CloudSync Solutions

Incident Response Tabletop Simulation

Select an Incident Scenario

Choose a realistic cybersecurity incident and work through the incident response process. Each scenario presents decision points, realistic log entries, and guidance based on NIST CSF and ISO 27035 frameworks.

SEV-1 CRITICAL

Ransomware Attack

BlackCat/ALPHV variant targeting file servers. Detected Friday 2:47 AM with encrypted files and $2.5M ransom demand.

Timeline: Friday 2:47 AM

MITRE ATT&CK: T1566, T1078, T1486, T1070

SEV-1 CRITICAL

Phishing → Data Breach

Finance employee clicked phishing link Tuesday 9:15 AM. Credential theft leads to mail forwarding and exfiltration of 12,847 employee records.

Timeline: Tuesday 9:15 AM

MITRE ATT&CK: T1566.001, T1114, T1567

SEV-1 CRITICAL

Insider Threat

Departing employee bulk downloading customer database Thursday 4:30 PM. DLP alerts on USB write and Google Drive upload detected.

Timeline: Thursday 4:30 PM

MITRE ATT&CK: T1074, T1052, T1567

Select a scenario from the Scenarios tab to begin the simulation.

Post-Incident Review

Complete a simulation to generate post-incident review and lessons learned.

No incident simulation completed yet. Complete a scenario to generate lessons learned and recommendations.