This simulation is modeled based on the RECON ISAO threat intelligence group.
It is the simulation of a claim by external threat actors that your organization has been compromised over a long period of time. They have some demands. If you do not meet those demands they will exact consequences.
Test your cybersecurity runbook/playbook/strategy in this dynamic “choose your own adventure” style cyber exercise. See how well your team functions, works together, communicates, and handles this real-world and dynamic threat. As the exercise unfolds your team may involve insurance companies, law enforcement, legal representatives, and even third party technical contractors.
This exercise has been receiving praise from all of those who have been throgh it.