AI IR Tabletops · Enterprise feature

First the scan. Then the IR drill. Composed from your real findings.

Other AI tabletop tools generate generic scenarios. Veri-Tech generates yours — composed from the gaps your most recent Veri-Guard, Veri-Tune, HIPAA, or Veri-Vault scan actually found. Not a template. Not a stock attack chain. Your environment, your gaps, your drill — auditor-grade, generated in about five minutes, with a live multi-attendee runner, AI Coaching, three audience-tailored exports, and an immutable audit chain that ties everything back to that source scan by SHA-256.

Available on Enterprise. Every plan can preview a live, interactive demo per product card below — no commitment, no tokens consumed.

~5 min
Generation time
click → bundle in Vault
4 / 4
NIST CSF Functions
Protect · Detect · Respond · Recover
3
Evidence exports
auditor · team · executive
6 yr
WORM retention
immutable audit chain

“Scan. Drill. Lock. Repeat.”

Pick your drill

Four products. Four NIST CSF Functions. One coherent IR program.

Each Veri-Tech product feeds a different category of tabletop. Click any card to try the live interactive demo — full runner, AI Coaching, downloadable evidence artifacts, no tokens consumed.

Veri-Guard
NIST CSF · PR.AC · DE.CM
Identity

Identity-attack drills

Conditional Access gaps. MFA bypass paths. Legacy auth. When Veri-Guard flags these, the tabletop walks through what happens when an attacker actually exploits them — detection time, containment quality, eradication completeness.

Sample scenario

“Legacy-auth bypass leads to mass mailbox exfiltration” — the attacker exploits 14 finance accounts your scan flagged as still authenticating via IMAP.

Try the Guard live demo
Veri-Tune
NIST CSF · PR.PT
Device

Device-compromise drills

Personal-device theft. Missing App Protection Policies. Weak compliance posture. Tune surfaces the gaps; the tabletop walks through what happens when one device gets lost or stolen unlocked — session-revoke speed, breach-determination process, user-comms quality.

Sample scenario

“Personal phone with no MAM policy leaks corporate Outlook cache” — an engineer’s stolen phone is unlocked, Outlook is open, refresh tokens valid 90 days.

Try the Tune live demo
HIPAA
NIST CSF · RS.CO · RS.AN
Breach

Breach-notification drills

HIPAA scans surface administrative, physical, and technical safeguard gaps. The tabletop walks the §164.402 4-factor analysis and the §164.404 notification cascade — decision-authority clarity, notification-timeline knowledge, sanction-policy invocation.

Sample scenario

“Misdirected fax exposes 312 patient records to competitor’s office” — the no-attacker, internal-process-failure shape that drives most real HIPAA breaches.

Try the HIPAA live demo
Veri-Vault
NIST CSF · RC.RP · RC.IM
DR

DR / restore-drill scenarios

Vault posture — backup count, age, immutability window, restore-test recency — feeds a tabletop that exercises your pay-vs-restore decision tree under time pressure. Tests restore-time reality, Vault delete-attack survivability, comms-cascade discipline.

Sample scenario

“Ransomware encrypts production AND attempts to encrypt backup vault” — your WORM window holds, but you’ve never validated restore time and the SLA clock is running.

Try the Vault live demo

Compliance as code. Audits as outputs. Run all four over a year and you’ve documented a tested IR program across Protect, Detect, Respond, and Recover — without four different vendors, four different consultants, or four different write-from-scratch projects.

The frame

You don’t need another tabletop PDF. You need to prove your IR plan works.

Generic tabletops test your IR plan’s structure. They read correctly out loud and tell you nothing about whether your real environment would have stopped the attacker. We do the opposite. The drill is a pentest for your IR plan, generated from the gaps your most recent scan actually found.

Pentest gap

Tests structure, not posture

“Ransomware hits the file server” exercises your IR plan’s words. It does not exercise the 14 finance accounts your scan flagged as still using IMAP. A pentest tests posture; we generate from posture.

Cost gap

Engineers shouldn’t be the audit team

Composing a realistic tabletop from scratch — credible attack chain, timed injects, scoring rubric, and the documentation an auditor will accept — is a multi-day exercise for someone who already has a day job. So most teams skip it.

Audit gap

“We ran a generic tabletop” doesn’t pass anymore

HIPAA §164.308(a)(8) wants periodic evaluation. SOC 2 CC7.4 wants response based on evaluation. ISO 27001 A.5.24 wants planning that reflects your threat environment. The auditor walk-through wants a drill that exercised your real gaps.

The full drill

Configure once. Generate per drill. Run live. Lock & ship the evidence.

This is the part that’s changed since most people last looked at “AI tabletop” tooling. We don’t generate a PDF and call it done. We generate an entire drill workflow — pre-freeze edits, live multi-attendee execution, AI Coaching post-lock, three audience-tailored exports, an immutable audit chain.

  1. 1

    Set org shape

    Type your real role labels — "M365 Admin", "VP IT", "External IR Retainer". Used in scenario participants + IR-plan owners + AI Coaching attribution.

  2. 2

    Generate

    One click on any scan results page. ~3–5 min later the drill bundle lands in Vault — scenario, facilitator guide, injects, rubric, IR plan with RTO/RPO.

  3. 3

    Edit pre-freeze

    Tighten scenario, sharpen injects, adjust rubric. Each save appends a versioned blob with its own SHA-256 — auditors see the full edit chain.

  4. 4

    Run live

    Spectator URL for observers + Participant URL for attendees (role-tagged input per inject). Click Drop on each inject — pacing audit recorded.

  5. 5

    Lock & ship

    Session locks WORM. Claude writes AI Coaching, exec brief, team debrief in ~30–60s. Three exports + audit chain ready to send to auditor / board / team.

AI Coaching · post-lock

Claude reviews your drill the way a senior IR consultant would.

The second you click Lock, Claude reviews every team response, every score, every inject-timing drift, and the org-shape roster you ran against. ~30–60 seconds later you have a structured coaching artifact that names what went well, what fell short, and the three IR-plan changes that would have moved the needle.

  • Performance tier. Exemplary / Strong / Adequate / Needs work / Poor — with a rationale you can read out loud at the debrief.
  • Per-inject feedback. For each inject: what the team did well, what fell short, and a specific coaching note.
  • Per-criterion calibration. Each rubric score gets a calibration note — "your 3 is generous, threshold for 3 is X". Auditor-grade scoring rigor.
  • Top-3 IR plan recommendations. Concrete recommendations with owner role, effort size (S/M/L), and linked framework citations.
  • Pacing observation. Drill duration vs scheduled, average inject drift, whether you ran live or walked through it.
StrongPerformance tier

Sample narrative

“The team executed competent containment-first response under pressure, recognizing the legacy-auth gap as root cause in the first 10 minutes and pushing a Conditional Access block before the attacker could pivot beyond the initial five mailboxes. Detection time was strong; the §164.402 4-factor analysis was invoked deliberately when Legal joined. Where points were lost: eradication completeness (inbox-rule sweep was scoped to known-affected mailboxes only) and AP queue audit discipline (reactive, not systematic).”

Top recommendation

Build pre-baked AP queue audit checklist for incident response. Catches second-wire attempts that follow the same modified-banking-instructions pattern. Owner: Finance + IR retainer. Effort: S. Linked: NIST CSF RS.AN-3, SOC 2 CC7.4.

Same data drives the Team Debrief PDF and Executive Brief PDF (see next section).

Three exports

One drill. Three audiences. Three artifacts.

Auditors want raw evidence with checksums. Your team wants a polished training tool with the coaching narrative. The board wants a one-pager with risk and cost. The same drill produces all three, automatically.

For HIPAA / SOC 2 / ISO auditors

Auditor package (.zip)

Raw structured evidence with per-file SHA-256 cross-references back to the source scan job. Session.json + feedback.json + exec-brief.json + drill bundle (v0 AI baseline plus every facilitator edit) + manifest with the full audit chain.

  • · Source-scan SHA-256 → drill-bundle SHA-256
  • · Versioned-bundle chain (v0 → v1 → vN)
  • · Frozen-at-session-create event
  • · Locked-session checksum
  • · AI-provenance footer (model ID + template version)
For your IR team

Team Debrief (.pdf)

Multi-page polished training tool. Per-inject AI coaching with what-went-well + what-fell-short callouts, per-criterion calibration tables, top-3 IR plan recommendations, pacing audit, glossary. Use it for the next new hire’s IR onboarding.

  • · Cover with final score + performance tier
  • · Scenario summary + threat actor + attack chain
  • · Per-inject feedback (delivered + drift + coaching)
  • · Per-criterion calibration table
  • · Glossary for new team members
For the board / leadership

Executive Brief (.pdf)

One page. Board-memo voice. Performance assessment in business-impact framing, top gaps with risk + cost numbers, top recommendations with resource asks and estimated ROI, readiness summary suitable for the cover line of a board memo.

  • · Performance assessment (business-impact voice)
  • · Top gaps with risk statement + cost framing
  • · Top recommendations with resource ask + ROI
  • · Readiness summary (1–2 sentences)
  • · Same SHA-256 chain as the auditor ZIP
Spectator URL

Read-only timer + current inject + delivery progress. Refreshes every 3 seconds. Hand to security leadership, observers, anyone watching but not participating. Works on a conference-room TV.

Participant URL

Each attendee picks their role from your org-shape roster (M365 Admin, VP IT, External IR Retainer, etc.), then submits a written answer per inject. Submissions stream to the facilitator screen in real time, role-tagged. On Drop they’re locked into the evidence record with full attribution — which role said what at which T+N drill-clock minute.

Live multi-attendee

No screen-sharing. Every attendee participates from their own device.

At drill kickoff the facilitator hands out two URLs. Spectator for observers, Participant for the IR team. Per-role written submissions stream onto the facilitator’s screen in real time and get locked into the evidence record on Drop — with attribution. The auditor can see which role said what at which T+N minute, six years from now.

Hold the drill in-person, fully remote, or split. The pacing audit and per-role attribution don’t change.

Org-shape personalization

Your role labels — not ours.

Set your team’s actual role labels once in Settings — M365 Admin, Service Manager, External IR Retainer, whatever your lexicon is. The AI uses those exact labels in scenario participants, IR plan owners, AI Coaching recommendations, the auditor manifest’s orgShape field, and the participant role-picker.

Drills generated for your tenant read like they were written by someone who works there. Auditors notice; participants engage.

Need a one-drill exception — mock training, MSP-managed client, third-party audit dress-rehearsal? Override the size bucket per drill without touching tenant-wide settings.

Sample org-shape roster (yours)
CISOIT DirectorM365 AdminSecurity Operations LeadCompliance OfficerFinance ControllerExternal IR Retainer
Result in the scenario: “The IT Director pages the M365 Admin at 06:52 UTC. Compliance Officer joins by T+25. External IR Retainer is added on Bridge B at T+40.” Not “CISO does X” in an org without a CISO.
The audit chain

SHA-256 from your scan to the locked record. Auditors can verify byte-by-byte.

Every artifact carries the checksum of its source. An auditor walking the chain can prove the drill was generated from a scan you actually ran, that the version the team ran was the version that got locked, that the coaching feedback came from the locked session — without trusting Veri-Tech’s word for any of it.

Source scan
gap-report.json
Drill manifest
_manifest.json
Bundle versions
v0 → v1 → vN
Freeze event
frozenAt + byUpn
Locked session
session.json
AI Coaching
feedback.json
Exec brief
exec-brief.json
Immutable after lock

WORM-equivalent immutability. Scores, notes, timestamps, manifest hash — all frozen at the moment of Lock. Edits to a locked artifact are not possible.

6-yr retention enforced

During retention the artifact cannot be deleted by any single user action. Hard system-level constraint. Survives even a frustrated admin clicking every button.

Deletion = 4-eyes + reason

Legitimate deletion during retention (GDPR right-to-be-forgotten, etc.) requires a second admin’s approval and a recorded reason. Audit log captures both.

Audit-grade evidence

Maps cleanly to the clauses your auditor will quote.

The auditor doesn’t want a checklist or a vendor’s template. They want a drill that exercised your real gaps, with provenance that ties to evidence they can independently verify.

HIPAA Security Rule

§164.308(a)(8) Periodic evaluation

Covered entities must perform periodic technical and nontechnical evaluation. A drill generated from a real scan, run by your team, retained for six years in Vault, is exactly what the clause was written to require.

SOC 2 Trust Services

CC7.4 Response based on evaluation

Expects incident-response procedures to be informed by an evaluation of detected events. Tabletop output that names the specific scan findings driving each scenario gives the auditor a clean line from evaluation to procedure to drill.

ISO 27001 Annex A

A.5.24 IR planning

Calls for incident-response planning that reflects the organization’s threat environment. Drills generated from your scan findings are, by definition, aligned to your threat environment. Auditor-readable provenance in the manifest closes the loop.

Program-maturity readout

Quarter-over-quarter trend lines the board actually wants.

Every locked drill becomes a data point on the trends dashboard. Quarterly averages per category, latest vs best, trend arrows, click-through to the locked record. The page your CISO presents at the quarterly board meeting and your auditor walks first at audit kickoff.

Annual is the regulatory floor. Quarterly is the recommendation. Run all four categories over a year and the dashboard is the program-maturity narrative.

Try the trends demo
Veri-Guard

Identity-attack drill

↑ improving
Latest
4.20 / 5
Best
4.20 / 5
Sessions
8
123452.80Q3 '243.00Q4 '243.20Q1 '253.40Q2 '253.70Q3 '253.85Q4 '254.00Q1 '264.20Q2 '26
Veri-Tune

Device-compromise drill

↑ improving
Latest
3.90 / 5
Best
3.90 / 5
Sessions
4
12345Q3 '24Q4 '24Q1 '25Q2 '252.50Q3 '252.90Q4 '253.40Q1 '263.90Q2 '26
HIPAA

Breach-notification drill

↑ improving
Latest
4.10 / 5
Best
4.10 / 5
Sessions
6
12345Q3 '24Q4 '243.00Q1 '253.30Q2 '253.55Q3 '253.80Q4 '253.95Q1 '264.10Q2 '26
Veri-Vault

DR / restore drill

↑ improving
Latest
3.85 / 5
Best
3.85 / 5
Sessions
2
12345Q3 '24Q4 '24Q1 '25Q2 '25Q3 '25Q4 '253.20Q1 '263.85Q2 '26

Sample data — real customers see their own quarterly trend across every locked drill.

Questions

Honest answers to the questions buyers actually ask.

Will the AI hallucinate something my auditor will catch?

The tabletop is facilitator material; auditor evidence is the scan + the manifest proving the drill was generated from that scan. Every bundle ships with an opening facilitator script that frames the drill as a test, not a transcript, and a footer telling the facilitator to verify scenario specifics against their tenant. You review the AI output the way you’d review any external playbook before facilitating. The pre-freeze edit chain (with SHA-256 per version) is itself the auditor evidence that you reviewed.

Can I edit the AI output?

Yes — that’s the whole point of the pre-freeze edit flow. Every section is editable until the first session is created against the bundle. Each save appends a versioned blob with its own SHA-256; the freeze event is captured with timestamp + UPN. Auditors see both the AI baseline and your edits, with the full chain.

How does the AI Coaching work? Do I have to trust it?

Claude reviews the locked session: every team response, every score, every inject-timing drift, the org-shape roster. It produces a performance tier with rationale, per-inject feedback, per-criterion calibration notes (“your 3 is generous because the threshold for 3 is X”), top-3 IR plan recommendations with owner/effort/framework links, and a pacing observation. You don’t have to trust it — it’s a structured second opinion, not the auditor evidence. The auditor evidence is the locked session itself.

Does this replace our IR plan?

No. Your IR plan defines roles, escalation paths, contact trees, decision authority — the durable structure. The tabletop tests that plan against the specific gaps your scan found. Plan stays as written; drill exercises whether it works in practice. AI Coaching’s top-3 recommendations feed back into your IR-plan update cycle.

How do attendees participate without a Teams call?

The facilitator hands out two URLs at drill kickoff. Spectator URL is read-only — timer + current inject + delivery progress, refreshes every 3s. Participant URL: each attendee picks their role from your org-shape roster and submits written answers per inject. Submissions stream onto the facilitator’s screen role-tagged, locked into the evidence record on Drop. Works in-person, remote, or split.

What frameworks beyond HIPAA, SOC 2, ISO 27001?

NIST CSF is baked into every category by design (Protect / Detect / Respond / Recover — one per product). FedRAMP IR-3, PCI-DSS 12.10.2, NYDFS 500.16, state breach laws — all reference periodic incident-response exercises that this feature satisfies in spirit. The manifest gives you the documentary anchor. If you’re aligning to a framework not listed, book a call.

What if I generate one against the wrong scope?

Generate another. Enterprise has no per-month cap; you can run drills against every scan that matters. The wrong-scope artifact stays in Vault under its manifest unless you delete it — which is recorded in the audit log, so an auditor reviewing the activity trail sees a coherent story rather than missing artifacts.

Why isn’t this a free guide?

Because a free guide is the static-template approach this whole feature is designed to replace. Drills only work as auditor-grade evidence when they’re tied to your scan findings. A generic PDF is exactly the artifact auditors are starting to reject. The free preview on every product’s scan-results page lets you see the shape of what you’d get without committing to a plan.

Ready when you are

A pentest for your IR plan. Generated from your real posture.

Auditor-grade evidence, live multi-attendee runner, AI Coaching, three audience-tailored exports, immutable audit chain. On Enterprise, every scan can produce one.

“Engineers shouldn’t also be the audit team.”