A critical monitoring tool used across your infrastructure has pushed a compromised update. The backdoor provides attackers with persistent remote access. Multiple organizations are affected. You must determine your exposure and contain the threat while the vendor investigates.
How it works: You'll be presented with 3 realistic incident injects. For each one, describe how you would respond as the incident commander. Our AI facilitator engine will analyze your decisions and provide expert coaching feedback, just like having a seasoned incident response facilitator in the room.