A structured, discussion-based walkthrough of how your team would respond when critical systems and backups are under pressure. No live changes—only clarity, gaps, and priorities.
By the end of the session, the team should agree on:
Adapt titles to your org. One person should be facilitator (keeps time, reads injects) and one scribe (decision log, follow-ups).
Sets priorities, approves major tradeoffs (e.g., restore vs rebuild), coordinates with leadership.
Explain realistic restore paths, dependencies, and time orders; flag technical blockers early.
Define minimum viable service, acceptable downtime, and customer or regulatory messaging needs.
Employee notifications, customer or partner updates, templates, and approval chains.
Ransom or data-breach angles, insurance, contractual SLAs, and vendor escalation paths.
Facilitator reads aloud, then pauses for questions of fact (not solutioning yet).
Thursday, 06:12 local time. Monitoring shows several core services slow or unavailable. File shares return errors. Some endpoints report encrypted files with a ransom note. At approximately the same time, your primary site loses utility power; the generator tests weekly but has not carried full load in a storm before.
Your backup stack includes agents on protected systems, a local backup appliance, and offsite cloud replication for disaster recovery. Not every team member has used the restore tools hands-on.
Adjust minutes to your schedule. Facilitator announces phase shifts.
| Phase | Focus | Prompt |
|---|---|---|
| 0–10 min | Orientation | Objectives, roles, scenario read-through. |
| 10–30 min | Detection & triage | How do we know it’s real? Who is contacted first? When do we involve legal or executives? |
| 30–50 min | Containment & priorities | Isolate or preserve evidence? Freeze backups? What stays up for revenue or safety? |
| 50–75 min | Recovery strategy | Restore from local vs cloud, order of operations, RTO/RPO checks, test restore vs production cutover. |
| 75–95 min | Injects | Facilitator introduces 1–2 curveballs from the inject list. |
| 95–120 min | Wrap-up | Decision log review, top three follow-ups, owners, next rehearsal date. |
Introduce one at a time after the team has a working plan. Ask: “What changes now?”
The primary backup admin is on a flight; the secondary hasn’t logged in for six months. Where is the break-glass documentation?
Logs suggest the affected server may have replicated corrupted or malicious state into the latest backup chain. How do you choose a restore point?
Offsite replication is delayed; cloud restores are slower than planned. Local appliance is intact. How do you communicate revised expectations?
Legal says you must notify a regulator within 36 hours if personal data was exposed. What evidence do you need before that send?
Copy to a shared doc during the session. Short bullets beat paragraphs.
| Time | Decision or assumption | Owner / follow-up |
|---|---|---|