Incident Command Platform
← All articles

How to Run a C-Suite Tabletop Exercise

By Mark LyndPublished April 7, 202620 min read

A bad tabletop is worse than no tabletop — it creates false confidence. After facilitating more than 150 executive tabletop exercises, the patterns of what makes them useful, and what makes them theater, are very clear.

Cyber tabletops should not be about testing whether your team knows the incident response plan. They should be about testing whether your organization can make decisions under pressure with incomplete information. That framing changes how you design them. This guide is the condensed version of everything I wish I had known before facilitating my first session.

Step 1: Choose a Scenario That Stresses Decisions

The first mistake is choosing a scenario that is technically interesting but strategically trivial. "Someone clicks a phishing link and gets malware" is boring at the executive level. The right scenarios create genuine dilemmas:

The test of a good scenario: can you imagine reasonable executives at the same table disagreeing about the right answer? If yes, it is worth running.

Step 2: Write Injects That Force Movement

An inject is a timed piece of new information delivered to the group during the exercise. Good injects:

Inject examples that work: "A journalist has posted a tweet claiming to have screenshots from your SharePoint." "Your outside counsel just called — your insurer is denying coverage because first notice was late." "The SEC just issued a subpoena." "One of your board members has posted on LinkedIn about the incident."

Step 3: Cast the Room Correctly

The participants matter as much as the scenario. A good C-Suite tabletop includes:

Two rules: no substitutes, and no laptops. Substitutes do not reflect the real decision authority. Laptops create side-work that destroys the pace of the exercise.

Step 4: Facilitate for Pressure, Not Completion

The facilitator's job is not to "cover" the scenario. It is to surface the decision points and to keep the pressure on. Techniques that work:

  1. Hard time boxes. "You have five minutes to decide whether to pay." Ignore requests for more time.
  2. Incomplete information. Do not answer every question. Say "the investigation has not confirmed that yet" often.
  3. Media inject. A fake tweet, a journalist email, a reporter calling. Nothing accelerates decision-making like a deadline someone else is setting for you.
  4. Regulator inject. An email from a Data Protection Authority asking for a status update. Or a letter from the SEC.
  5. Competing priorities. Introduce a business-critical decision unrelated to the incident. Who attends to what?

Step 5: Capture Findings Immediately

The worst tabletop outcome is the one where everyone learns a lot, nothing gets written down, and six months later the same gaps are still open. The facilitator must:

Step 6: Close the Loop

Findings without accountability become a wish list. Every tabletop finding should land in a gap register that is reviewed at the next CISO staff meeting, the next board meeting, and the next tabletop. If the same gap appears in two consecutive exercises, it stops being a gap and starts being a pattern — and patterns are what plaintiffs and regulators find interesting.

What to Avoid

How Often?

At minimum, annually for the full executive team. Quarterly for the core IR team. Semi-annually for specialized scenarios (ransomware, OT, third-party breach). More if you are in a regulated industry or have had a real incident within the last year. SEC registrants should be exercising their Item 1.05 materiality workflow specifically — see SEC 96-Hour Notification.

Run your next tabletop inside IR-OS

IR-OS ships with 12+ battle-tested scenarios, timed injects, and automatic after-action reports — based on the 150+ exercises behind this guide.

Start free