Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

Security Talk

The anatomy of a tabletop exercise

By Maggie Shein
SEC0821-Talk-Feat-slide1_900px

LPETTET / iStock / Getty Images Plus via Getty Images

SEC0821-talk-slide2_900px
SEC0821-Talk-Feat-slide1_900px
SEC0821-talk-slide2_900px
August 2, 2021

A critical part of ensuring adequate, safe and reliable operations amid a crisis includes comprehensive tabletop exercises to demonstrate and assess capabilities before an event occurs.

Tabletop exercises examine capacities and capabilities to plan for, respond to, and recover from an emergency or security incident that could ultimately affect the business continuity and operational resilience of your organization.

The knowledge that comes from a process-driven approach to identifying, assessing and testing your organization’s risk management plans and practices, allows your security organization to evaluate mitigation and response strategies, as well as identify security gaps and look for areas of potential improvement.

“Among important issues to consider [during the design phase of an exercise] are what vulnerabilities does the security leader perceive exist at the present or in the future,” says Dean Alexander, Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. “The scenario should be crafted to test these risks.”

We’re not only talking about active shooter trainings either. Tabletop exercises should be considered for all sorts of scenarios that might affect your organization from a cyber incident, to hurricanes, to power outages, to pandemics.

“Design trainings that address current, near-term and even ‘unlikely’ threats,” Alexander advises. Doing so not only allows your security team and the organization as a whole to prepare for any number of events, but it gives your team opportunities to work together, while working across departments within your organization and agencies outside of your organization.

In order for tabletop exercises or live trainings to be beneficial to your team and your organization, consider the following critical elements.

 

1. Know who to include.

Of course, aside from scenarios such as weather disasters, pandemics, active shooters and others that could affect any organization, additional tabletop exercises unique to your organization and its inherent risks are imperative and require the leader not only have a good handle on identifying these potential risks, but — perhaps more importantly — also know who to include in the exercises.

“The intent of a well-designed tabletop exercise is to help individuals across the organization better understand their role in an emergency while providing a safe space to think critically about possible scenarios that could impact normal operations. It’s important to have the right people in the room and establish those goals,” says Tracy Skibins, Senior Director of Emergency Management at the University of Notre Dame Police Department.

Every team member involved in planning exercises for your organization should bring a specific value to the event. Determining who to include in the planning and execution of the exercise begins with identifying goals and objectives. Just as response plans should include specific roles, responsibilities and procedures to follow, tabletop exercises should put those response plans to action, clarifying roles and responsibilities within the organization and among other participating organizations.

 

2. Embrace the mistakes.

Another fundamentally important aspect to any tabletop exercise is making mistakes. Indeed, says Skibins, exercises are the times you want your team to make mistakes, for things to go wrong or procedures to be forgotten. This, more than any amount of planning, allows your organization to determine trouble spots, security gaps, and areas that need addressing and fixing before an actual event occurs.

“Remember that it’s OK to make mistakes during the exercise and this should be relayed to all participants prior to go-time,” Skibins says.

 

3. Regroup after completion.

When the exercise is complete, team members need to create an after-action report, says Alexander, and be sure to implement lessons learned in the future. “Obtain feedback from others and don’t ignore what you learned,” he emphasizes.

Skibins agrees that debriefings and after-action reports will go a long way in helping an organization make the most out of their tabletop exercises. “It allows you to plan for improvements and address any snafus,” before an actual emergency arises, she says.

Assessing the exercise after-the-fact can allow leaders to validate processes, identify issues, generate new ideas and even enhance training going forward. Just as they help procedurally, tabletop exercises give stakeholders a chance to work together and build confidence in their own actions and response should a real event come to fruition. Such training can promote teamwork, smooth transitions, and cement defined roles and responsibilities to ensure the organization’s emergency response runs like a well-oiled machine — even if the exact scenario practiced, turns out to be different in reality.

KEYWORDS: emergency management enterprise security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • book

    The characteristics of a thought leader

    See More
  • Brain artwork

    The nonlinear path to a sustainable security culture

    See More
  • soft skills

    The super power of soft skills in security

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing