Incident Command Platform
← Resources
Free — No Credit Card

Run a Tabletop Exercise in 15 Minutes

No consultant. No prep time. Pick a scenario, let the AI facilitator run the injects, and get an auto-generated after-action report with findings your team can act on immediately.

Start Free Exercise See How It Works

Built from 150+ real C-Suite tabletop exercises. 7 scenario types ready to go.

150+
Real C-Suite exercises
7
Scenario templates
15 min
To first findings
277 days
Avg. time to contain without practice

How It Works

Three steps. No preparation required. The AI facilitator handles scenario design, inject timing, and documentation.

1

Pick a Scenario

Choose from 7 incident types. Each includes realistic injects, decision points, and regulatory triggers based on real exercises.

2

Run with AI Injects

The facilitator generates pressure dynamically. It adapts to your responses, surfaces deadlines, and tests coordination gaps.

3

Get Your AAR

Auto-generated after-action report with findings, severity ratings, and recommendations. Gaps become tracked remediation items.

7 Real-World Scenarios

Every scenario is modeled on patterns from real incidents. Not hypothetical — built from what actually happens when things go wrong.

🔒

Ransomware

File encryption detected across shared drives. Ransom note demands $2.5M in 72 hours. Pay or rebuild?

🗃

Data Breach

Customer PII exfiltrated via compromised API key. 500K records. 72-hour GDPR clock starts now.

📧

Business Email Compromise

CFO's email compromised. $1.2M wire transfer initiated to a fraudulent account. Can you stop it?

👤

Insider Threat

Departing engineer downloaded 40GB of source code. HR, Legal, and Security need to coordinate.

🔗

Supply Chain

Critical vendor compromised. Malicious update pushed to your production systems. Scope unknown.

🎣

Phishing Campaign

Targeted spear-phishing hits 200 employees. 12 clicked. 3 entered credentials. Lateral movement detected.

DDoS Attack

Customer-facing services down. 40Gbps volumetric attack. Revenue loss mounting. Extortion demand received.

What You Get

Not a template download. A live exercise platform that tests decision-making under pressure and produces documentation you can show auditors.

AI Facilitation

Dynamic injects adapt to your responses. No facilitator prep needed.

📋

Auto-Generated AAR

Executive summary, gaps, and recommendations — generated in seconds.

📈

Gap Tracking

Every finding becomes a tracked remediation item with owner and deadline.

🕑

Regulatory Clocks

SEC 96-hour, GDPR 72-hour, HIPAA deadlines surfaced in real time.

👥

Cross-Functional Testing

Tests coordination between Security, Legal, Comms, and Executive roles.

🔒

Defensible Records

SHA-256 hash-chained timeline proves what happened and when.

Stop guessing if your team is ready

The organizations that recover fastest aren't the ones with the best tools. They're the ones that practiced. Run your first exercise today.

Start Free Exercise See Pricing

Frequently Asked Questions

Is it really free?

Yes. The Squad plan includes 2 tabletop exercises per year during your trial. Full AI facilitation, dynamic injects, and auto-generated after-action report included. No credit card required.

How long does it take?

As little as 15 minutes for a focused readiness check, or 60–90 minutes for a thorough cross-functional exercise. The AI facilitator adapts to your pace.

Do I need my whole team?

No. You can run solo to test your own decision-making, or invite up to 4 team members on the free Squad plan. For larger exercises with 20+ participants, upgrade to Command.

What scenarios are available?

Seven pre-built incident type templates: ransomware, data breach, business email compromise, insider threat, supply chain attack, phishing campaign, and DDoS. Each includes realistic injects and regulatory triggers.

What do I get at the end?

An auto-generated after-action report with executive summary, what worked, gaps identified with severity ratings, and prioritized recommendations. Every gap becomes a tracked remediation item.

Can I use this for compliance?

Yes. The exercise produces defensible documentation with SHA-256 hash-chained timelines, attendance tracking, and findings reports. Many frameworks (NIST, FFIEC, HIPAA, CMMC) require documented exercise programs.