Ransomware Readiness & Tabletop Playbook
Introduction
Ransomware remains the single most disruptive cyber threat for small and midsize organizations. In 2024 alone, 63 percent of victims reported weeks of downtime, 47 percent permanently lost data, and the average recovery bill exceeded $1.85 million including reputational impact. You do not need a seven-figure security operations center to prepare. A well-run tabletop exercise can expose your biggest gaps in under one hour using only your existing team and a handful of reusable templates. In this guide, we walk you through a five-step tabletop playbook you can launch by Friday afternoon. No consultants and no fancy tech required. We also share lean-stack hacks—free tools, scripts, comms templates—so you can convert lessons learned into action items on Monday morning.
1. Real-World Impact
1.1 Case Study: “Acme Co.”
Sector: Regional logistics provider (200 employees)
Attack Vector: Phishing email with weaponized Excel macro
Timeline:
- Day 0 – User clicks link at 10 AM
- Day 1 – Malware encrypts file server; backups also encrypted
- Day 3 – Paid $175 K in Bitcoin; full recovery takes 14 days
- Downtime: $120 K/day × 14 days = $1.68 M
- Recovery services: $175 K
- Lost revenue: $350 K
- Reputation: Two major customers churn (≈ $500 K ARR)
- Total: $2.7 M
Acme Co.’s backups were online replicas and inherited the encryption. Their team assumed verification was in place but never tested a restore. A simple tabletop exercise would have caught that.
2. Building Your Playbook
2.1 Step 1 – Assemble Your Team
Who to invite (5–8 people): Incident lead, backup owner, communications lead, legal counsel, finance lead, business owners, optional security consultant or MSP rep.
Roles & responsibilities:
- Incident lead runs and time‐boxes the exercise
- Backup owner explains architecture and last test date
- Communications lead drafts messaging
- Legal counsel flags regulatory and insurance issues
- Finance lead estimates downtime and budget
- Business owners define critical functions and SLAs
Pro tip: Send a one‐page pre‐read mapping each person to their “home play” (for example, backup owner should know RTO, RPO, retention and last restore test date).
2.2 Step 2 – Define Scope & Goals
Systems in scope: File servers, SAN, domain controllers, critical SaaS, workstations.
Systems out of scope: Noncritical dev/test, guest Wi-Fi.
Exercise goals:
- Verify backup integrity and restore process
- Test internal and external communications
- Validate decision‐making chain for law enforcement and C-suite
- Identify tooling gaps in visibility, logging and automation
Example goal: Restore one critical file share to UAT and issue draft customer communications within 30 minutes of detection.
2.3 Step 3 – Develop Injects & Scenarios
Core injects (10 minutes each):
- Initial detection: “At 10:15 AM, user reports encrypted \\Finance share; ransom note displayed.”
- Backup failure: “On-site disk-to-disk backup shows identical encryption timestamps.”
- External pressure: “CFO demands decision on ransom by COB.”
- Regulatory notice: “State AG requires breach notification within 72 hours if PII exfiltrated.”
- Media leak: “Local news outlet names your company.”
Facilitator tips: Keep injects focused, time-box to 10 minutes, capture notes, allow “what if” tangents but steer back to objectives.
2.4 Step 4 – Run the Exercise
- Kickoff (5 min): Welcome, objectives, agenda, ground rules
- Injects (60 min): Read inject, discuss, capture gaps
- Debrief (15 min): What went well? Top three gaps? Owners assigned?
- Action tracking: Use spreadsheet or ticket system with due dates
Dos & don’ts: Stay neutral, push for decisions, avoid tool training mid-play, balance participation.
2.5 Step 5 – Capture Lessons Learned
Categorize gaps:
- Process: No decision tree
- Technology: No immutable backups
- People: Infrequent restore drills
Action plan template:
Gap | Action | Owner | Due |
---|---|---|---|
Backup integrity | Automate backup-verify script | Backup owner | 2 weeks |
Decision matrix | Draft flowchart | Incident lead | 1 week |
Comms templates | Pre-approve customer notices | Comms lead | 3 days |
Schedule a 30 min follow-up in two weeks.
3. Deep Dive: Facilitator Guide Excerpt
This excerpt is pulled from the full facilitator guide. It ensures your session runs on time and keeps participants focused.
3.1 Pre-Workshop Checklist
- Reserve conference room with projector and whiteboards
- Print one Participant Workbook per attendee
- Prepare flip-chart sheets labeled “Decisions,” “Gaps,” “Actions”
- Load slide deck (Slides 1–6) onto USB and cloud share
- Test audio/video equipment and network access
3.2 Timing Script (30-Second Precision)
10:00 – 10:05 AM | Welcome & Objectives
10:05 – 10:15 AM | Inject #1 (Initial detection)
10:15 – 10:25 AM | Inject #2 (Backup failure)
10:25 – 10:35 AM | Inject #3 (External pressure)
10:35 – 10:45 AM | Inject #4 (Regulatory notice)
10:45 – 10:55 AM | Inject #5 (Media leak)
10:55 – 11:10 AM | Debrief & Assign Actions
4. Slide Deck Outline
Your scenario deck includes six core slides plus an appendix.
- Slide 1: Title, date, objectives, scope
- Slide 2: Inject #1 text & discussion prompts
- Slide 3: Inject #2 text & prompts
- Slide 4: Inject #3 text & prompts
- Slide 5: Inject #4 text & prompts
- Slide 6: Inject #5 text & prompts
- Appendix: Glossary (RTO, RPO, immutable backup, air-gap)
5. Participant Workbook Samples
5.1 Role Card: Backup Owner
Name: __________
Role: Backup Owner
Goals:
– Confirm last successful restore test
– Explain backup architecture (on-site, cloud, retention)
– Note any gaps in offsite replication
Key Data:
RTO: 4 hours
RPO: 1 hour
Immutable backup in place: Yes / No
6. Ready-to-Use Inject Scripts
Facilitator reads each verbatim, then fields questions.
- Inject #1: “It is 10:15 AM. User Alice reports her entire \\Finance share is encrypted and she sees a file named READ_ME_NOW.html with a ransom demand of 2 BTC. What do you do first?”
- Inject #2: “Your on-site backup shows a snapshot taken at 9:00 AM, but the files within that snapshot have the same encryption timestamp. Cloud backup check?”
Conclusion & Next Steps
This deep dive equips you to run a fully scripted, highly repeatable tabletop exercise. For the complete slide deck, full facilitator guide, and editable workbooks, download our companion ZIP at yourguardian.io/bytes-playbook. Run this Friday and share your lessons on LinkedIn with #GuardianBytes.
About the Author
Ryan Burch is Founder and Chief Intelligence Officer at Guardian.IO. With over two decades in cybersecurity, including launching the BBB’s Scam Tracker and leading red-team exercises, Ryan brings practical, lean-stack strategies to complex threats. Guardian.IO partners with organizations to build effective, sustainable defenses.
Contact
intel@yourguardian.io
+1 (202) 599-5619
www.yourguardian.io