Cyber Crisis Simulation Platform

Your Team's Next Breach
Is Already Planned

Run immersive cyber crisis exercises — ransomware, OT shutdowns, data breaches — with realistic inject channels, MITRE ATT&CK mappings, and compliance scoring against ISO 27001, NIS 2, DORA, and NIST CSF. Deploy in minutes, debrief with evidence.

Aligned toISO 27001NIST CSF 2.0NIS 2DORA

The Threat Landscape — 2025

The numbers keep moving. Is your team ready when they become yours?

€4.9M
Average cost of a data breach in EMEA
+7%vs €4.6M in 2024
Driven by regulatory fines and remediation costs
IBM Cost of a Data Breach Report, 2025
€9.5M
Average breach cost in the US
+9%vs €8.7M in 2024
All-time high for US organisations
IBM Cost of a Data Breach Report, 2025
258 days
Average time to identify & contain a breach
-19 daysvs 277 days in 2024
Still nearly 9 months of exposure
IBM Cost of a Data Breach Report, 2025
Only 30%
Of organisations run tabletop exercises
-5%vs 35% in 2023
Despite proven €1.4M average savings
Ponemon Institute, 2025

Built For

Whether You Deliver or Defend

For the consultancies that run exercises and the security leaders that need them. One platform, both sides of the table.

For Service Providers

Cybersecurity Consultancies

White-label the platform. Deliver exercises under your brand at scale.

MSSPs & MDR Providers

Add tabletop exercises to your service portfolio with templated scenarios.

Cyber Insurance Carriers

Validate policyholder readiness with exercise scores and framework data.

Law Firms & Breach Counsel

Prepare clients for incident response under legal privilege.

For In-House Security Teams

CISOs & Heads of Cyber

Prove your programme works with board-ready reports and letter grades.

Heads of IT Security

Stress-test incident response before a real attack exposes the gaps.

Compliance & Risk Officers

Generate audit-ready evidence for NIS 2, DORA, ISO 27001, and NIST CSF.

IR Teams & SOC Managers

Build muscle memory with timed injects and performance tracking.

The Problem

Generic Platforms Weren't Built for This

Most exercise platforms handle business continuity, PR crises, and natural disasters. Cyber needs its own tooling — real attack patterns, technical injects, and regulatory frameworks.

Before — Generic Platforms
Generic crisis simulations — not built for cyber or OT incidents
PowerPoint walkthroughs with no technical depth
Subjective debrief — no scoring, no rubrics, no letter grades
No framework mapping — ISO 27001, NIS 2, DORA gaps invisible
Exercises take weeks to plan, results forgotten within days
After — Verdus Cyber
Purpose-built for IT/OT cyber crisis with MITRE ATT&CK mapped injects
Immersive simulation — authentic emails, calls, news, and social media
Scored rubric assessment with letter grades (A+ to F) and radar charts
Framework coverage: ISO 27001, NIST CSF 2.0, NIS 2, and DORA
Deploy in minutes from 9+ sector-specific templates, debrief with evidence

How It Works

From Template to Board-Ready Report

Five steps from choosing a scenario to delivering measurable compliance evidence.

01

Choose a Template

Pick from 9+ sector-specific scenario templates — manufacturing, banking, healthcare, energy, logistics, government — each with pre-built inject sequences and roles.

02

Build Your Inject Library

Customise injects across 17 categories: emails, calls, news articles, social media, OT alerts, legal notices. Each inject maps to MITRE ATT&CK techniques and specific compliance frameworks.

03

Map Rubrics to Frameworks

Attach rubric assessments to each inject — define what a good response looks like and map it to ISO 27001, NIST CSF 2.0, NIS 2, or DORA. Every response gets scored against measurable criteria.

04

Run the Exercise

Execute live with real-time inject delivery, network topology evolution, multi-team coordination, and actor impersonation. Participants see realistic Outlook emails, breaking news, and phone calls.

05

Debrief & Report

8-axis radar charts, letter grades (A+ to F), framework coverage percentages, gap analysis, and board-ready PDF reports. Measurable improvement tracked across exercises over time.

Scenario Library

9 Ready-to-Deploy Scenario Templates

Sector-specific scenarios with pre-configured roles, inject sequences, MITRE ATT&CK mappings, compliance frameworks, and rubric assessments. Deploy in minutes or fully customise for your organisation.

Manufacturing — Production Line Attack

Ransomware / OT

MES and SCADA systems encrypted. Production lines halted. Supply chain under pressure. NCSC notification required.

Practitioner3 hrsNIST CSF
CISO ·Legal Counsel ·Plant Director ·Communications ·IT Director

OT/ICS — Industrial Control System Attack

ICS / SCADA

TRITON-style attack on safety instrumented systems. PLC firmware integrity at risk. Safety interlocks compromised.

Expert3 hrsNIST CSF
OT Security Lead ·Plant Safety Manager ·CISO ·Process Engineer ·IT-OT Network Engineer

Financial Services — Banking Intrusion

Data Breach / BEC

Spear-phishing leads to cloud admin takeover, data exfiltration, and unauthorised SWIFT transfers. FINMA 72-hour clock running.

Practitioner3 hrsDORA
CISO ·Compliance Officer ·Head of Trading ·Communications ·IT Security Lead
Healthcare
ISO 27001 · Practitioner
Energy & Utilities
NIST CSF · Practitioner
Retail
ISO 27001 · Practitioner
Government
ISO 27001 · Practitioner
Logistics
NIST CSF · Expert
Port Terminal
NIS 2 · Practitioner

See It In Action

Platform Preview

Not slide decks. Not checkboxes. Real interfaces that put your team in the middle of a live cyber crisis.

Network Topology

Interactive SVG diagrams with live attack path propagation across IT/OT zones

Network Topology — Manufacturing Scenario
Healthy Degraded Compromised Offline
Internet / WANDMZCorporate LANServer VLANOT NetworkEdge FW203.0.113.1WAF203.0.113.5Web Server10.10.1.10Mail Server10.10.1.20AD Server10.20.1.5Workstations10.20.2.0/24DB Primary10.30.1.10File Server10.30.1.20SCADA HMI172.16.1.10PLC Gateway172.16.1.50Historian172.16.2.10
Attack path detected: Web Server → DB Primary → File Server11 nodes · 5 zones · 10 connections

20+ Inject Channels

Authentic media, communications, and alert rendering across 20+ channels

Media & News
Breaking News
LIVE
Financial Times
|
14:32 GMT · March 24, 2026

Major UK Manufacturer Hit by Cyber Attack; Production Lines Halted Across Three Sites

By Hannah Clarke, Cyber Security Correspondent

ACME Corporation, one of the UK's largest advanced manufacturing groups, has confirmed it is responding to a "significant cybersecurity incident" that has disrupted operations at its facilities in Birmingham, Sheffield, and Newcastle.

Sources close to the matter say the attack has encrypted critical production control systems, forcing an emergency shutdown of automated assembly lines. The company's share price fell 8.3% in early trading.

2.4k shares847 commentsTrending #ACMEhack
Social Media Monitor Trending
JR
@JReynolds_Sec· 3m

Hearing reports of a major ransomware incident at ACME Corp. Multiple sources confirming production shutdown. Anyone else seeing IOCs? #ACMEhack #infosec

142 replies891 reposts2.1k likes
CT
@CyberThreatIntel· 8m
Verified

CONFIRMED: LockBit affiliate claiming ACME Corp attack on their leak site. Timer set to 72 hours. Sample data published includes customer PII and financial records.

67 replies1.2k reposts3.4k likes
Communications
Outlook — Inbox
ER
Erik RichterExternal
e.richter@ransomgroup-notice.com
To: incident-response@acme-corp.com
URGENT: Your files have been encrypted — Time-sensitive

Your network has been compromised. All critical databases and file servers have been encrypted with military-grade AES-256 encryption.

You have 72 hours to respond before we publish 47GB of exfiltrated data.

Incoming Call — CEO OfficeT+45:12
Sarah Mitchell — CEO
+44 20 7123 4567
1:23
"I just got a call from Reuters asking about a data breach. What is going on? I need a full briefing in 30 minutes — who is handling this?"
Response & Triage
IOC Tracker — Active IndicatorsTLP:RED
IP185.220.101.34CriticalBlocked
Domainupdate-srv.darknet.ioHighInvestigating
Hashe3b0c44298fc1c14...b855CriticalQuarantined
CVECVE-2025-21391HighPatching
Decision Log4 decisions logged
T+12:30
CISOEscalation

Activate incident response plan — Severity 1

T+18:45
IT DirectorContainment

Isolate OT network from corporate LAN

T+32:10
LegalLegal

Engage breach counsel — preserve privilege

T+45:00
CommsComms

Hold public statement — await forensic confirmation

Debrief, Rubric Assessment & Compliance

8-axis radar scoring, letter grades, framework gap analysis, and structured rubric grading

Debrief — Rubric Assessment
ISO 27001NIST CSF 2.0NIS 2DORA
CommunicationTechnicalResponseDecisionSpeedRegulatoryComplianceCross-teamCoordinationCrisisLeadershipEvidenceHandlingStakeholderComms8.26.57.15.87.98.76.87.4
Overall Grade
B
7.3 / 10
Response Metrics
Response Rate87%
Avg Quality7.3
Critical Handled5/6
Framework Coverage
ISO 2700178%
NIST CSF 2.072%
NIS 265%
DORA42%
Gap Identified

Regulatory notification not initiated within required 72-hour window. NIS 2 Art. 23 breach.

Strength

Excellent cross-team coordination. All critical injects escalated within response targets.

Impersonation Engine

Inject emails, calls, and messages from realistic personas — regulators, journalists, threat actors, board members — with authentic tone and formatting.

Scenario Templates

Pre-built, sector-specific scenarios — ransomware, supply chain, insider threat, data exfiltration — ready to deploy or fully customise for your organisation.

Built-in Rubric Assessment

Structured scoring rubrics mapped to ISO 27001, NIST CSF 2.0, NIS 2, and DORA. Every response graded against measurable criteria — not subjective opinion.

Why Verdus Cyber

We Built What We Wished Existed

After years of running cyber exercises with spreadsheets, slide decks, and manual scoring — we built the platform we needed. Now we're sharing it.

Built for Partners, Not Just End Users

White-label branding, client management, scenario marketplace, and multi-tenant billing. Consultancies and MSSPs deliver exercises at scale under their own brand.

Enterprise-Ready from Day One

Structured response actions, role-based access controls, multi-language support across 5 languages, and exportable PDF reports ready for board-level presentations.

Measurable, Not Subjective

Every response scored against rubrics mapped to real frameworks. Letter grades, radar charts, and gap analysis — evidence your board and auditors can act on.

See It Live in 30 Minutes

We'll walk you through a live scenario — from inject delivery to debrief scoring — using your sector, your frameworks, and your team structure.

No slides. No generic demo. A real exercise tailored to your organisation.

No commitment requiredLive scenario walkthroughTailored to your sector