Crisis Simulation Service
Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.
Features
- Real-world scenarios or customised to your organisation
- Reports that compare responses with benchmarks
- Insights and findings with actionable outcomes
- Can be delivered either remotely or onsite
- Applies to any job role or level of seniority
- Uses standard web browsers. No app required
- Delivered by cyber industry experts
- Gamified and interactive exercises
Benefits
- Reduces financial impacts of cyberattacks
- Reduces reputational impact of cyberattacks
- Improves communication flow across organisation
- Enables better informed decision making
- Investments can be prioritised for better ROI
- Hardens the organisation to reduce the risk of attacks
- Organisations understand their current state of readiness
- Attacks dealt with more efficiently
- Allows improvements to 3rd parties to be made
- Provides evidence to validate processes and procedures
Pricing
£25,080 to £53,077 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 9 8 9 8 1 8 7 4 7 1 4 0 5 3
Contact
Core to Cloud Ltd
Mark Liddle
Telephone: 07495928634
Email: mark@coretocloud.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- There are currently no specific service constraints other than the users of the service should have access to a laptop, tablet or mobile with a standard web browser and access to a network connection.
- System requirements
-
- Laptop with any up to date browser
- Tablet with any up to date browser
- Smartphone with any up to date browser
- A valid network connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard - Next Business day: Extended - 4 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Next business day.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- The service document will describe the format of the service delivery, what to expect, how to prepare, location and timing, and the device requirements, network connectivity and browser type.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Microsoft Word
- Microsoft PowerPoint
- End-of-contract data extraction
- Once the simulation service has been completed, the customer can request the raw data and results which will be provided in CSV format
- End-of-contract process
- Once the contract has ended, the customer can request all data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The service operates on any valid web browser on laptops, tablets and smartphones There are no differences in how the uses access the service.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The service interface is via a web browser on the users' devices. There is no installation of any software or agents required.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Creating a design system for all of our components, so that each of them is documented from an accessibility perspective and can be implemented quickly.
Investigating how we could improve the accessibility of our labs and reports.
Improving our internal processes to make sure that accessibility is checked at every stage so that any potential issue can be found and solved early on.
Planning ways to involve the whole organisation around the importance of accessibility.
Creating an internal resource repository which aims to make accessibility well integrated and as easy as possible to apply in each area.
Planning to improve our research sessions to involve more disabled users to test the platform at different stages of the development process. - API
- No
- Customisation available
- Yes
- Description of customisation
- The service can be customised to meet the specific requirements of a customer. The crisis simulation scenarios can be offered as either ones that have been developed already and fit with the clients' needs, or bespoke to their specific business/organisational priorities or situation. Core to Cloud will conduct a consultative session with the customer to define the particular scenarios and then these are created in the platform. Its not possible for the customer to access the platform to carry out this customisation.
Scaling
- Independence of resources
- Each customer is provided with their own tenant, unless they are in an NHS trust, where they will use the group tenant. The system has sufficient resources to scale.
Analytics
- Service usage metrics
- Yes
- Metrics types
- These are the performance metrics created by the responses provided as part of the simulation reports.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The data is the report provided to the customer.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
The service is designed to be available 24 hours a day, 7 days a
week, 365 days a year.
We use reasonable commercial endeavours to operate a target minimum
service availability of 99.5% uptime.
We do not offer refunds or service credits if the availability is below the stated level. - Approach to resilience
- Available upon request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Identity Access Management permissions are enforced according to their role.
Organisation Admin
Licence Manager
Team Admin
Workforce Manager
Crisis Sim Manager
Team Sim Manager
User - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Approachable
- ISO/IEC 27001 accreditation date
- 17/08/2021
- What the ISO/IEC 27001 doesn’t cover
- Not applicable, as everything covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Core to Cloud is ISO27001 certified and its security polices follow the guidelines et out on the standard. The Chief Operating Officer is accountable for the creation and adherence to security policies and the Chief Technology Officer responsible for the on-going security audits and governance.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Each change of asset requires the following documents:
Change Request and Risk Assessment, providing details of the proposed change, justification for the change, and authorisation, and details of the potential threats, vulnerabilities, risks and control measures
Testing of operational software must be undertaken in a separate testing environment prior to being applied to the operational system.
All test environment users must use different logon profiles to those used in the operational system.
Only information that can be made public without causing damage to the organisation should be copied and used in the test environment.
Asset and risk register updated - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The protection from Malware Policy is a sub policy within the Information Security Policy v2.0 which is help and maintained within the ISMS.
This sub-policy specifies the controls that need to be applied to all computer systems and the mobile devices that can connect to the company’s information processing facilities to protect them against malware threats from sources such as viruses and spyware applications. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The monitoring of security threats is contained within the Information Security Policy v2.0 which is part of our ISO 27001 Accreditation. This is part of the core policy and states
Regular monitoring of security threats and the testing/auditing of the effectiveness of control measures
This monitoring takes several forms such as software which looks for an alerts to anomalies, Log alerting through a central SIEM and reviews by our Security Operations Team. - Incident management type
- Supplier-defined controls
- Incident management approach
- The type of communication will depend on the type, scope and scale of the incident. As a minimum, your administrator will receive an email informing them, to the extent available, of the nature of the breach and what actions Immersive Labs are taking to resolve the situation.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Core to Cloud strives to be a leader in environmental sustainability and believes that a successful future for our business and our customers depends on the sustainability of the environment, communities and economies in which we operate.
Environmental Commitments:
• Core to Cloud will protect the environment, including preventing pollution, through responsible management of our operations;
• Will give appropriate weight to this environmental policy when making future planning and investment decisions;
• Will reduce resource consumption, waste and pollution in our operations;
Compliance:
• Core to Cloud will comply with, or exceed, our environmental obligations, including taking a positive approach regarding environmental legislation that affects our business.Equal opportunity
It is our policy that all employment decisions are based on merit and the legitimate
needs of the organisation. Core to Cloud does not discriminate on the basis of race,
colour or nationality, ethnic or national origins, sex, gender reassignment, sexual
orientation, marital or civil partner status, pregnancy or maternity, disability, religion or
belief, age or any other ground on which it is or becomes unlawful to discriminate under
the laws of England, Wales and Scotland.
Our intention is to enable all of our staff to work in an environment which allows them to
fulfil their full potential without fear of discrimination, harassment or victimisation. Core
to Cloud’s commitment to equal opportunities extends to all aspects of the working
relationship including:
• Recruitment and selection procedures
• Terms of employment, including pay, conditions and benefits
• Training, appraisals, career development and promotion
• Work practices, conduct issues, allocation of tasks, discipline, and grievances.
• Work related social events; and
• Termination of employment and matters after termination, including referencesWellbeing
Giving back to our local communities is an important part of who we are as a company. Thanks to our team's amazing efforts in 2022 alone we were able to donate an incredible £5,000 to Brighter Futures in aid of breast cancer awareness.
Pricing
- Price
- £25,080 to £53,077 an instance
- Discount for educational organisations
- No
- Free trial available
- No