Expert guides, real-world scenarios, and best practices for running effective cyber tabletop exercises and incident response drills
Run synchronized, instructor-led tabletop exercises with a shared presentation view and a private control panel. No installs, just links.
How to run incident response tabletop exercises that sharpen real response capability—not just satisfy auditors. Prep, scenario design, facilitation, and debrief in one place.
A practical path from zero to a first cyber tabletop this month: scenario, attendees, room setup, facilitation prompts, debrief, and a repeat cadence—without boiling the ocean.
Ten crisis scenarios worth rotating into your exercise program in 2026—from ransomware with exfiltration to deepfakes and combined physical-cyber events—and what each one stress-tests.
A full ransomware tabletop walkthrough: injects, decision points, and facilitation notes—built to surface payment authority, backup trust, HIPAA-style timelines, media pressure, and recovery tradeoffs.
How to choose tooling for cyber exercises in 2026: ranges vs BAS vs crisis simulation, ten representative vendors by category, and how to match platform type to SOC skills, leadership drills, or control validation.
Run synchronized, instructor-led tabletop exercises with a shared presentation view and a private control panel. No installs, just links.
Read ArticleHow to run incident response tabletop exercises that sharpen real response capability—not just satisfy auditors. Prep, scenario design, facilitation, and debrief in one place.
Read ArticleA practical path from zero to a first cyber tabletop this month: scenario, attendees, room setup, facilitation prompts, debrief, and a repeat cadence—without boiling the ocean.
Read ArticleTen crisis scenarios worth rotating into your exercise program in 2026—from ransomware with exfiltration to deepfakes and combined physical-cyber events—and what each one stress-tests.
Read ArticleTechnical IR exercises and executive crisis drills test different skills. Combining them into one session usually wastes one of the audiences—here is how to split them and when a joint run makes sense.
Read ArticleA full ransomware tabletop walkthrough: injects, decision points, and facilitation notes—built to surface payment authority, backup trust, HIPAA-style timelines, media pressure, and recovery tradeoffs.
Read ArticleHow MSSPs and vCISOs can package tabletop exercises as a repeatable service: template libraries, light customization per client, facilitation rhythm, and pricing tiers—without a custom doc for every engagement.
Read ArticleDesign and run executive cyber crisis drills: length, scenario choice, decision-focused injects, facilitation tips, and what usually breaks first—without turning the room into a technical deep dive.
Read ArticleA short, plain-language explainer: what a tabletop exercise is, how injects work, who should participate, and why it beats only reading the IR plan.
Read ArticleWhat Golden SAML is, why stolen token-signing keys bypass MFA, how the attack chain typically runs (including post-SolarWinds lessons), and what to monitor and rehearse in tabletop form.
Read ArticleA repeatable solo format: one scenario, five minutes, four prompts (first action, notification order, early scoping, containment)—plus a quick self-review to turn each drill into one concrete fix.
Read ArticleWho sits on a typical cyber Crisis Management Team (CMT), what each role owns in a drill versus live incident, and the one question each role should be ready to answer when injects land.
Read ArticleExplore interactive cyber crisis scenarios from our library.

A sophisticated voice phishing (vishing) campaign has compromised customer credentials through fake promotional calls, resulting in $2M+ in unauthorized IVR transactions. With 500M ILS processed daily through the IVR channel and the attack scope still unknown, executive leadership must make critical decisions about incident response, customer protection, regulatory compliance, and business continuity under intense time pressure.

A sophisticated phishing campaign targets your financial institution's high-value clients, resulting in unauthorized wire transfers. Navigate regulatory notifications, client communications, and operational response while managing reputational damage and potential regulatory sanctions.

A sophisticated business email compromise (BEC) attack using AI voice cloning technology to impersonate executives and authorize fraudulent wire transfers. Players must navigate detection, response, and recovery decisions while managing regulatory, reputational, and financial impacts in a high-pressure environment.

A sophisticated supply chain attack targeting a major bank through a compromised third-party banking software update. Exercise participants must navigate critical decisions about vendor isolation, regulatory compliance, customer communications, and business continuity while managing an advanced persistent threat that has infiltrated core banking systems.

A sophisticated multi-month APT campaign targeting a major financial institution. The Codebreakers collective uses phishing to establish persistence, exfiltrate 1M customer records, deploy ransomware, and leak high-net-worth client data when ransom demands are refused. This expert-level scenario challenges C-suite executives with complex decisions around crisis communications, regulatory compliance, business continuity, and stakeholder management during a catastrophic cyber incident.

A major social engineering attack compromises high-profile Twitter accounts through phone-based credential theft. As C-level executives, participants must navigate crisis communications, incident response, and stakeholder management while attackers use compromised accounts to run Bitcoin scams affecting world leaders and celebrities.
Use our free scenario builder to create custom cyber tabletop exercises in minutes