Most tabletop exercises are theatre. Everyone gathers in a conference room, the facilitator reads a scenario nobody finds threatening, the participants nod through decisions they would never make under pressure, and the deliverable is a glossy PDF that says "continue to mature IR capabilities." Nothing in the program changes.
A well-run tabletop looks different. It ends with three to five concrete gaps, a named owner for each, and a runbook revision tracked in version control. Participants leave slightly uncomfortable. That is the point.
Choose a scenario that actually hurts
Generic ransomware scenarios are too easy. Everyone has rehearsed the shape of that one. Pick something that maps to your actual environment and your actual weak spots:
- A compromised third-party IT provider pushing malicious updates — the
KaseyaandSolarWindspattern. - A business email compromise that redirects a real, pending wire transfer your finance team is about to send.
- Data exfiltration discovered through a journalist's inquiry, not your own tooling. How do comms, legal, and the CEO respond before you know the scope?
- Ransomware in an OT or clinical environment where you cannot simply isolate and restore.
If your scenario could be resolved by "restore from backup and move on," it is not a tabletop, it is a warm-up.
Invite the uncomfortable participants
Security people running tabletops for security people is how you produce kumbaya. The value is in the cross-functional friction. Get:
- Legal and the breach coach. They will ask about notification triggers you have not thought about.
- Communications / PR. The first draft of a holding statement will be worse than you expect. That is a finding.
- Executives, including the CEO and CFO. Ransom decisions, regulatory disclosure, customer outreach — these are not IT decisions. Rehearse who actually calls them.
- HR. If the incident involves an insider, an employee device, or a layoff-adjacent terminated account, HR is on the bridge whether you invited them or not.
- A skeptical outsider. A peer CISO or a retained IR firm who will ask the questions your team has normalized away.
Run it with injects, not a script
A static narrative lets people rehearse the story they have already agreed on. Injects break that. Drop new information into the room at intervals: a ransom note arrives, a reporter tweets about your outage, a subsidiary in another jurisdiction reports related activity, your cloud provider sends a suspicious-activity notice. Force the room to re-prioritize in real time.
Ask each participant to produce an artifact during the exercise, not after: the first draft holding statement, the call list, the ransom decision memo, the regulator notification. These artifacts are the real output. A polished summary deck is not.
If nobody in the room was surprised by anything, you did not run a tabletop. You ran a status meeting with snacks.
Blameless debrief, tracked gaps
The debrief is where programs improve. Make it blameless — the goal is to find the gap, not the person. Write every gap down with an owner, a date, and a specific artifact to update. Track them like any other engineering backlog. Close them.
Then run the next one the following quarter, not next year. Annual tabletops are a compliance line item. Quarterly tabletops, each one focused on a different part of the plan, are how an IR program actually matures.
The takeaway
If your last tabletop produced no action items, it was theatre. Schedule the next one with a scenario your team has not rehearsed, the people who make real decisions, and a debrief that writes to your backlog. The point of a tabletop is not to prove the plan works. It is to find where it does not.