Tabletop Exercise

Tabletop Exercise

One-liner: A discussion-based simulation where the security team walks through incident scenarios without executing technical actions.

🎯 What Is It?

A Tabletop Exercise (TTX) is a low-stress, collaborative security drill where stakeholders discuss their roles and responses to a simulated incident. It's like a rehearsal for a playβ€”no actual systems are touched, but everyone practices their lines.

Purpose: Validate incident response plans, identify gaps, and build team coordination before a real crisis.

πŸ“Š Exercise Types Comparison

Type Technical Actions Cost Stress Level Use Case
Tabletop None (discussion) Low Low Plan validation
Simulation Limited (sandbox) Medium Medium Tool training
Red Team Full attack High High Detection testing
Live Drill Controlled outage High Very High Full IR test

🎭 TTX Structure

1. Planning Phase

Define Objectives β†’ Select Scenario β†’ Invite Participants β†’ Create Injects

2. Exercise Phase (2-4 hours)

1. Facilitator presents scenario
2. Team discusses initial actions
3. Inject #1: "Malware spread to 50 hosts"
4. Team discusses containment steps
5. Inject #2: "Media is calling for comment"
6. Team discusses communications
7. Continue until incident resolved

3. Debrief Phase

πŸ› οΈ Sample Tabletop Scenarios

Scenario 1: Ransomware Outbreak

09:00 - SOC detects ransomware on accounting workstation
09:15 - 15 additional hosts show encryption activity
09:30 - Ransom note demands $500k in Bitcoin
09:45 - File servers showing encrypted files
10:00 - Threat actor posts sample data on dark web

Discussion prompts:

Scenario 2: Third-Party Breach

08:00 - Vendor notifies you their environment was breached
08:30 - Your organization's data may be exposed
09:00 - No details on what data was accessed
10:00 - Media reports the breach publicly

Discussion prompts:

πŸ›‘οΈ Blue Team Use Cases

Objective What You Validate
Playbook testing Are documented procedures realistic?
Role clarity Does everyone know their responsibilities?
Communication Are escalation paths clear?
Decision-making Who has authority to isolate systems?
External coordination Law enforcement, legal, PR integration

🎀 Interview Angles

Common Questions

STAR Story Template

Situation: Organization had IR plan but never tested it
Task: Design and facilitate first tabletop exercise for ransomware scenario
Action: Created realistic scenario, invited cross-functional team, documented gaps
Result: Identified 8 critical gaps (backup access, legal contacts, comms templates), updated playbooks, reduced mean-time-to-containment by 40% in next real incident

🚨 Common Mistakes

Mistake Why It Hurts Fix
Too technical Non-technical stakeholders disengage Balance technical and business discussion
No injects Static, boring, unrealistic Add time pressure and evolving scenario
Wrong participants Key decision-makers absent Mandate C-level attendance
No follow-up Gaps identified but never fixed Assign action items with owners/deadlines
Too scripted No room for genuine discussion Use injects as prompts, not scripts

βœ… Best Practices

Tabletop Exercise Checklist

πŸ“‹ Sample Inject Timeline

Time Inject Teams Involved
T+0 Alert fires: Suspicious encrypted files SOC, IR
T+15 50 hosts now affected, spreading SOC, IR, IT
T+30 Backups appear encrypted, ransom note found IR, IT, Management
T+45 Media asks for comment, regulator inquiry PR, Legal, C-suite
T+60 Threat actor threatens data leak IR, Legal, C-suite

❌ Common Misconceptions

πŸ“š References