
Find the gaps between documented procedures and actual behaviour — before an attacker exploits them. Measurable evidence for NIS2, DORA, and board-level assurance.
When Maersk was hit by NotPetya, their response team discovered their escalation paths didn't work at 3am. Cost: $300M. Every organisation has blind spots. The question is whether you find them in a simulation — or a breach.
Time-compressed simulation where the attacker advances while you deliberate. Real consequences for delay. Output isn't a meeting summary — it's "CISO approval latency: 47 min. Target: 15 min."
A conversation, not a configuration nightmare
Real-time crisis simulation where AI teams escalate to human decision-makers
Purpose-built for organisational decision-making, not individual training.
Track footholds, lateral movement, and stolen credentials. See exactly how the attacker reached your crown jewels.
AI teams behave like yours: "Joe is sick," "CAB approval required," "vendor SLA is 4 hours." Discover which policies cost you the breach.
The twin improves with every exercise. Corrections accumulate. Patterns emerge. Over time, the simulation becomes an increasingly accurate model of how your organisation actually behaves.
The clock keeps running. While you're debating severity levels, the attacker is moving laterally. Hesitation has consequences you can measure.
Attacks and defences grounded in industry frameworks. Evidence-grade output for post-exercise review.
100% EU infrastructure. No US services in the data path. Your exercise data stays in your jurisdiction.
Tabletop exercises produce meeting notes. We produce measurable response data.
Insight: CAB approval policy added 24 minutes. That policy cost you the customer data.
Where playbooks break down under pressure
Which decisions cause friction between teams
Who becomes a bottleneck in escalation
How long decisions actually take vs documented SLAs
What information was missing when it mattered
Which attack paths went unnoticed until too late
Regulators want evidence your response works — not documentation that it exists.
"Appropriate and proportionate measures" — we give you timestamped proof they work under pressure.
ICT-related incident response testing with "realistic scenarios" — not tabletop theatre.
"How do we know our IR works?" Show them the data: decision latencies, bottlenecks found, gaps closed.
CISOs testing organisational readiness — not individual skills. See how your teams actually coordinate under pressure.
Develop crisis leadership with exercises where delay has consequences and decisions shape outcomes.
Replace checkbox exercises with auditable evidence. Immutable event logs, MITRE ATT&CK aligned, export-ready.
20+ years in defence and cyber security. British Army (Royal Signals) to Head of Information Security at critical national infrastructure. NCSC, NIS2, and DORA expertise.
LinkedIn
20+ years in agile software engineering, management, architecture, and coaching. Now building agentic AI - turning research into production systems that handle trust, evaluation, and memory.
LinkedInWe're working with early partners to refine the platform.
Get in Touch