S
SHADOWVAULT just now

NIS2 Directive — Article 20

The Breach

Meridian Energy Group — Monday, 6:00 AM

An interactive scenario about ransomware, personal liability, and what happens when the 24-hour reporting clock starts ticking.

340,000 records at risk. 24 hours to report. Personal liability on the table.

All languages available in the full course

Alex Reeves, CISO
Your Role

Alex Reeves

CISO at Meridian Energy Group — a mid-size energy company operating critical infrastructure across Germany and the Netherlands. 2,000 employees. NIS2 essential entity.

It’s 6:00 AM on a Monday. Your phone just woke you up. The SOC has detected ransomware on three production servers.

Meridian SOC — Live Alerts
Monday 06:04:12 UTC
CRITICAL
Ransomware detected — PROD-DB-01, PROD-DB-02, PROD-DB-03
06:02:47 UTC · EDR-FALCON · Auto-quarantine FAILED
CRITICAL
File encryption in progress — .vault extension — 340K customer records at risk
06:03:15 UTC · DLP-SENTINEL · Exfiltration indicators detected
HIGH
Lateral movement attempt — PROD-DB-03 → OT-GATEWAY-01
06:03:58 UTC · NDR-VECTRA · OT network boundary probe
MEDIUM
Anomalous outbound traffic — 2.4GB uploaded to external IP (185.xx.xx.xx)
06:01:22 UTC · FW-PALOALTO · Connection active for 47 minutes

Four alerts in two minutes. Three production servers encrypted. Lateral movement toward the OT network — that’s the gas distribution control system.

Your SOC analyst is on the line. Your phone buzzes with a Signal message from an unknown number.

We have accessed your customer database. 340,000 records. Payment details. Home addresses. We have encrypted your billing and operations planning servers.

You have 72 hours. Instructions will follow.

— SHADOWVAULT

You’re in the car. 22 minutes to the office. 340,000 households depend on your gas distribution network. The OT alert means they’re probing the boundary to the control systems.

Tomás Vidal, Head of Operations, calls. He’s already at the plant.

Tomás Vidal
Tomás Vidal — Head of Operations

“Alex, billing is down. Completely. We can’t process payments, we can’t issue invoices, and the operations planning system is frozen. I’ve got 14 field engineers sitting in their vans with no job orders.”

“We’re losing €50,000 an hour. How fast can you get the systems back?”

You “Tomás, if I rush to restore, I might destroy the forensic evidence we need to understand how they got in.”

Tomás “Evidence? I’ve got 340,000 households who can’t see their bills, and 14 engineers who can’t do their jobs. I need systems, not evidence.”

Tomás “Stefan — Stefan Brandt, he’s been with us nine years — is sitting in his van in Groningen with no job orders. He’s called me twice. His crew does emergency repairs. If a gas line leaks today and we can’t dispatch, that’s not a billing problem. That’s a safety problem.”

Tomás Vidal
Decision 1 of 3 — Incident Response Priority

Three servers encrypted. 340,000 customer records. OT boundary probed. €50K/hour losses. Your SOC team can preserve forensic evidence OR start restoring — doing both simultaneously risks contaminating the trail.

Preserve evidence first, then contain
Image the affected servers before touching anything. Forensics gets clean data. Operations stays down 4-6 more hours.
Contain immediately — isolate and restore from backups
Kill the infected servers, restore from backups. Operations back in 2-3 hours. Forensic evidence destroyed.
Split the team — forensics on server 1, restore 2-3
Partial evidence, partial restoration. Neither team has full resources. The attacker may still be in the network.
Tomás Vidal
You

“Nobody touches those servers until forensics has clean images. Tomás, I know it hurts.”

Tomás “Six hours, Alex. You’re asking me to lose €300,000 so your team can take photos of a crime scene.”

You “I’m asking you to let me find the door they walked in through. Otherwise we’ll be having this conversation again next month.”

The forensics team finds the entry point within 3 hours: a compromised VPN credential from a third-party maintenance contractor. Without the evidence, you’d never have known.

At 9:47 AM, customer services gets a call from Elke Jansen in Groningen. Her direct debit bounced because the billing system was down. She’s 74. The overdraft fee is €35. She wants to know who’s going to pay it.

+3 Regulator | -1 Operations
Tomás Vidal
You

“Wipe and restore. Get operations running.”

Tomás “Now you’re talking.”

Billing back online by 9:30 AM. Elke Jansen in Groningen still had her direct debit bounce — the system was down during the processing window. But at least Stefan’s crew got their job orders.

Two weeks later, the regulator asks how the attacker gained access. You can’t answer. The evidence was destroyed during restoration.

-1 Regulator | +2 Operations
Narrator

You split the team. Forensics gets partial images — enough for the malware variant, not the entry point. Restoration gets two servers back. The third is corrupted.

Tomás has 60% of operations. You have 40% of the evidence. Nobody is satisfied.

0 Regulator | 0 Operations
Fog of War

Investigate the Breach

The initial response is underway, but there are gaps in what you know. You have limited time before the board briefing.

Choose 3 of 6 lines of investigation. You won’t have time for the rest.

0 / 3 selected
🔍
Check server logs
Trace the attacker’s entry point through system and access logs
📞
Call CloudVault account manager
Ask the cloud vendor what they know about the compromised systems
💾
Review backup integrity
Verify whether your backup sets are clean and usable for restoration
📤
Check if data was exfiltrated
Analyse network traffic for signs of data leaving the network
👥
Assess customer notification requirements
Determine scope of affected records and GDPR notification obligations
🚶
Contact law enforcement
Report to Europol / national cyber crime unit and request intelligence
Helen Marsh
The Board Chair

Helen Marsh is in London. She checks email at 8 AM. She has no idea her company is under attack. Last October, you recommended a security audit. Helen deferred it — “Q1 budget is tight, revisit in March.” It’s March.

Under Article 23, you must submit an early warning to the CSIRT within 24 hours. The clock started at 6:04 AM.

Under Article 20, Helen bears personal liability. She needs to know. The question is when.

Helen Marsh
Decision 2 of 3 — Board Notification

Incomplete information. Unclear scope. But Helen has personal liability. If she finds out you waited — the trust is gone.

Call Helen now — full disclosure
Ransomware, data exposure, 24-hour notification deadline. She won’t like it. But she’ll appreciate hearing it from you.
Send a controlled summary — “cyber incident under investigation”
Factual update. No mention of ransomware. Covers notification obligations. Buys time.
Wait until 5 PM — brief with the full picture
By 5 PM you’ll know everything. One briefing, all answers. But that’s 11 hours of the board not knowing.
Helen Marsh
You (on the phone)

“Helen, Meridian is experiencing a ransomware attack. Three production servers encrypted. The attackers claim to have 340,000 customer records. We have a 24-hour notification deadline under NIS2.”

Helen Long silence. “How bad?”

You “I don’t know yet. That’s the honest answer.”

Helen “Thank you for calling immediately. What do you need from me?”

Helen activates the crisis committee. By 10 AM, Legal, Comms, and the CEO are briefed. You have air cover.

+3 Board | +1 Legal
Narrator

You email: “The board is informed that Meridian is managing a cyber incident affecting billing systems.”

Helen reads it at 8:15. Calls at 8:16.

Helen “‘Cyber incident’ covers everything from a phishing email to a shutdown. Which is this?”

You “It’s... ransomware. Three servers. They claim to have customer data.”

Helen “And you sent me ‘cyber incident’? Alex, I’m personally liable under NIS2. I needed the truth, not a press release.”

-1 Board | 0 Legal
Helen Marsh
Helen (5 PM)

“You’ve known since 6 AM. It is now 5 PM. I am personally liable under Article 20. And you waited eleven hours to tell me.”

“I deferred the security audit you recommended in October. If the regulator asks why, and I say I didn’t know we were under attack until 5 PM — what does that look like?”

-3 Board | -1 Legal
Hour 6 — The Demand

SHADOWVAULT’s instructions arrive:

Payment: €2,000,000 in Bitcoin.
Wallet: bc1q...7f3k
Deadline: 60 hours remaining.

As proof of access, attached are 500 customer records. Names. Addresses. Payment details. Verify them.

If payment is not received, the full database will be published.

— SHADOWVAULT

You verify the sample. The records are real. Elke Jansen is on page 3. Name, address, bank details, gas consumption history.

This decision has a time limit.

Decision 3 of 3 — The Ransom

€2 million. 340,000 records. 500 verified as real.

60

Auto-selects “negotiate” if timer expires — indecision is a decision

Refuse and report to law enforcement
No negotiation. Report to CSIRT and police. The data may be published. Focus on containment and customer notification.
Negotiate — buy time while you investigate
Engage the attacker. Extend the deadline. Use the time to determine actual exposure. Risky — but may reveal their capabilities.
Pay the ransom
€2M to make this go away. No guarantee they delete the data. No guarantee they won’t come back. But maybe 340,000 customers stay private.
Dr. Petra Lindström
You

“We don’t pay. We report.”

Dr. Petra Lindström — NCSC-NL “Mr. Reeves, thank you for the early warning. You’re within the 24-hour window. When can you provide the full notification?”

You “Within 72 hours.”

Petra “Good. And Mr. Reeves — you made the right call. Paying doesn’t guarantee deletion.”

+3 Regulator | +2 Legal
Narrator

You engage SHADOWVAULT. You learn they accessed via a compromised contractor VPN and have been inside for 11 days.

Useful intelligence. But you’ve spent 2 hours communicating with a criminal organisation without reporting to the CSIRT.

When you file: “When did you first become aware?” — “6:04 AM.” — “And you’re reporting at 2 PM. What were you doing for eight hours?”

0 Regulator | -1 Legal
Narrator

You pay. €2 million. SHADOWVAULT sends a decryption key.

Three weeks later, the database appears on a dark web leak site. They sold it to a second group. The payment bought you nothing.

Dr. Lindström “You funded a criminal organisation. You did not prevent the data from being published. And you delayed your regulatory notification to arrange the payment.”

-3 Regulator | -2 Legal | -2 Board
Article 23 — NIS2 Incident Notification

Build the Notification Timeline

The five steps below are shuffled. Click them in the correct chronological order — Step 1 first, Step 5 last.

Click a card to assign it the next step number. Click Reset to start over.

?

Submit Full Incident Notification

Comprehensive report with root cause, impact, and containment measures

?

Submit Early Warning to CSIRT

Initial notification — no root cause required, just flag the incident

?

Submit Final Report

Lessons learned, permanent fixes, systemic changes

?

Provide Progress Updates

Ongoing status as requested by the competent authority

?

Detect and Assess the Incident

SOC alert received — classify severity and determine if NIS2 thresholds are met

Incident Debrief

Compliance Score

0

Regulator

50%

Operations

50%

Board

50%

Your Incident Timeline

What Happened

NIS2 Articles in Play

Article 20 — Management body personal liability
Article 21 — Cybersecurity risk management
Article 23 — 24h early warning, 72h notification
Article 32 — Fines up to €10M or 2% turnover

Your Decisions

What Happened Next

You scored . Every hour mattered. Try a different path?

Ready to train your board? Take the NIS2 readiness assessment