{"id":792,"date":"2025-05-09T16:01:33","date_gmt":"2025-05-09T21:01:33","guid":{"rendered":"https:\/\/stagefoursecurity.com\/blog\/?p=792"},"modified":"2025-05-09T16:11:14","modified_gmt":"2025-05-09T21:11:14","slug":"tabletop-exercises-that-work","status":"publish","type":"post","link":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/","title":{"rendered":"Tabletop Exercises that Work"},"content":{"rendered":"<article>\n<header>\n<h1>\ud83e\uddea Tabletop Exercises That Actually Work<\/h1>\n<p><em>By James K. Bishop, vCISO | Founder, <a href=\"https:\/\/stagefoursecurity.com\" target=\"_blank\" rel=\"noopener\">Stage Four Security<\/a><\/em><\/p>\n<\/header>\n<section><a href=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-804\" src=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-300x200.png\" alt=\"\" width=\"400\" height=\"267\" srcset=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-300x200.png 300w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-1024x683.png 1024w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-768x512.png 768w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png 1536w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a>Most organizations conduct tabletop exercises. Few do them well. When poorly designed, they feel like scripted compliance drills\u2014detached from reality and offering little value. But when done right, tabletop exercises become one of the most powerful tools to test continuity plans, align decision-makers, and identify blind spots before they\u2019re exploited during a real crisis.<\/p>\n<p>This post will guide you through how to build <strong>tabletops that simulate pressure, prioritize realism, and provoke learning<\/strong>.<\/p>\n<\/section>\n<section>\n<h2>\ud83c\udfaf What a Tabletop Is\u2014and Is Not<\/h2>\n<ul>\n<li><strong>It\u2019s not a penetration test:<\/strong> No command-line exploits or red team payloads<\/li>\n<li><strong>It\u2019s not a disaster film:<\/strong> It\u2019s not about chaos\u2014it\u2019s about decision-making under stress<\/li>\n<li><strong>It\u2019s not just IT\u2019s problem:<\/strong> Legal, PR, HR, and executive teams must be involved<\/li>\n<li><strong>It is:<\/strong> A scenario-based rehearsal of roles, communication, recovery procedures, and escalation decisions<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2>\ud83e\udde9 Designing the Right Scenario<\/h2>\n<ul>\n<li><strong>Scenario realism:<\/strong> Use recent threat models\u2014ransomware, supply chain compromise, SaaS outage, cloud credential leak<\/li>\n<li><strong>Cross-functional relevance:<\/strong> Ensure the scenario affects multiple business units and requires coordinated decisions<\/li>\n<li><strong>Pressure escalation:<\/strong> Introduce variables mid-scenario (e.g., media leak, regulator call, second system failure)<\/li>\n<li><strong>Uncertainty:<\/strong> Withhold perfect information\u2014simulate unclear logs, bad intel, or missing communication<\/li>\n<\/ul>\n<p>The best tabletops <strong>replicate the tempo and ambiguity<\/strong> of real incidents.<\/p>\n<\/section>\n<section>\n<h2>\ud83d\udc65 Who Needs to Be at the Table?<\/h2>\n<ul>\n<li><strong>Incident commander or executive lead<\/strong> \u2013 Drives strategy and prioritization<\/li>\n<li><strong>IT\/Cloud operations<\/strong> \u2013 Handles system and infrastructure response<\/li>\n<li><strong>Security (SOC\/IR)<\/strong> \u2013 Provides threat context and risk analysis<\/li>\n<li><strong>Legal &amp; compliance<\/strong> \u2013 Guides regulatory timelines, breach notification<\/li>\n<li><strong>HR &amp; communications<\/strong> \u2013 Coordinates internal comms, employee impacts<\/li>\n<li><strong>Third-party stakeholders (optional)<\/strong> \u2013 Simulate vendor dependencies or managed service providers<\/li>\n<\/ul>\n<p><strong>BC\/DR plans fail at the seams<\/strong>\u2014get everyone who owns a seam in the room.<\/p>\n<\/section>\n<section>\n<h2>\ud83d\udccb Key Artifacts to Prepare<\/h2>\n<ul>\n<li><strong>Scenario deck:<\/strong> Step-by-step reveal of scenario elements with timestamps<\/li>\n<li><strong>Injects:<\/strong> Timed disruptions, alerts, or news drops to steer the simulation<\/li>\n<li><strong>Participant roles:<\/strong> Clear expectations of who is playing their real-world role vs. observing<\/li>\n<li><strong>Rules of engagement:<\/strong> Explain \u201cgame rules\u201d\u2014how time, communication, and decisions will be handled<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2>\ud83e\udde0 How to Facilitate for Impact<\/h2>\n<ul>\n<li><strong>Ask probing questions:<\/strong> &#8220;How would you communicate this?&#8221; &#8220;Where is the playbook?&#8221; &#8220;Who makes the call?&#8221;<\/li>\n<li><strong>Stay neutral:<\/strong> The facilitator is not the adversary\u2014you&#8217;re guiding discovery, not trapping teams<\/li>\n<li><strong>Adapt in real time:<\/strong> If a team goes off-script or finds a creative solution\u2014follow the rabbit trail<\/li>\n<\/ul>\n<p>The best tabletops feel like a tense but structured conversation\u2014not a performance.<\/p>\n<\/section>\n<section>\n<h2>\ud83e\uddfe Debrief Like You Mean It<\/h2>\n<ul>\n<li><strong>Capture observations live:<\/strong> Use a notetaker or recorder to avoid memory bias<\/li>\n<li><strong>Rate responses:<\/strong> What worked? What stalled? What required executive clarity?<\/li>\n<li><strong>Follow with action items:<\/strong> Don\u2019t file the report and forget\u2014assign owners and deadlines<\/li>\n<li><strong>Celebrate participation:<\/strong> Publicly thank contributors and encourage learning culture<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2>\ud83d\udce3 Final Thought<\/h2>\n<p>The value of a tabletop isn\u2019t measured in perfect answers\u2014it\u2019s measured in the gaps you find and close before a real incident forces your hand. Real resilience is built when your teams rehearse not what to do when everything works\u2014but what to do when nothing does.<\/p>\n<p><strong>Want help designing a scenario, facilitating a simulation, or building your tabletop library?<\/strong> <a href=\"https:\/\/stagefoursecurity.com\/blog\/partner-with-stage-four-security\/\" target=\"_blank\" rel=\"noopener\">Let\u2019s talk<\/a>.<\/p>\n<\/section>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>\ud83e\uddea Tabletop Exercises That Actually Work By James K. Bishop, vCISO | Founder, Stage Four Security Most organizations conduct tabletop [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[37],"tags":[],"class_list":["post-792","post","type-post","status-publish","format-standard","hentry","category-business-continuity-disaster-recovery"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tabletop Exercises that Work - Stage Four Security Blog<\/title>\n<meta name=\"description\" content=\"Run disaster simulations that prepare your team\u2014not just your tech\u2014using realistic scenarios and outcome-driven playbooks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tabletop Exercises that Work - Stage Four Security Blog\" \/>\n<meta property=\"og:description\" content=\"Run disaster simulations that prepare your team\u2014not just your tech\u2014using realistic scenarios and outcome-driven playbooks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Stage Four Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-09T21:01:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-09T21:11:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"stagefoursec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stagefoursec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\"},\"author\":{\"name\":\"stagefoursec\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde\"},\"headline\":\"Tabletop Exercises that Work\",\"datePublished\":\"2025-05-09T21:01:33+00:00\",\"dateModified\":\"2025-05-09T21:11:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-300x200.png\",\"articleSection\":[\"Business Continuity &amp; Disaster Recovery\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\",\"name\":\"Tabletop Exercises that Work - Stage Four Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-300x200.png\",\"datePublished\":\"2025-05-09T21:01:33+00:00\",\"dateModified\":\"2025-05-09T21:11:14+00:00\",\"description\":\"Run disaster simulations that prepare your team\u2014not just your tech\u2014using realistic scenarios and outcome-driven playbooks.\",\"breadcrumb\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png\",\"contentUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stagefoursecurity.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tabletop Exercises that Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#website\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/\",\"name\":\"Stage Four Security Blog\",\"description\":\"Protecting today, fortifying tomorrow\",\"publisher\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stagefoursecurity.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\",\"name\":\"Stage Four Security Blog\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png\",\"contentUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png\",\"width\":1000,\"height\":150,\"caption\":\"Stage Four Security Blog\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde\",\"name\":\"stagefoursec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g\",\"caption\":\"stagefoursec\"},\"sameAs\":[\"https:\/\/stagefoursecurity.com\/blog\"],\"url\":\"https:\/\/stagefoursecurity.com\/blog\/author\/admin_w171pcka\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tabletop Exercises that Work - Stage Four Security Blog","description":"Run disaster simulations that prepare your team\u2014not just your tech\u2014using realistic scenarios and outcome-driven playbooks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/","og_locale":"en_US","og_type":"article","og_title":"Tabletop Exercises that Work - Stage Four Security Blog","og_description":"Run disaster simulations that prepare your team\u2014not just your tech\u2014using realistic scenarios and outcome-driven playbooks.","og_url":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/","og_site_name":"Stage Four Security Blog","article_published_time":"2025-05-09T21:01:33+00:00","article_modified_time":"2025-05-09T21:11:14+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png","type":"image\/png"}],"author":"stagefoursec","twitter_card":"summary_large_image","twitter_image":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png","twitter_misc":{"Written by":"stagefoursec","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#article","isPartOf":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/"},"author":{"name":"stagefoursec","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde"},"headline":"Tabletop Exercises that Work","datePublished":"2025-05-09T21:01:33+00:00","dateModified":"2025-05-09T21:11:14+00:00","mainEntityOfPage":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/"},"wordCount":538,"publisher":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#organization"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage"},"thumbnailUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-300x200.png","articleSection":["Business Continuity &amp; Disaster Recovery"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/","url":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/","name":"Tabletop Exercises that Work - Stage Four Security Blog","isPartOf":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage"},"thumbnailUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop-300x200.png","datePublished":"2025-05-09T21:01:33+00:00","dateModified":"2025-05-09T21:11:14+00:00","description":"Run disaster simulations that prepare your team\u2014not just your tech\u2014using realistic scenarios and outcome-driven playbooks.","breadcrumb":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#primaryimage","url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png","contentUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/BCDR-Tabletop.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/tabletop-exercises-that-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stagefoursecurity.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tabletop Exercises that Work"}]},{"@type":"WebSite","@id":"https:\/\/stagefoursecurity.com\/blog\/#website","url":"https:\/\/stagefoursecurity.com\/blog\/","name":"Stage Four Security Blog","description":"Protecting today, fortifying tomorrow","publisher":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stagefoursecurity.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/stagefoursecurity.com\/blog\/#organization","name":"Stage Four Security Blog","url":"https:\/\/stagefoursecurity.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png","contentUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png","width":1000,"height":150,"caption":"Stage Four Security Blog"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde","name":"stagefoursec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g","caption":"stagefoursec"},"sameAs":["https:\/\/stagefoursecurity.com\/blog"],"url":"https:\/\/stagefoursecurity.com\/blog\/author\/admin_w171pcka\/"}]}},"_links":{"self":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=792"}],"version-history":[{"count":3,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/792\/revisions"}],"predecessor-version":[{"id":811,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/792\/revisions\/811"}],"wp:attachment":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}