You have an incident response plan. Maybe it lives in a shared drive somewhere, maybe someone printed it out last year. But here's the uncomfortable question: has anyone on your team actually practiced using it?

If the answer is no, you're not alone. Most small and mid-size organizations write an IR plan, file it away, and never test it until a real incident forces everyone to figure things out on the fly. That's not a plan. That's a hope.

Tabletop exercises are the cheapest, most effective way to test your incident response plan without waiting for a real crisis to expose the holes. No servers go down. No data gets lost. You just sit around a table (or a video call) and walk through a scenario together. And you can do it in 60 minutes.

This post is a complete tabletop exercise kit. Everything you need to run one this month, including a facilitator guide, three ready-to-use scenarios, discussion prompts for each phase, a scoring concept, and a post-exercise report template. It's designed for teams of 4 to 10 people, and you don't need an external facilitator. Anyone on your team can run it.

Why Tabletop Exercises Matter

A tabletop exercise is a discussion-based simulation. You present a realistic security scenario to your team and walk through how you'd respond, step by step. Nobody touches a keyboard. Nobody pulls a network cable. You're testing your decision-making, your communication, and your plan, not your technical tools.

The value is hard to overstate. In 60 minutes, a tabletop exercise will reveal gaps that months of planning on paper will miss. Things like:

With Cybersecurity Awareness Month coming up in October, now is the perfect time to schedule a session. Walk into October with real data on where your IR plan stands instead of assumptions.

The Facilitator Guide

You don't need a consultant or a hired facilitator. You need one person willing to lead the conversation. Here's what that person should do.

Before the Exercise

The 60-Minute Agenda

  1. Introduction (5 minutes): Set the ground rules. This is a learning exercise, not a test. There are no wrong answers. The goal is to find gaps before a real incident finds them for you.
  2. Scenario Presentation (5 minutes): Read the scenario aloud. Let it sink in. Answer clarifying questions about the setup, but don't give away how it should be handled.
  3. Phase 1 - Detection and Initial Response (15 minutes): Walk through the first moments of the incident. Who notices it? Who gets called? What's the first action?
  4. Phase 2 - Containment and Investigation (15 minutes): The incident is confirmed. Now what? How do you stop the bleeding? Who leads the investigation? What gets communicated and to whom?
  5. Phase 3 - Recovery and Lessons Learned (10 minutes): The incident is contained. How do you get back to normal operations? What needs to change to prevent this from happening again?
  6. Debrief and Action Items (10 minutes): Capture the top gaps identified. Assign owners and deadlines. Schedule follow-up.

Facilitator Tips

Scenario 1: Ransomware Attack

Setup: It's Tuesday morning at 8:15 AM. Your helpdesk starts receiving calls from multiple employees who can't access their files. Desktop wallpapers have been changed to a ransom note demanding $250,000 in cryptocurrency within 48 hours. Your file server, two department shares, and the accounting application are all encrypted. The attackers claim they've also exfiltrated customer data and will publish it if payment isn't made.

Phase 1 Discussion Prompts

Phase 2 Discussion Prompts

Phase 3 Discussion Prompts

Scenario 2: Insider Data Theft

Setup: Your HR department notifies IT that a senior engineer submitted their two-week notice on Friday. On Monday, your DLP tool (or a coworker's tip) flags that this employee downloaded 2.4 GB of files from your product development share to a personal USB drive over the weekend. The files include customer lists, proprietary designs, and a pricing database. The employee is still coming into the office and has full system access.

Phase 1 Discussion Prompts

Phase 2 Discussion Prompts

Phase 3 Discussion Prompts

Scenario 3: Third-Party Vendor Breach

Setup: You receive an email from your payroll processing vendor informing you that they experienced a data breach. The vendor confirms that employee Social Security numbers, bank account details for direct deposit, salary information, and home addresses for your entire workforce were exposed. The breach happened three weeks ago, but the vendor is just now notifying customers. Media coverage is starting.

Phase 1 Discussion Prompts

Phase 2 Discussion Prompts

Phase 3 Discussion Prompts

Scoring Rubric: How Did You Do?

After the exercise, rate your team's performance in each area on a simple 1 to 5 scale. This isn't about grades. It's about identifying where you're strong and where you need work.

  1. Detection Speed: How quickly did the team recognize the incident and begin the response process? (1 = no clear process, 5 = clear triggers and immediate escalation)
  2. Role Clarity: Did everyone know their role, or was there confusion about who does what? (1 = nobody knew, 5 = every role was clear and practiced)
  3. Communication: Was the notification chain clear? Did the right people get informed in the right order? (1 = ad hoc and chaotic, 5 = documented chain followed smoothly)
  4. Decision-Making: Were key decisions made confidently, or did the team stall waiting for someone else to decide? (1 = paralysis, 5 = clear authority and timely decisions)
  5. Plan Awareness: Could participants reference and use the IR plan during the exercise? (1 = nobody knew where it was, 5 = actively used as a reference throughout)
  6. Recovery Planning: Did the team have a realistic understanding of recovery timelines and requirements? (1 = no idea, 5 = tested and documented recovery procedures)

A total score of 24 or above means your IR plan is in decent shape. Below 18, and you have some real work to do before a real incident tests you for real.

Post-Exercise Report Template

Within 48 hours of the exercise, the facilitator should distribute a short report. Keep it to one page. Here's the format:

Making This a Habit

One tabletop exercise is better than zero. But the real value comes from making it a regular practice. Here's a simple cadence that works.

"The best incident response plan is the one your team has actually practiced. Everything else is just documentation."

Get Started This Month

Here's your homework. Block 60 minutes on the calendar before the end of September. Pick a scenario. Send the invite. Run the exercise. It doesn't need to be perfect. The first one never is. What matters is that you did it.

After the exercise, identify your top three IR plan gaps and assign an owner to each one. That's it. Three gaps, three owners, three deadlines. You'll walk into Cybersecurity Awareness Month in October with a concrete improvement plan instead of another awareness poster on the break room wall.

Your IR plan deserves better than collecting dust. Give it 60 minutes.