Incident Response Tabletop Simulation
Choose a realistic cybersecurity incident and work through the incident response process. Each scenario presents decision points, realistic log entries, and guidance based on NIST CSF and ISO 27035 frameworks.
BlackCat/ALPHV variant targeting file servers. Detected Friday 2:47 AM with encrypted files and $2.5M ransom demand.
Timeline: Friday 2:47 AM
MITRE ATT&CK: T1566, T1078, T1486, T1070
Finance employee clicked phishing link Tuesday 9:15 AM. Credential theft leads to mail forwarding and exfiltration of 12,847 employee records.
Timeline: Tuesday 9:15 AM
MITRE ATT&CK: T1566.001, T1114, T1567
Departing employee bulk downloading customer database Thursday 4:30 PM. DLP alerts on USB write and Google Drive upload detected.
Timeline: Thursday 4:30 PM
MITRE ATT&CK: T1074, T1052, T1567
Select a scenario from the Scenarios tab to begin the simulation.
Complete a simulation to generate post-incident review and lessons learned.