Tabletop Exercise Kit

Ransomware Tabletop Kit

A 60–90 minute exercise for public-sector teams to practice containment, restoration priorities, continuity, communications, and executive decisions when ransomware or destructive encryption disrupts critical services.

Expected time

  • Standard: 60–90 minutes
  • Short version: 45 minutes
  • Extended version: up to 2 hours with deeper hotwash

Best participants

  • IT leadership
  • security staff
  • backup, identity, or infrastructure owners
  • executive sponsor / department leadership
  • communications / PIO

What this exercise practices

Threat context

This exercise can lightly reuse the same fictional threat framing used in the KEV tabletop — Spectral Raccoon / APT-1337 — to make exfiltration uncertainty, extortion pressure, and communications discipline more realistic. The adversary label should support the scenario, not dominate it.

Included materials

Recommended flow

  1. Review the facilitator guide and participant brief.
  2. Tailor the impacted services, dependencies, and restoration priorities to your environment.
  3. Run the injects using the rolling timestamps to keep pace and force decisions.
  4. Push participants to make explicit calls on containment, restoration, communications, and escalation.
  5. Capture gaps and owners in the hotwash.