Loading...
Loading...
The art and science of designing tabletop scenarios that challenge teams, reveal gaps, and build real capabilities.
Effective scenarios must be challenging but not overwhelming. The balance determines whether your team learns or shuts down:
Team coasts, no real decisions
Team challenged, productive struggle
Team overwhelmed, gives up
5 principles that separate great scenarios from mediocre ones
Based on actual threat actor TTPs, but scoped to what your team can reasonably handle in 2-3 hours
Test against the threats your organization actually faces, not just "interesting" scenarios
Every scenario should have clear learning objectives - what specific capabilities are you validating?
Great scenarios force teams to make difficult decisions with imperfect information
Start simple, add complications. Let teams build confidence before introducing major pivots
Every effective scenario follows this proven structure
The discovery or alert that starts the exercise
Example Inject
"6:47 AM: SOC analyst sees EDR alert: Suspicious process execution on FINANCE-WKS-042. Process: powershell.exe launching encoded commands. User: jsmith@company.com. Status: Still executing."
Background information teams need to make decisions
Example Inject
"The affected workstation is in the Finance department. User jsmith is a Senior Accountant with access to financial systems and customer data. The system has EDR but logs are only retained 30 days."
Pivots that increase difficulty based on team actions
Example Inject
"As you isolate FINANCE-WKS-042, you see 12 more finance workstations showing similar behavior. Your backup systems are also showing suspicious access patterns. The CFO needs to send investor reports today."
Explicit questions that require team decisions
Example Inject
"Do you: A) Isolate all finance systems immediately (blocks business), B) Isolate selectively (risk of spread), or C) Monitor while investigating (gather intel, risk of escalation)?"
Outcomes based on team decisions (not punitive, but realistic)
Example Inject
"You chose selective isolation. Good: You contained 3 systems quickly. Bad: 2 additional systems were compromised in the meantime. The attacker is now attempting to access backup servers."
How to craft realistic, engaging injects
Why: Realism drives engagement and tests tool familiarity
Instead of "A suspicious process ran", use actual EDR alert format with fields, timestamps, hashes
💡 Tip: Screenshot real alerts (redacted) and include them
Why: Specific details make scenario feel real
Name systems like "PROD-DB-03" not "Database Server". Use real software versions, actual IP ranges, specific usernames
💡 Tip: Mirror your actual environment naming conventions
Why: Teams should deduce, not be told
Bad: "This is a ransomware attack". Good: "Multiple files renamed with .encrypted extension, ransom note observed"
💡 Tip: Provide indicators, let teams draw conclusions
Why: Gradual escalation allows for learning
Start with single affected system, reveal lateral movement over time, don't dump 50 compromised hosts in inject 1
💡 Tip: Each inject should add 1-2 new complications
Why: Forces prioritization and realistic stress
Include business deadlines, regulatory timelines, ransom countdowns, or spreading threats
💡 Tip: Use countdown timers or facilitator reminders
Why: Real incidents are messy and uncertain
Conflicting information, incomplete logs, uncertainty about scope, unclear attribution
💡 Tip: Teams should ask "we need more information"
Tailor scenarios to what you want to test
Credential theft via phishing with gradual escalation
Tests if SIEM rules detect suspicious auth patterns, lateral movement
Minor incident that escalates to major breach
Tests when and how teams escalate to leadership
DDoS attack affecting customer-facing systems
Requires IT, security, communications, customer support coordination
Ransomware with backup failure
Forces C-suite to make difficult business decisions
Mistakes that kill exercise effectiveness
Too easy: Team solves in 20 minutes
Fix: Add complications, time pressure, ambiguous information
Too hard: 10 attack vectors at once
Fix: Focus on 1-2 primary threats, build gradually
Too scripted: No room for team decisions
Fix: Build branching paths based on team choices
Unrealistic: Hollywood cyber attack
Fix: Research real TTPs, use MITRE ATT&CK
No decision points: Just an info dump
Fix: Force explicit choices with trade-offs
Gives away answers: "This is ransomware"
Fix: Provide indicators, let team deduce
Missing context: Team can't make decisions
Fix: Provide org details, available tools, constraints
No consequences: Decisions don't matter
Fix: Show realistic outcomes of each choice
Breakpoint provides 50+ pre-built, field-tested scenarios designed by incident response experts. Each scenario includes progressive injects, decision trees, and facilitator guides. Focus on your team, not scenario design.
Complete facilitation guide for running effective tabletop exercises
Detailed ransomware exercise guide with timeline and decision points
Learn why quarterly training is more effective than annual exercises