• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Life Sciences
  • Investments
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage

How to Run a High-Impact Healthcare Cybersecurity TTX

by T.J. Ramsey, Sr. Director, Threat Operations at Fortified Health Security 01/14/2026 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print
How to Run a High-Impact Healthcare Cybersecurity TTX
T.J. Ramsey, Sr. Director, Threat Operations at Fortified Health Security

A well-orchestrated healthcare cybersecurity tabletop exercise (TTX) can greatly benefit any healthcare organization. Unfortunately, some TTXs are chaotic and unproductive. When 25 hospital leaders are tied up in a disorganized TTX for four hours, that’s 100 hours of lost productivity.

Here are some tips for how to conduct successful healthcare TTXs that can dramatically improve your preparedness for cyber crises:

Choose your invitations carefully – I’ve been in tabletop exercises that involved 60 hospital employees. That’s generally too many attendees. Ten to 25 people is the norm if you’re including people from across the enterprise: C-suite, legal, compliance, IT staff, etc. If an exercise is only for IT staffers, five to 10 attendees might be plenty.

Select an impartial facilitator – Managed Security Service Providers (MSSPs) make ideal TTX facilitators because they have deep technical expertise and can speak honestly because they’re not involved in hospital governance. Putting all the slide decks and support materials together for an exercise is a time-consuming chore, so outsourcing that to a security partner makes sense.

Don’t let the session exceed four hours in length – A four-hour duration gives everyone a chance to contribute without the exercise turning into a marathon.

Don’t let attendees defer to one or two executives – Sometimes TTX participants are afraid to “buck the boss” during an exercise, deferring again and again to what a CIO or CISO is saying. Here’s an interesting experiment: ask the CIO and CISO to pretend like they’re on vacation and unreachable for the next 30 minutes. In many cyber incidents, key executives are temporarily unreachable – and the TTX can simulate what would actually happen if that were the case.

Look for signs of overconfidence and denial – Most exercises begin with a cybersecurity scenario like “you’ve just been hit with ransomware.” It’s not unusual for participants to immediately respond, “That could never happen to us – we have a great EDR.” But for a TTX to be successful, participants must assume that one of their safeguards has failed. Some hospital executives stubbornly refuse to believe that their EDR could be circumvented or that the threat actor’s approach may not set off alarms right away and allow ransomware to get in.

Be on the lookout for “we’re working on it” responses – When a weakness gets exposed, some TTX participants are likely to sugar-coat the situation and say “we’re working on a fix for that problem” or “that’s in development.” In reality, the organization may have some glaring deficiencies that need to be swiftly addressed.

Never schedule more than two full-scale TTXs per year – An exercise usually identifies numerous procedural and policy-level gaps – and those can take significant time to remedy. You have to give people ample time to fix the problems. For example, if an organization needs to ratify an emergency communication plan, that’s obviously not an overnight task.

Encourage departmental mini-tabletop drills – Once a full-scale TTX has concluded, it’s the perfect time for individual departments to conduct mini-tabletop exercises. After facilitating a TTX recently, I encouraged the nursing director to meet with her department heads. Just tell them “This is what we uncovered in our recent TTX and I’d like you to discuss it with your staff.” You can go to the NICU nurses and say, “If these systems are down, walk me through what you’d do.” A mini-exercise isn’t disruptive or time-consuming – and it keeps the staff more engaged in security issues.

In addition to the tips shared here, the Cybersecurity & Infrastructure Security Agency (CISA) offers helpful suggestions for how to conduct an effective cybersecurity TTX. 

In role-playing games like Dungeons & Dragons, the worst you can do is lose the game. But in a role-playing exercise like a TTX, you discover that you could potentially lose millions of dollars if you don’t have the right teamwork and procedural/policy clarity.


About T.J. Ramsey

T.J. Ramsey is Senior Director, Threat Operations at Fortified Health Security with 18 years of experience in healthcare and defense intelligence. He served as a U.S. Army Military Intelligence Analyst for the Department of Defense and held security roles at Obsidian Solutions Group and SAIC/Leidos.

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tagged With: Cybersecurity

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

Featured Research Report

2026 Best in KLAS Awards: The Full List of Software & Services Winners

Most-Read

RadNet Subsidiary DeepHealth Acquires French Radiology AI Leader Gleamer

RadNet’s $269M AI Play: DeepHealth Acquires French AI Gleamer

Walgreens Launches Virtual Weight Management Platform for Self-Pay GLP-1 Patients

Walgreens Launches Virtual Weight Management Platform for Self-Pay GLP-1 Patients

KLAS Digital Pathology 2026 Report: Top IMS, Scanner, and AI Vendors Evaluated

KLAS Digital Pathology 2026 Report: Top IMS, Scanner, and AI Vendors Evaluated

The "Platform" Squeeze: Epic Releases Native AI Charting, Putting Venture-Backed Scribes on Notice

The “Platform” Squeeze: Epic Releases Native AI Charting, Putting Venture-Backed Scribes on Notice

Analysis: Oracle Cerner’s Plans for a National EHR

Oracle May Cut 30k Jobs and Sell Cerner to Fund $156B OpenAI Deal

The $1.9B Exit: Why CommonSpirit is Insourcing Revenue Cycle and Tenet is Betting Big on Conifer AI

The $1.9B Exit: Why CommonSpirit is Insourcing Revenue Cycle and Tenet is Betting Big on Conifer AI

KLAS 2026 Rankings: Aledade and Guidehealth Named Top VBC Enablement Firms

KLAS 2026 Rankings: Aledade and Guidehealth Named Top VBC Enablement Firms

Beyond the Hype: New KLAS Data Validates the Financial and Clinical ROI of Ambient AI

Beyond the Hype: New KLAS Data Validates the Financial and Clinical ROI of Ambient AI

Anthropic Debuts ‘Claude for Healthcare’ and Opus 4.5 to Engineer the Future of Life Sciences

Anthropic Debuts ‘Claude for Healthcare’ and Opus 4.5 to Engineer the Future of Life Sciences

OpenAI Debuts ChatGPT Health: A ‘Digital Front Door’ That Connects Medical Records to Agentic AI

OpenAI Debuts ChatGPT Health: A ‘Digital Front Door’ That Connects Medical Records to Agentic AI

Secondary Sidebar

Footer

Company

  • About Us
  • 2026 Editorial Calendar
  • Advertise with Us
  • Reprints and Permissions
  • Op-Ed Submission Guidelines
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2026. HIT Consultant Media. All Rights Reserved. Privacy Policy |