Assess your organisation's ability to withstand and recover from cyber attacks during a crisis or conflict scenario.
~3 minutesQuick & focused
10 questionsScenario-based
6 domainsComprehensive
No technical knowledge required
Results are instant and private
You can retake it anytime
Step 1 of 10
0%
Step 1 of 10
Your primary IT system goes offline due to a coordinated cyber attack during a regional conflict. How does your organisation continue operating?
Disruption of IT during a crisis is expected. Organisations with tested manual fallbacks and documented BCPs recover significantly faster.
Step 2 of 10
A prolonged power outage is expected to last 72 hours during a national crisis. How prepared is your organisation?
Power resilience is a foundational requirement during conflict or disaster. A tested generator and fuel reserve strategy is the minimum for critical organisations.
Step 3 of 10
During a crisis, your corporate email and messaging systems are disrupted by a DDoS attack. How does your leadership team communicate?
Attackers often target communications first. Pre-agreed out-of-band channels and a tested crisis call tree are essential before a crisis hits.
Step 4 of 10
There is credible evidence that a nation-state actor is intercepting your organisation's communications. What do you do?
State-level interception is a real risk during conflict. Moving quickly to end-to-end encrypted tools and limiting sensitive discussion to need-to-know is critical.
Step 5 of 10
Destructive wiper malware, believed to be state-sponsored, has encrypted and deleted data across your network. How quickly can you recover?
Wiper malware is a signature tool of state-sponsored conflict operations. Immutable, air-gapped backups with a tested recovery playbook are the only reliable defence.
Step 6 of 10
How often does your organisation test its disaster recovery plan?
An untested recovery plan is not a recovery plan. Regular drills reveal gaps before a real crisis does.
Step 7 of 10
Credible intelligence indicates your sector is being actively targeted by a state-sponsored group using spear-phishing. What is your immediate response?
Operationalising threat intelligence quickly — pushing IOCs to controls and briefing staff — is what separates organisations that detect attacks from those that discover them weeks later.
Step 8 of 10
A key technology vendor has been compromised in a supply chain attack linked to a hostile state. The backdoor may have been active for months. What do you do?
Supply chain attacks are one of the most effective techniques used by state actors. Knowing what access each vendor has — and being able to revoke it fast — is essential.
Step 9 of 10
A major cyber attack has disabled your organisation's core systems during a national crisis. Who makes the decisions and how are they coordinated?
Clear command structure during a crisis prevents conflicting decisions, delays, and missed actions. An Incident Commander with defined authority is critical.
Step 10 of 10
Following a major cyber incident during heightened geopolitical tension, your CEO asks for a situation report within 30 minutes. Can your team deliver it?
Executive visibility during a crisis determines how quickly resources and decisions are mobilised. A standard reporting format prepared in advance is the difference between 30 minutes and 3 hours.
Your Cyber Score
0/100
Create a free account to see your full domain breakdown, personalised roadmap, and learning recommendations.
Your organisation has little to no protection against cyber threats during a crisis. Disruption to any critical system could cause total operational failure.
21–40
Fragile
Some basic measures exist but significant gaps remain. A determined attacker or prolonged disruption would likely overwhelm your defences.
41–60
Prepared
You have foundational continuity and response capabilities. You can weather short disruptions but may struggle in a sustained or multi-vector crisis.
61–80
Resilient
Strong crisis readiness with tested processes and clear command structures. Your organisation can absorb significant shocks and recover quickly.
81–100
Crisis-Ready
Exceptional resilience posture. You have immutable backups, tested BCPs, encrypted communications, and a capable crisis command structure ready to activate at any time.