Cyber attacks can be devastating. Improve preparedness, compliance and Customer Support with Conducttr
Security Breach and Cyber Threat Simulation
...
A data breach or cyberattack can lead to compromised customer data, financial losses, and damage to your company’s reputation which is why training for cyber attacks is crucial to ensure business continuity.
Conducttr simulates all cyber threats - confidentiality, integrity and accessibility - including ransomware, hacking, doxxing, DDoS and more.
Regulatory Compliance Issues
...
Non-compliance with regulations can result in fines, legal trouble, and harm to reputation. To prevent issues like billing errors or privacy violations, use Conducttr for mock approvals and stakeholder feedback.
Conducttr offers a complete freedom to communicate on multiple channels to external and internal audiences in the same way that you would in your job across email, web sites, social media, instant messaging, help desk and more.
Realistic and Secure Exercises, Faster
...
Build your own life-like immersive exercises in less time than it takes with Powerpoint. Use our intuitive scenario editor and libraries of ready-made scenarios & content or import existing exercises from Excel. Publish in multiple languages for global businesses exercising across time zones.
Better insights, better outcomes
...
Exercise facilitators and observers can see real-time participant activity and can comment on any published content item for qualitative feedback and assessment at any time during the exercise.
Can you help navigate your organisation through this cyber attack and keep operations running? Become a Risk and Resilience Manager at PrismTel to find out. 3 PM | September 21st
Capabilities of possible interest
Social Watch
Simulation sentiment analysis and trend alerts for words, phrases and people of interest
SIMPRESS
Blend pre-written articles with live journalistic pieces and interviews created during your exercises.
OSINT
Simulated web search, geotagged social media, social graph.
Target Audience Analysis
Realistic human terrain modelling and simulation
InfoMap
Dynamically updated map with geotagged social media and your own KML layers.
Simulated social media
Publish across a wide range of simulated social media platforms including Twitter, Facebook, Instagram, Telegram, Reddit, 4Chan and more
Pattern of Life
On-demand audience reactions to injects or player actions to simulate real online crowds.
SIGACT Tracker
Identify trends and track significant activity acorss the exercise envrironment to make well-informed decisions.
Things you might like to do
Cyber Attack
Conducttr can simulate breaches of confidentiality, integrity and accessibility. Websites can be hacked on-demand or master events list inject. Our website details feature allows players to peak behind the website before or after an attack.
Information Laundering
Every press report, scientific article and blog post carries a reference to the writer and a simulated publication date: articles can be "post dated" to show they were published decades ago, yesterday or now. Articles can be linked to social media and vice versa. Websites don't have to be immediately visible and must be be found via our simulated web search
Twitterstorm
Using our pattern-of-life feature, social media volume, content and sentiment can layered to start a protest from a trickle and ramp up to a torrent. These simulated audiences on social media can be designed with certain dispositions so as to see the effects in our measurement of effects dashboard, Pulse.
Simulated Engagement
Our spoof engagement feature allows those in exercise control with the permission to do so to select a social media post and simulate comments, likes and shares. Depending on the exercise training objectives, this can be done with a simple numerical value or a realistic distribution of engagement from specific actors and audiences.
There are lots of ways to try-before-you-buy. Try Worlds immediately to see the interface, signup for a live public exercise or contact us for a 1-on-1 demo.