Demo Mode

Every screen, flow, export, and remediation path is the real Veri-Guard product. The specific findings, scores, and runbooks shown are curated to illustrate a typical before/after story. Your tenant scan produces your own numbers.

Get started
Back to demo runner

Attendee view — what you’d normally see

You’re looking at the locked record state — the drill is finished, the facilitator has hit Lock, and Claude has already generated the AI Coaching panel below. In a live drill, attendees see:

  • Live data — the drill clock, the current inject, and delivery status update every 3 seconds without refreshing. When the facilitator pauses, your clock freezes too. Open this URL on a TV or hand it to security leadership and they follow the room without screen-sharing.
  • Pick your role first, then answer each inject. The facilitator hands you a separate Participant URL; on landing you select your role from your tenant’s org-shape roster (e.g., M365 Admin, VP IT, External IR Retainer). Each inject then has a text box where you submit your own written answer. Submissions stream onto the facilitator’s screen in real time with your selected role attached — when the facilitator Drops the inject, your role-tagged response is locked into the auditor evidence record alongside the team’s consensus answer. Auditors get full attribution: which role said what, at which T+N drill-clock minute.
  • AI Coaching only unlocks after the facilitator hits Lock — Claude reviews every team response, every score, and the per-inject pacing, then writes the coaching panel you see further down. It’s pre-populated here so you can see the full post-lock view; in a real drill the panel would be blank with a “Generating AI coaching feedback…” spinner for ~30-60 seconds after Lock.
Back to Veri-VaultLive · refreshes every 3s
Spectator view — read-onlyHIPAA Drill complete

Misdirected fax exposes 312 patient records to competitor's office

Your HIPAA scan flagged that fax-out workflow has no validation step. This scenario walks the §164.402 4-factor and §164.404 notification mechanics for a misdirected-PHI event.

Drill clock1:01:00
Injects4 / 6 delivered

Drill is locked

The facilitator has locked the session. The full evidence record — including all team responses, scoring, and the per-inject pacing audit — is now available at the canonical session URL.

Open the locked record →

AI Coaching

strong

The team walked through the §164.402 4-factor analysis with the rigor the framework requires — each factor was discussed, evidence was identified, and the more-than-low-probability decision was made deliberately rather than instinctively. Where the drill exposed gaps was on the 500-individual notification threshold (team initially miscounted the affected population) and on the timing-clock owner question — nobody could answer who is responsible for tracking the 60-day notification window. The drill is the place to find that out; the team did.

Process rigor on 4-factor analysis was exemplary; threshold-knowledge gaps and the clock-owner blind spot held this below exemplary. Strong is correct — competent execution with addressable gaps.

Top strengths

  • §164.402 4-factor analysis was walked through deliberately, not retrofit
  • Forensic evidence requirements (what to preserve, who preserves it) were named correctly
  • Risk mitigation factor was challenged appropriately — team did not over-rely on 'we patched the gap' as evidence of reduced harm

Top gaps

  • Affected-individual count was miscounted (team estimated 280; actual exposure was 612 — pushed over §164.408 large-breach threshold)
  • 60-day notification clock owner was unidentified — no role volunteered to track it
  • HHS notification distinction (immediate for ≥500 vs annual summary for <500) was not surfaced until prompted
Per-inject feedback (5 injects)
Inject 0T+0 minstrong

What went well: Team invoked the 4-factor framework by name within the first 3 minutes — no preamble, no 'let me look up the framework first.'

What fell short: Roll-call of attendees did not include the privacy officer initially; they were paged but not in the room. Time wasted waiting.

Coaching: Privacy officer in the room from minute zero on any HIPAA drill. Make this a participants-list default.

Inject 1T+15 minneeds-work

What went well: Team correctly identified that the unauthorized recipient question (factor 2) was unanswerable from the available evidence — flagged it as needing forensic work.

What fell short: Affected-individual count was estimated visually from a list rather than systematically queried. The 280 vs 612 gap is the real-world risk: the team didn't know it was over the 500 threshold.

Coaching: For any breach drill, the very first SQL/Graph query the team runs should be the exact count, not an estimate. Build the query template in advance.

Inject 2T+30 minstrong

What went well: Team correctly invoked §164.404 (individual notice) timing as 60 days from discovery, not from incident occurrence.

What fell short: When asked 'who's tracking the 60-day clock,' no role volunteered. Privacy officer suggested they'd track it but did not commit; legal said they'd 'remind' the privacy officer.

Coaching: Notification-clock ownership is a single named role. Not 'privacy + legal will coordinate' — one name, one calendar invite.

Inject 3T+45 minadequate

What went well: Team identified the media-notification requirement under §164.406 when the threshold was confirmed.

What fell short: Media-notification draft was discussed conceptually but no template was identified. In a real breach the team has hours, not days, to draft media-facing comms.

Inject 4T+60 minstrong

What went well: HHS notification mechanism (the breach portal) was named correctly. Team knew the immediate-vs-annual distinction once prompted.

What fell short: Knowing the distinction once prompted is not the same as knowing it cold. The drill is the place to make this automatic.

Per-criterion scoring calibration (6 criteria)
5/5

§164.402 4-factor analysis rigor

5 is correct. Walked through deliberately; evidence-grounded; mitigation factor challenged appropriately.

2/5

Affected-individual count accuracy

2 is correct. Estimated, not measured — the 280-vs-612 gap is the threshold for 2.

4/5

Notification timeline awareness

4 is appropriate. 60-day window cited correctly; the HHS distinction surfaced only when prompted (would need to be unprompted for a 5).

2/5

Notification ownership clarity

2 is correct. Clock-owner unidentified — exact threshold definition.

4/5

Forensic preservation discipline

4 is appropriate. Preservation requirements named; chain-of-custody specifics were thin.

3/5

Media + regulator communication readiness

3 is correct. Awareness, no pre-built template — middle threshold.

Top-3 IR plan recommendations

#1

Pre-build the exact-count Graph/SQL query for affected-individual lookup

The 280-vs-612 miscount is the difference between annual-summary-only and immediate-HHS notification + media coverage. Pre-built query removes the estimation risk entirely.

Owner: Privacy officer + Data engineering · Effort: S · HIPAA §164.408 · NIST CSF RS.AN-3

#2

Assign single named owner for the 60-day §164.404 notification clock

Clock ownership ambiguity is the most common cause of notification-deadline slips. Drill surfaced this; codify the named owner in the IR plan before a real incident.

Owner: Privacy officer (default; can be delegated by name) · Effort: S · HIPAA §164.404 · NIST CSF RS.CO-3

#3

Pre-draft media-notification template for ≥500-individual breach scenarios

Hours-not-days timeline. Drafting from scratch under pressure produces poor copy; pre-drafted template with fill-in-the-blanks is the difference between a clean media moment and a defensive one.

Owner: Communications + Legal · Effort: M · HIPAA §164.406

Pacing observation

Pacing was deliberate — 38s average drift positive (late) reflects substantive discussion, not delay. The 15-minute and 30-minute injects ran particularly long because the team was genuinely working through the framework rather than performing it. That's the right tradeoff for a HIPAA drill.

Drill duration: 1:12:08 · Avg drift: 38s

Generated by claude-haiku-4-5-20251001 on May 10, 2026, 15:43:08 UTC. SHA-256: sha256:5f3a7c2e9b1d4f6a8c3e5b7d9a1f3c5e7b9d1a3c5e7f9b1d3a5c7e9f1b3d5a7c

Inject timeline

Read-only view of every inject and whether the facilitator has delivered it yet. Spectators do not see the “Expected action” lines — those stay with the facilitator until the post-drill debrief.

  1. 1. T+10 min✓ Past

    Privacy Officer: 'I just received the call from the receiving practice. Their office manager said the fax has been on their MFP since 14:08. She's asking what to do with it.' Privacy Officer needs to give an answer within 5 minutes.

    Participant submissions — none yet for inject 1

    Share the participant URL to invite team input. Submissions reveal here as they land.

    advanced past at T+10:00

  2. 2. T+25 min✓ Past

    Compliance lead pulls the chart of breaches in the rolling 12-month window. We had two prior misdirected-fax events of 8 records and 24 records. With this 312, we're at 344 — still under 500. Facilitator note (added in v1): if the team cannot answer within the inject window, the IR pre-built escalation tree applies — escalate to the named owner one tier above before the response runs over.

    Participant submissions — none yet for inject 2

    Share the participant URL to invite team input. Submissions reveal here as they land.

    advanced past at T+25:00

  3. 3. T+40 min✓ Past

    Legal counsel walks the §164.402 4-factor in detail. Verdict: probability of compromise is *more than low* (paper sat on a shared MFP for 47 minutes; multiple staff likely walked past). This is a breach.

    Participant submissions — none yet for inject 3

    Share the participant URL to invite team input. Submissions reveal here as they land.

    advanced past at T+40:00

  4. 4. T+55 min✓ Past

    Communications lead asks: 'How do we tell 312 patients? What's our notification template? Do we have one?' If you don't, what's the fastest legitimate way to draft and approve one?

    Participant submissions — none yet for inject 4

    Share the participant URL to invite team input. Submissions reveal here as they land.

    advanced past at T+55:00

  5. 5. T+70 min▶ Active — currently discussing

    Practice manager: 'How do we make sure the next billing batch doesn't have the same problem?' Veri-Tech's HIPAA scan finding HIPAA-AS-002 is sitting open.

  6. 6. T+85 minPending

    Inject content revealed when this inject becomes active.

Spectator view is read-only. Team responses, scoring, and the facilitator’s “Expected action” reference text are not shown here — they live on the runner page and become part of the locked record. To facilitate the drill, open the runner instead.