THREAT LEVEL: ELEVATED — EXERCISE IN PROGRESS

WHEN DISASTER
STRIKES

K-12 Cybersecurity & Incident Response Tabletop Game

A tabletop exercise game for K-12 technology leaders, administrators, and educators. Navigate real-world data breaches, ransomware attacks, physical disasters, and cyber incidents using NIST Cybersecurity Framework 2.0 and CISA guidance.

Generate Scenario How to Play
40+Scenarios
6CSF Functions
5Threat Types
AI-Generated

// game mechanics

How to Play

Designed for CTOs, Directors of Technology, campus administrators, and IT staff in K-12 school districts. Teams compete by crafting the best response to crisis scenarios — scored by peers.

01

Form Teams

Divide participants into 2–6 teams of 3–5 people. Each team selects a team name and designates a spokesperson.

02

Draw a Scenario

Use the Scenario Generator below or select from the library. Each team views the same scenario simultaneously.

03

Deliberate (5–10 min)

Teams discuss internally and draft a response using the Anatomy of a Response framework. Use the NIST CSF as a guide.

04

Present & Vote

Each team's spokesperson presents their response. The group votes on the most complete, realistic response. Winning team advances on the board.

05

Review CISA Guidance

After voting, reveal the CISA-aligned response guidance embedded in each scenario card. Discuss gaps and lessons learned.

06

First to Finish Wins

Roll the die below to advance. The first team to reach the FINISH space on your physical or digital game board wins.

🎲
RESULT

Click the die to roll for team movement. Winning team rolls after each round.


// response framework

Anatomy of a Response

All team responses must address these five questions as completely as possible within the time limit. Incomplete answers score lower when peers vote.

Q1 — Time

What is your Recovery Time Objective (RTO)? How long can operations be offline before severe business impact?

Q2 — Likelihood

What is the probability of this scenario? Rate as Rare / Possible / Likely / Near-Certain and explain why.

Q3 — Impact

What is the impact on district operations? Consider students, staff, legal exposure, finances, and reputation.

Q4 — Stakeholders

Who needs to be involved? Name specific roles: CTO, Superintendent, Legal, Law Enforcement, CISA, Vendor, Media, etc.

Q5 — Recovery

What data/systems must be restored first? Prioritize by criticality to student safety and district operations.

Q6 — Prevention (Bonus)

What controls would prevent recurrence? Reference NIST CSF 2.0 Protect and Govern functions for bonus points.


// nist cybersecurity framework 2.0

NIST CSF 2.0 Quick Reference

The National Institute of Standards and Technology Cybersecurity Framework 2.0 provides six core functions that serve as the backbone for every scenario response in this game. Each scenario card maps to relevant CSF functions.

GV
Govern

Policies, roles, responsibilities, and risk strategy. The foundation of cybersecurity governance.

ID
Identify

Asset management, risk assessment, and understanding the cybersecurity environment.

PR
Protect

Access control, training, data security, and protective technology to limit impact.

DE
Detect

Continuous monitoring and detection processes to identify cybersecurity events.

RS
Respond

Response planning, communications, analysis, and mitigation after incidents.

RC
Recover

Recovery planning, improvements, and communications to restore capabilities.

NIST CSF 2.0 → CSF Profiles → Quick-Start Guides →

// ai-powered scenario generation

Scenario Generator

Generate a random scenario from the built-in library — or use AI to create a brand-new scenario tailored to your district's context. Each generated scenario includes CISA-aligned response guidance.

● SYSTEM READY

Incident Scenario Terminal

📡

Select options above and click GENERATE to draw a scenario


// scenario library

All Scenarios

Click any scenario card to view the full incident description, discussion prompts, and CISA-aligned response guidance.


CISA & NIST Resources

Official federal cybersecurity resources to support your district's preparedness, planning, and response efforts.

NIST

NIST Cybersecurity Framework 2.0

The foundational voluntary framework for managing and reducing cybersecurity risk — now including the Govern function.

NIST

CSF Organizational Profiles

Templates and examples for creating your district's Current Profile and Target Profile using the CSF.

NIST

CSF Quick-Start Guides

Step-by-step implementation guides tailored for small organizations, enterprises, and specific sectors.

CISA

CISA Tabletop Exercise Packages (CTEPs)

Free, ready-to-use tabletop exercise packages covering active shooters, ransomware, bomb threats, and more — designed for K-12.

CISA

CISA Cybersecurity Scenarios

Official scenario-based training resources for cybersecurity awareness and incident response planning.

CISA

CISA K-12 Cybersecurity

Dedicated CISA resources for K-12 schools including toolkits, assessments, and the Cyber Hygiene Vulnerability Scanning service (free).

CISA

StopRansomware.gov

The U.S. Government's one-stop resource for ransomware guidance, alerts, and incident reporting for critical infrastructure including schools.

CISA

Report a Cyber Incident to CISA

Schools can report significant cyber incidents directly to CISA. CISA provides no-cost technical assistance to affected organizations.

CISA / MS-ISAC

Ransomware Guide (PDF)

Joint CISA and MS-ISAC ransomware guide covering best practices, response steps, and recovery checklists.

CISA CTEP Situation Manuals (This Project)

K-12 Active Threat

Comprehensive active threat scenario for K-12 campuses covering lockdown, evacuation, and communications protocols.

Bomb Threat

School bomb threat response covering threat assessment, evacuation decisions, law enforcement coordination, and communications.

Ransomware Attack

Ransomware incident response for K-12 IT departments covering isolation, reporting, recovery, and CISA coordination.

Vendor / Supply Chain Compromise

Third-party vendor compromise scenario addressing supply chain risk, breach notification, and vendor management controls.