practice dealing with a security incident. And realistic exercises start with choosing a scenario that’s appropriate to your actual security risks.

We have previously shared tips for conducting the tabletop exercise itself, and in this post, we provide three basic tabletop exercise examples to get you started on creating the right situation for your scenario. 

You should note that the scenarios shared here do not come with answers to each problem.

A tabletop exercise isn’t a fill-in-the-blank exam. It’s a convincing simulation that lets your team practice working through your incident response plan and a key way to identify needed changes in that plan.

Use these sample tabletop exercises to start crafting situations that will give your team the most realistic experience. 


FREE DOWNLOAD Be ready when it matters most. When a cyber incident strikes, every second counts. Download our Incident Response Flow Chart to guide your team through any threat.  

Key Elements for Any Tabletop Exercise Scenario

You’ll find a few common aspects in every good scenario: 

  • Custom Details: In your tabletop exercise, tailor the scenario to your team by using names of actual employees, the software your team uses, real customers, etc. All this will heighten the realism and help everyone grasp the consequences of something like your top customer calling because your service isn’t working. 
  • An Unfolding Threat: Throw a series of developments and plot twists at the participants to reflect that, in a real-life incident, you never know all the facts upfront. 
  • Unavailable Personnel: At some point, reveal that whoever is in charge of your team (or a staff member with necessary expertise) is unreachable. This forces everyone to work on the problem on their own rather than just saying that they’ll call someone else for guidance. 
  • Outside Pressure: Include questions from clients, partners, the media, etc., in the mix to raise the tension and test the communications aspects of your incident response plan.  

Essential Questions to Ask in Any Scenario 

With any scenario you use, structure the exercise so that participants have to answer the following questions:

  • Does this qualify as an incident? 
  • What’s your first step after realizing that something odd is happening? 
  • What information/evidence do you need to collect? 
  • How do you know what data was compromised/exfiltrated? 
  • Who else in your organization needs to be notified and what should be shared internally? 
  • How long will it take to recover your data from backup? 
  • Do you have talking points ready for staff members who may get calls from customers? When do you proactively notify customers of the problem? 
  • What deadlines from your service level agreements (SLAs) are at risk while your system is compromised? 
  • Will you pay the ransom? 
  • What are your reporting requirements after the incident is over? 

Tabletop Exercise Scenario #1: Ransomware 

Backstory: You’re a midsize professional services firm with 100 employees, including a three-person IT team. 

Day 1, 7:05am
After a long holiday weekend, a couple of early birds arrive at work and report to IT that they can’t access files on their workstations or the network drive. 

Day 1, 7:35am
IT team members rush to the office and find that numerous files on the server and workstations appear to be encrypted. 

Day 1, 7:55am
The only file anyone can open is one that has appeared in every directory. It’s called RECOVER-FILES.txt. Upon review, the team discovers that this is a ransom message and decides to notify the IT leader. 

Day 1, 8:05am
The team realizes that the IT leader is on a cruise and unreachable. 

Day 1, 3:50pm
Upon further investigation, 80% of your workstations and 50% of your servers and applications were encrypted. Forensic analysis found evidence of data exfiltration and indicated that the threat actors were actively in your network for months before the attack. Recovery will probably take several days or weeks. Not all data is recoverable. 

Tabletop Exercise Scenario #2: Business Email Compromise 

Backstory: You’re a family-owned, 60-person company that builds components for large agricultural equipment manufacturers. 

Day 1, 4:05pm
The CFO receives an email from the CEO, who is traveling in China. The CEO’s message shares greetings from his wife and mentions how much they enjoyed their time in Beijing. He goes on to say that he has decided to proceed with the purchase of a large piece of equipment that the team has been discussing for weeks. He gives the CFO a bank account to use for the $400,000 payment, and the CFO makes the payment. 

Day 5, 8:05am
When the CEO returns to the office, the CFO mentions the purchase to him, and the CEO responds, “I never told you to make that purchase. What are you talking about?” The C-suite calls IT in to investigate whether the CEO’s email has been compromised and where the money went. 


Incident Response FC Paper

Tabletop Exercise Scenario #3: System Compromise/Double-Extortion Ransomware 

Backstory: Your company runs a cloud-based sourcing service. Customers log into your portal to order the parts they need to conduct operations each day. 

Day 1, 10:02am
A customer submits a support ticket saying that they can’t get into the Admin Console for your service and can’t query data from their database for custom reporting. Your support team attempts to use the service and discovers they can’t get into it either. 

Day 1, 10:10am
Your internal team sends the issue to your offshore software development team—and they can’t get into the service either. 

Day 1, 3:45pm
Forensic investigation finds a ransom note and also discovers that the threat actor was able to capture cached admin credentials and pivot to other systems and resources. 

Day 1, 4:59pm
You realize that the attacker successfully exfiltrated critical data and is threatening to disclose it if ransom isn’t paid. You haven’t yet determined what data they exfiltrated 

Clearly, each of these scenarios can go in a lot of directions and will give your team plenty of things to discuss. If you’re just starting to use tabletop exercises, you’ll usually benefit from having an experienced third-party expert help develop the scenario and lead your team through the exercise. 

Contact HBS to talk with one of our cybersecurity consultants.

Related Content

Employees at Conference Table Conducting Tabletop Exercise

How to Conduct an Effective Tabletop Exercise

Discover tips for running a tabletop exercise that effectively tests your incident response plan and prepares your team for a real breach.

Learn More »
Incident Response Testing Levels Graphic

How to Test Your Cybersecurity Incident Response Plan

Here’s how to choose the right test in order to confirm that your cybersecurity incident response plan actually works like you think it will.

Explore More »
HBS. One Partner. Endless Possibilities

Digital Forensics and Incident Response

Rapidly address cyber threats with our Digital Forensics and Incident Response services: Quick mitigation and restoration, trusted guidance, 24x7x365 support.

Read More »
  • Business Continuity, Disaster Recovery, Incident Response, IT Leadership
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2025 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.