The genesis of many cybersecurity exercises begins with a simple request: An executive approaches a manager and says, “We need a tabletop. Get it done.” This request may stir up angst as some planning is required and, to some, may be a new experience. But what do you do when you simply don’t have the luxury of ample time to plan for a cybersecurity exercise? How do you conduct a cybersecurity exercise that is simple yet effective and worth the participants’ valuable time? This presentation will present a simple cybersecurity exercise that may be conducted with minimal planning, is applicable to most organizations and will deliver value by identifying potential deficiencies or confirming the efficacy of existing processes.