5 Crisis Scenarios Every
CISO Should Run

Practical playbooks for the tabletop exercises that test what matters most -- with key injects, success metrics, and lessons to capture.

18 min read Practical Guide

Every CISO knows the theory: test your incident response plans regularly, exercise your teams, validate your playbooks. But when it comes to actually designing a tabletop exercise, many security leaders struggle with the same question: what scenarios should we run?

The answer depends on your threat landscape, but certain scenarios are universal enough that every security organization should exercise them at least once a year. The five scenarios below are drawn from real-world incidents and regulatory expectations (NIST CSF, ISO 27001, DORA, NIS2). For each, we provide a scenario description, recommended injects, measurable success criteria, and the key lessons you should be looking to capture.

These are not theoretical abstractions. Each scenario is designed to be run as a half-day tabletop exercise with 10-30 participants across security, IT operations, legal, communications, and executive leadership.

1
Critical Priority

Ransomware Attack Response

Ransomware remains the most impactful cyber threat facing organizations. This scenario tests the full spectrum of response: technical containment, executive decision-making on ransom payment, regulatory notification, business continuity during system outages, and public communications.

Scenario Narrative

On a Friday afternoon, the SOC detects anomalous file encryption activity across multiple file servers. Within 30 minutes, ransom notes appear on affected systems. The threat actor claims to have exfiltrated 200GB of data before deploying encryption. Backups for two critical systems are found to be corrupted. The ransom demand is $2M in cryptocurrency with a 72-hour deadline.

Key Injects

1

SOC Alert: Anomalous Encryption Activity

Multiple endpoints reporting rapid file modification. AV signatures not matching. What is the immediate containment action?

2

Ransom Note Discovery

Ransom demand received with proof-of-exfiltration. Threat actor provides sample of stolen data. Who makes the decision on engaging with the threat actor?

3

Backup Integrity Check Failure

IT reports that backups for ERP and CRM systems are corrupted. Recovery time estimate is 5-7 days for clean rebuild. What are the manual business continuity options?

4

Media Inquiry and Regulatory Pressure

A journalist contacts PR about "a major data breach." The data protection authority expects notification within 72 hours. How do you coordinate external communications?

5

Ransom Deadline Approaching

48 hours in. Systems still down. Threat actor publishes a small sample of data. Board wants an update. What is the executive decision framework for the ransom?

Success Metrics

  • Time from initial detection to containment decision: target under 30 minutes
  • Clear identification of decision authority for ransom payment
  • Regulatory notification process initiated within required timeframe
  • Business continuity procedures activated for critical processes
  • Consistent external communications across all channels

Lessons to Capture

  • Are network segmentation controls sufficient to limit lateral movement?
  • Does the organization have a pre-established policy on ransom payment?
  • Are backup integrity verification procedures running and tested?
  • Is legal counsel pre-briefed on cyber extortion response and reporting obligations?
  • Do manual fallback procedures exist for critical business processes?
2
Regulatory Focus

Data Breach Notification Drill

Data breach notification is one of the most legally and operationally complex response activities. This scenario specifically tests the notification workflow mandated by GDPR (Articles 33 and 34), but the principles apply to any privacy regulation: CCPA, PIPEDA, LGPD, or sector-specific rules like HIPAA.

Scenario Narrative

A routine security audit reveals that a web application vulnerability (SQL injection in a legacy customer portal) has been exploited. Log analysis shows unauthorized access to a database containing 150,000 customer records including names, email addresses, phone numbers, and hashed passwords. The vulnerability has been present for approximately 6 weeks. The attacker's IP traces to a known bulletproof hosting provider.

Key Injects

1

Vulnerability Discovery and Scope Assessment

Security team confirms SQLi exploitation. Initial scope: 150K records. What is the forensic preservation plan? Who leads the investigation?

2

Legal Analysis: Notification Obligations

Affected customers span three jurisdictions (EU, UK, US). Legal must determine: which regulators to notify, within what timeframes, and whether individual notification is required.

3

Scope Escalation

Deeper forensic analysis reveals that the attacker also accessed a table containing partial payment card data (last 4 digits, expiry dates). Does this change the notification requirements?

4

Customer Communication Drafting

Draft the notification email to affected customers. What information should be included? What remedial actions should be offered (credit monitoring, password reset)?

5

Media Coverage and Customer Support Surge

News article published. Customer support volume triples. Social media criticism is escalating. How do you manage the response while the investigation continues?

Success Metrics

  • Accurate identification of applicable notification requirements per jurisdiction
  • Regulatory notification initiated within 72 hours (GDPR) or applicable deadline
  • Forensic evidence preserved without disrupting the investigation
  • Clear, empathetic customer notification drafted and approved through legal review
  • Coordinated response across legal, PR, customer support, and security

Lessons to Capture

  • Does the organization maintain an up-to-date data inventory showing what personal data is stored where?
  • Are notification templates pre-drafted for the most likely breach types?
  • Is outside counsel pre-engaged for cross-jurisdictional breach response?
  • Does the customer support team have a breach-specific script and FAQ?
  • Is there a process for determining whether law enforcement notification is required or advisable?
3
Third-Party Risk

Supply Chain Compromise

Supply chain attacks have become a top-tier threat, as demonstrated by incidents like SolarWinds, Kaseya, and the 3CX compromise. This scenario tests your organization's ability to respond when a trusted vendor or software component is compromised, and you must determine your exposure while managing the uncertainty.

Scenario Narrative

A critical SaaS vendor used for identity and access management (IAM) issues an emergency advisory: their build pipeline was compromised, and a malicious update was pushed to customers over the past 10 days. The advisory is vague on technical details. Your organization deployed the affected update 8 days ago. The vendor cannot yet confirm what data may have been accessed through their platform.

Key Injects

1

Vendor Advisory Received

Vague advisory from IAM vendor. Confirmed compromised update. What is the immediate response? Do you isolate the affected systems? What is the blast radius assessment process?

2

Internal Threat Hunting

IOCs are released by the vendor. Your threat hunting team finds matching indicators in DNS logs. What is the escalation path? How do you determine whether the attacker moved laterally from the IAM platform?

3

Vendor Communication Breakdown

The vendor stops providing updates for 12 hours. Rumors circulate on social media that the breach is worse than disclosed. Your board asks: should we cut ties with this vendor? What is the short-term and long-term plan?

4

Customer Impact Assessment

If the IAM vendor handled authentication for your customer-facing applications, your own customers may be affected. What is your obligation to them? Do you notify preemptively or wait for confirmed impact?

Success Metrics

  • Speed of blast radius assessment -- can the team determine affected systems within 2 hours?
  • Documented vendor communication timeline and escalation process
  • Threat hunting initiated with available IOCs within 4 hours
  • Business continuity plan activated for vendor-dependent services
  • Board-level communication providing clear risk assessment without overpromising certainty

Lessons to Capture

  • Is there a current, maintained inventory of critical vendor dependencies?
  • Do vendor contracts include breach notification SLAs and cooperation clauses?
  • Can the organization operate without the affected vendor for 48-72 hours?
  • Are there alternative vendors pre-qualified for critical services?
  • Does the SBOM (Software Bill of Materials) practice identify third-party components in production systems?
4
People Risk

Insider Threat Scenario

Insider threats are uniquely challenging because they involve people the organization trusts, using legitimate access. This scenario tests the intersection of security, HR, legal, and management -- a coordination challenge that purely technical exercises miss entirely.

Scenario Narrative

A DLP (Data Loss Prevention) alert fires: a senior engineer in the R&D department has uploaded 3GB of proprietary source code and product roadmap documents to a personal cloud storage account over the past two weeks. HR confirms the engineer recently gave notice and is leaving for a competitor. The engineer's manager was unaware of the data transfers.

Key Injects

1

DLP Alert and Initial Assessment

DLP system flags bulk upload to personal cloud storage. How do you verify the alert without tipping off the individual? What evidence do you need to preserve?

2

HR-Security Coordination

The engineer is in their notice period with 10 days remaining. What is the coordination protocol between security, HR, legal, and the engineer's management? When and how do you restrict access?

3

Scope Discovery: Additional Exfiltration Channels

Investigation reveals the engineer also emailed files to a personal address and used a USB drive. The scope is larger than initially thought. What is the trade secret protection strategy?

4

Legal Escalation and Remediation

Legal wants to pursue civil action and potentially involve law enforcement. What evidence chain is required? How do you balance investigation with the employee's rights? What preventive controls need strengthening?

Success Metrics

  • DLP alert triaged and investigated within 4 hours
  • HR-Security-Legal coordination initiated with clear roles and responsibilities
  • Access restricted without creating legal liability for wrongful termination
  • Evidence preserved in a forensically sound manner for potential litigation
  • Post-incident access review completed for all departing employees in the last 12 months

Lessons to Capture

  • Is DLP configured to alert on bulk transfers to personal storage and email?
  • Does the offboarding process include a security review triggered by resignation notification?
  • Are non-compete and IP assignment clauses in employment contracts enforceable?
  • Does the organization have an insider threat program with defined escalation paths?
  • Are USB and removable media policies enforced technically, not just by policy?
5
Operational Resilience

Cloud Infrastructure Failure

Cloud infrastructure failures test operational resilience in ways that security-focused exercises often overlook. This scenario exercises the intersection of cloud operations, business continuity, vendor management, and crisis communications when the technology you depend on simply stops working.

Scenario Narrative

Your primary cloud provider experiences a major regional outage affecting compute, storage, and managed database services. The outage begins at 9:00 AM on a business day. The provider's status page acknowledges "degraded performance" but provides no ETA for resolution. Your customer-facing applications, internal tools, and CI/CD pipeline all run in the affected region. Multi-region failover was designed but never tested under real conditions.

Key Injects

1

Initial Outage Detection

Monitoring alerts fire for all services in the affected region. Provider status page says "investigating." What is the impact assessment process? How quickly can you determine which customer-facing services are down?

2

Failover Decision Point

Two hours in. No resolution ETA. Do you trigger multi-region failover? The failover procedure has never been tested in production. What is the risk of a failed failover vs. continued downtime?

3

Customer Communication and SLA Impact

Enterprise customers are requesting status updates. SLA clocks are running. What do you tell customers when you do not know the root cause? How do you manage SLA credit calculations?

4

Data Integrity Concerns

When the region comes back, database consistency checks reveal potential data loss for transactions processed during the outage onset. How do you validate data integrity? What is the reconciliation process?

5

Post-Incident: Architecture Review Request

The CTO requests a plan to prevent this from happening again. What architectural changes are needed? What is the cost-benefit analysis of true multi-region active-active vs. warm standby?

Success Metrics

  • Impact assessment completed within 30 minutes of initial outage
  • Customer communication issued within 1 hour with honest status and expected next update time
  • Failover decision made with documented risk analysis (not by default)
  • Data integrity validation plan ready before services are restored
  • Post-incident architecture recommendations with cost estimates

Lessons to Capture

  • Has the disaster recovery plan been tested with a real failover, not just a documentation review?
  • Are RTOs and RPOs defined for each critical service and validated against actual recovery capabilities?
  • Does the organization have a status page or communication channel for customer-facing incidents?
  • Are there documented runbooks for cloud provider outage scenarios?
  • Is there a clear decision framework for when to trigger failover vs. wait for provider recovery?

Putting It All Together

These five scenarios cover the most critical threat categories that CISOs face: external cyberattacks (ransomware), regulatory obligations (data breach notification), third-party risk (supply chain compromise), human risk (insider threat), and operational resilience (cloud infrastructure failure). Running each of these as a tabletop exercise at least once provides a comprehensive baseline assessment of your organization's response readiness.

A few principles apply across all five scenarios:

  • Rotate participants. Do not run the same exercise with the same people every time. Bring in different business unit leaders, different members of the legal team, different engineers. The exercise should test the organization, not just the incident response team.
  • Inject realism. Use realistic artifacts: mock ransom notes, simulated news articles, draft regulatory notification letters. The more realistic the injects, the more realistic the responses.
  • Document everything. The after-action report is the lasting value of the exercise. Capture not just what happened but why decisions were made, what alternatives were considered, and what follow-up actions are needed.
  • Follow up on findings. The most common failure in exercise programs is running exercises but never acting on the findings. Assign owners, set deadlines, and track remediation actions to completion.

If you are looking for a platform that supports structured inject delivery, real-time participant tracking, and automated after-action reporting for exercises like these, see how Scenarium works or request a demo.

Run These Scenarios on Scenarium

Design, facilitate, and report on tabletop exercises with a platform built for exercise directors who take crisis readiness seriously.

Cookie preferences

We use essential cookies to make Scenarium work. With your permission, we also use optional cookies for preferences and analytics. You can change your choices anytime in Cookie Settings.

Learn more in our Cookie Policy and Privacy Policy.