Kuboid
Open Luck·Kuboid.in
Security BSides2025
Open in YouTube ↗

5 Gaps Exposed In 30+ Real-World Tabletop Exercises

Security BSides London270 views39:23about 1 month ago

This talk identifies five critical operational gaps in Security Operations Center (SOC) and Incident Response (IR) teams discovered through conducting over 30 real-world tabletop exercises. It highlights common failures such as the disconnect between documented playbooks and actual team behavior, ambiguous roles during high-pressure incidents, and the lack of structured follow-through on identified lessons. The speaker provides a practical remediation framework to improve incident response maturity, emphasizing the need for clear escalation paths, defined ownership, and business-impact-based prioritization. The presentation serves as a guide for security leaders to harden their incident response processes against real-world threats.

Why Your Incident Response Plan Is Failing Before the First Alert

TLDR: Real-world tabletop exercises across 30+ organizations reveal that most incident response plans are shelfware that fail under pressure. Teams consistently struggle with role ambiguity, a disconnect between documented playbooks and actual technical execution, and a lack of follow-through on post-incident remediation. To fix this, security leaders must move away from compliance-driven exercises and toward scenario-based drills that force teams to practice decision-making under high-pressure, realistic constraints.

Most security teams treat incident response plans like fire extinguishers: they are mounted on the wall for compliance, checked once a year, and rarely touched until a crisis hits. When the actual alert fires, the plan is often the first thing to be abandoned. After facilitating over 30 tabletop exercises for organizations ranging from mid-sized businesses to global enterprises, the pattern is undeniable. The technical teams are often capable, but the operational process surrounding them is brittle.

The Gap Between Documentation and Reality

The most common failure point is the "Plan vs. Reality" gap. Organizations spend weeks drafting NIST-aligned incident response playbooks that look perfect in a PDF. However, when we run a simulation involving a T1566 Phishing attack leading to malicious file execution, the team rarely follows the document.

During a high-pressure simulation, analysts often rely on gut feeling or tribal knowledge rather than the established procedure. In one instance, we observed four analysts debating whether to block an IP or investigate further while the attacker was already moving laterally. The documented playbook clearly dictated the next step, but because the team hadn't practiced it, they defaulted to a consensus-based discussion that cost them critical minutes. If your team isn't using the documentation during a drill, they won't use it during a breach.

The "Uno Reverse" of Role Ambiguity

Decision paralysis is the silent killer of effective incident response. In many organizations, the hierarchy is clear on paper but invisible in the SOC. When an incident escalates, we frequently see a "ping-pong" effect where analysts pass responsibility back and forth, asking "Who owns this?" or "Should I escalate this to management?"

This ambiguity is exacerbated by the lack of a designated Incident Commander. Without a single person empowered to make the call, the team defaults to a committee-based approach. In a fast-moving T1003 OS Credential Dumping scenario, you don't need a committee; you need a decision. If your IR plan doesn't explicitly define who has the authority to pull the plug on a production server, you are essentially waiting for the attacker to finish their job before you start yours.

Why Lessons Die in Slide Decks

The most frustrating gap is the lack of follow-through. After a tabletop exercise, teams often produce a report, present it to leadership, and then file it away. The same technical gaps—such as missing visibility into T1021 Remote Services or lack of asset prioritization—appear in every single exercise.

If a finding doesn't become a ticket in Jira or ServiceNow with a hard deadline and a specific owner, it doesn't exist. We have seen organizations repeat the same mistakes for years because they treat the tabletop as a performance rather than a diagnostic tool. To break this cycle, treat every gap identified in an exercise as a high-priority bug. If you can't fix the underlying process, you haven't actually learned anything.

Prioritizing the Crown Jewels

Finally, many teams fail because they treat every alert with equal urgency. During a simulation, we often see analysts burning hours investigating a low-impact alert on a dev server while a critical production database is being exfiltrated. This happens because the team lacks a clear, shared understanding of the organization's "crown jewels."

If every analyst on your team cannot immediately name your top three most critical systems, your prioritization is broken. You need to map your OWASP Top 10 risks directly to your business-critical assets. When the alerts start flooding in, your team should be able to filter the noise based on business impact, not just alert severity.

Moving Forward

Stop running tabletop exercises just to check a box for your auditors. Start running them to break your team's bad habits. If you want to see how your team actually performs, don't give them a script. Give them an alert, give them a time limit, and see if they can find the documentation before the attacker reaches their goal. The goal of these exercises isn't to prove that your plan works; it's to find the exact moment where it stops working so you can fix it before the real incident arrives. If your team isn't uncomfortable during the drill, you aren't doing it right.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in