SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

BCI Simulation Game

BCI

4 min read
in Career, Learning

Hackers. Ransomware. Data theft. How would you react? Train your business continuity team with our immersive simulation.

Could you handle a cyber attack? Prepare your business and energise your incident response teams by playing this realistic, immersive simulation.

Four players are required in the roles of Incident Manager, Head of IT, Head of Communications and Managing Director. Then, using a realistic virtual desktop with familiar communications channels, players must communicate with stakeholders, read and reply to emails, take phone calls, monitor breaking news and social media, and more.

A Facilitated Exercise:

The simulation pace is controlled by a facilitator – someone knowledgeable to lead the exercise and oversee players’ actions and performance, so they can provide feedback during or after the exercise. Maybe this will be you?

What you get – Access to the game gives you:

  • A unique URL where your participants will register and play in a secure, private environment
  •  A facilitator dashboard to control the exercise
  • A facilitator guide PDF with game objectives, suggested brief and debrief, story timeline and all mechanics.
  • A player’s guide PDF to send to participants
  • Online help docs and support.
  • Unlimited runs of the exercise with different players for one year.

Setting-up the Game:

These are the ingredients for an ideal run of the game:

  • Four participants and a facilitator. The facilitator is the person who buys the exercise. If the facilitator wants to play as a participant too, they will need to use another email and use two different browsers or use incognito mode in order to maintain two identities (i.e. participant and facilitator).
  • A modern browser (Chrome, Firefox or Edge) and an internet connection
  • 45 minutes of time to play. Pausing to reflect on decisions and outcomes will of course make the exercise longer.

FIND OUT MORE

 

Related

Tags: BCIBusiness continuityBusiness Continuity EducationBusiness Continuity LearningCyber securityLearning
2
VIEWS
ADVERTISEMENT

Related Posts

Certified Secure Software Lifecycle Professional (CSSLP)

Certified Secure Software Lifecycle Professional (CSSLP)

June 27, 2022
Software Security Practitioner – Quality Assurance

Software Security Practitioner – Quality Assurance

June 27, 2022
Certified Software Quality Manager (CSQM)

Certified Software Quality Manager (CSQM)

June 27, 2022
Certified Software Quality Analyst (CSQA)

Certified Software Quality Analyst (CSQA)

June 27, 2022

More Articles

Entertainment

Dark Web: Fighting Cybercrime (2021)

February 11, 2021
Incidents

Morgan Stanley client accounts breached

March 25, 2022

Quantum Internet

December 11, 2020
Incidents

BlackCat Attack on Betting Company

April 11, 2022
Incidents

Utah Imaging Associates Notify Nearly 584,000 of PHI Hack

November 22, 2021
Incidents

Tech Vendor Email Breach Affects Dozens of Health Entities

January 5, 2022

W3af

November 4, 2020
Document

Ensuring Cybersecurity While Traveling by NASA

April 7, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....