Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

Security Talk

The anatomy of a tabletop exercise

By Maggie Shein
SEC0821-Talk-Feat-slide1_900px

LPETTET / iStock / Getty Images Plus via Getty Images

SEC0821-talk-slide2_900px
SEC0821-Talk-Feat-slide1_900px
SEC0821-talk-slide2_900px
August 2, 2021

A critical part of ensuring adequate, safe and reliable operations amid a crisis includes comprehensive tabletop exercises to demonstrate and assess capabilities before an event occurs.

Tabletop exercises examine capacities and capabilities to plan for, respond to, and recover from an emergency or security incident that could ultimately affect the business continuity and operational resilience of your organization.

The knowledge that comes from a process-driven approach to identifying, assessing and testing your organization’s risk management plans and practices, allows your security organization to evaluate mitigation and response strategies, as well as identify security gaps and look for areas of potential improvement.

“Among important issues to consider [during the design phase of an exercise] are what vulnerabilities does the security leader perceive exist at the present or in the future,” says Dean Alexander, Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. “The scenario should be crafted to test these risks.”

We’re not only talking about active shooter trainings either. Tabletop exercises should be considered for all sorts of scenarios that might affect your organization from a cyber incident, to hurricanes, to power outages, to pandemics.

“Design trainings that address current, near-term and even ‘unlikely’ threats,” Alexander advises. Doing so not only allows your security team and the organization as a whole to prepare for any number of events, but it gives your team opportunities to work together, while working across departments within your organization and agencies outside of your organization.

In order for tabletop exercises or live trainings to be beneficial to your team and your organization, consider the following critical elements.

 

1. Know who to include.

Of course, aside from scenarios such as weather disasters, pandemics, active shooters and others that could affect any organization, additional tabletop exercises unique to your organization and its inherent risks are imperative and require the leader not only have a good handle on identifying these potential risks, but — perhaps more importantly — also know who to include in the exercises.

“The intent of a well-designed tabletop exercise is to help individuals across the organization better understand their role in an emergency while providing a safe space to think critically about possible scenarios that could impact normal operations. It’s important to have the right people in the room and establish those goals,” says Tracy Skibins, Senior Director of Emergency Management at the University of Notre Dame Police Department.

Every team member involved in planning exercises for your organization should bring a specific value to the event. Determining who to include in the planning and execution of the exercise begins with identifying goals and objectives. Just as response plans should include specific roles, responsibilities and procedures to follow, tabletop exercises should put those response plans to action, clarifying roles and responsibilities within the organization and among other participating organizations.

 

2. Embrace the mistakes.

Another fundamentally important aspect to any tabletop exercise is making mistakes. Indeed, says Skibins, exercises are the times you want your team to make mistakes, for things to go wrong or procedures to be forgotten. This, more than any amount of planning, allows your organization to determine trouble spots, security gaps, and areas that need addressing and fixing before an actual event occurs.

“Remember that it’s OK to make mistakes during the exercise and this should be relayed to all participants prior to go-time,” Skibins says.

 

3. Regroup after completion.

When the exercise is complete, team members need to create an after-action report, says Alexander, and be sure to implement lessons learned in the future. “Obtain feedback from others and don’t ignore what you learned,” he emphasizes.

Skibins agrees that debriefings and after-action reports will go a long way in helping an organization make the most out of their tabletop exercises. “It allows you to plan for improvements and address any snafus,” before an actual emergency arises, she says.

Assessing the exercise after-the-fact can allow leaders to validate processes, identify issues, generate new ideas and even enhance training going forward. Just as they help procedurally, tabletop exercises give stakeholders a chance to work together and build confidence in their own actions and response should a real event come to fruition. Such training can promote teamwork, smooth transitions, and cement defined roles and responsibilities to ensure the organization’s emergency response runs like a well-oiled machine — even if the exact scenario practiced, turns out to be different in reality.

KEYWORDS: emergency management enterprise security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • book

    The characteristics of a thought leader

    See More
  • Brain artwork

    The nonlinear path to a sustainable security culture

    See More
  • soft skills

    The super power of soft skills in security

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing