Guides

Incident Response Tabletop Exercise: Complete Guide for 2026

January 29, 20266 min readby
Guides

Incident Response Tabletop Exercise: What Actually Works in 2026

A lot of IR tabletops look good on paper: attendance sheet filled, slides presented, report filed. Under the surface, though, the room never really wrestles with tradeoffs—so nothing in the runbook or org chart changes before the next real incident.

It does not have to be that way.

What makes a strong IR tabletop

A tabletop exercise is a discussion-based walkthrough of a realistic cyber incident. No production changes—your team walks through what they would do as the situation evolves.

Discussion is the product. If the facilitator talks through most of the hour, you are running a briefing, not an exercise. The value shows up when two owners discover they disagree on who notifies the board, or when legal and comms realize their timelines do not match.

If you want to see what a well-structured exercise looks like before building your own, try the interactive SolarWinds scenario — it'll give you a feel for how injects and decision points should flow.

The 4-Phase Framework

Phase 1: Prep (2-3 weeks out)

Pick one thing to test. Not "our entire incident response plan." One thing. Maybe it's your ransomware payment decision process. Maybe it's how you coordinate with legal on breach notification. Scope it tight.

Who to invite: 8–15 people. Core group: IR lead, SOC or detection lead, CISO (or delegate), legal, and communications. Add the CEO or business owner if the goal is executive decision-making—see our executive cyber crisis drill guide for that format.

Phase 2: Build the Scenario

Base it on something real. The SolarWinds supply chain attack. The MOVEit breach. A ransomware hit on a hospital. Real incidents create urgency that fictional ones can't match.

Structure it as 4-6 "injects" — new pieces of information that change the situation. Each inject should force a decision:

  • Inject 1: SOC flags unusual outbound traffic at 2 AM
  • Inject 2: Malware detected on three endpoints — all in finance
  • Inject 3: Attacker demands 50 BTC, threatens data leak in 48 hours
  • Inject 4: A journalist emails asking for comment

You can build a full scenario with branching decisions using our scenario builder — it handles the inject timing and decision trees for you.

Phase 3: Run the Exercise (60-90 minutes)

Ground rules: There are no wrong answers. This isn't a test. The only failure is not participating.

Present each inject, then ask: "What do you do?" Let the room debate. Watch for:

  • Role confusion — two people think they're in charge of the same decision
  • Communication gaps — nobody thought to loop in the insurance carrier
  • Process gaps — "we'd follow the playbook" but nobody knows where the playbook is

Take notes on every gap. These are gold.

Phase 4: Debrief and Fix Things

This is where most teams drop the ball. You had the exercise, found the gaps, and... nothing changes. The debrief matters more than the exercise itself.

Within one week:

  1. Document the top 5 gaps (not 50 — five)
  2. Assign an owner and deadline for each
  3. Schedule a follow-up in 90 days to check progress

How Often Should You Run These?

Quarterly for your core IR team. Twice a year for executive-level exercises. If you're doing it once a year for compliance, you're doing the minimum — and it shows.

Most teams skip practice because building scenarios is painful. That's exactly why we built a library of ready-to-run scenarios — pick one, customize it, and run it this week.

Common Mistakes

Making it too long. 90 minutes max. After that, attention dies and people start checking Slack.

No real decisions. If every inject has an obvious "right answer," your scenario is too easy. Good exercises create genuine disagreement in the room.

Skipping the debrief. I've seen this go wrong more times than I can count. The exercise is the diagnostic. The debrief is the treatment.

Only testing technical teams. Your legal counsel needs to practice too. So does your CEO. Check out our guide on executive vs. technical drills — they serve different purposes.


Bottom line: A solid tabletop costs mostly time—and it is one of the few security activities that directly rehearses coordination, not just tools. Treat it as practice for a bad week, not a compliance artifact.

When you are ready: browse ready-made scenarios or build your own. Role-specific context: incident response teams, IT and risk leaders, MSSPs and consultancies. Pricing for team features.

incident responsetabletop exerciseCISANISTIR trainingcyber drill

Ready to Put This Into Practice?

Use our free scenario builder to create custom cyber tabletop exercises based on these strategies.