
Six Tabletop Exercises to Help Prepare Your Cybersecurity Team
Tabletop exercises to help cybersecurity teams develop tactical strategies for securing their systems.

Overview
Tabletop exercises are meant to help organizations consider different risk scenarios and prepare for potential cyber threats. All of the exercises featured in this white paper can be completed in as little as 15 minutes, making them a convenient tool for putting your team in the cybersecurity mindset. In addition, each scenario will list the processes that are tested, threat actors that are identified, and the assets that are impacted.

This guide is organized so that the exercises and discussion questions become more challenging and difficult as the white paper moves forward. However, you can easily jump to the section or exercise that most interests you.
CIS Controls Discussed:
2 Inventory and Control of Software Assets
4 Controlled Use of Administrative Privileges
6 Maintenance, Monitoring, and Analysis of Audit Logs
7 Email and Web Browser Protections
9 Limitation and Control of Network Ports, Protocols, and Services