Boardroom-Level Risk Intelligence
Model a realistic breach scenario for your organization — from productivity loss to market cap impact — in seconds.
| # | A | B | C | D | E |
|---|---|---|---|---|---|
| 1 | INSTALL POWDER | GARDEN BRIDGE | MARBLE SILVER | ROCKET WINDOW | GUITAR CASTLE |
| 2 | PLANET ANCHOR | TURTLE FOREST | BASKET TEMPLE | VELVET PIRATE | COTTON DRAGON |
| 3 | CANYON MAGNET | PUZZLE ORANGE | VIOLET BEACON | COPPER JUNGLE | CARPET MONKEY |
| 4 | HARBOR KNIGHT | VISION QUARTZ | JASPER WILLOW | SUMMIT STREAM | PARROT FABRIC |
Since October 2023, Iranian state-sponsored actors have conducted sustained cyberattacks against U.S. critical infrastructure — targeting the exact identity and authentication layer your workforce depends on every day.
“The FBI has countered a diverse set of threats directed by the Iranian regime, including cyber attacks targeting authentication infrastructure, credentials theft, and ransomware coordination against U.S. organizations.”
FBI Counterintelligence Division ↗During a serious attack:
Credentials are compromised
MFA devices fail or are disabled
Identity providers are locked or untrusted
Device Management MDM systems like Microsoft Intune fail
Interactive Calculator
The default values represent the impact of the Iranian-led cyber attack on Stryker Corporation (SYK). Adjust the parameters below or enter your stock market ticker to model a realistic breach scenario for your organization.
Total Loss
$32.9M
Total Loss
$36.2M
Total Costs
$95.0M
Total Loss
$220.0M
Market Value Lost
$5.6B
Your Cyber Attack Cost
$384.1M
The Problem
Device based MFA take years to enroll everyone but can be lost in one day
“If identity goes down… everything stops.”

Reality check
80%+ of breaches involve compromised credentials (Verizon DBIR)
Identity is now the primary attack surface
Most MFA solutions depend on the same systems attackers target
The Solution
The first Identity Continuity Layer
A simple idea: a physical, air-gapped identity factor that continues working during a cyber crisis.
No phone required
No app required
No network required
No dependency on compromised systems
Try it Yourself Play The Game to Get Access ↓
| # | A | B | C | D | E |
|---|---|---|---|---|---|
| 1 | INSTALL POWDER | GARDEN BRIDGE | MARBLE SILVER | ROCKET WINDOW | GUITAR CASTLE |
| 2 | PLANET ANCHOR | TURTLE FOREST | BASKET TEMPLE | VELVET PIRATE | COTTON DRAGON |
| 3 | CANYON MAGNET | PUZZLE ORANGE | VIOLET BEACON | COPPER JUNGLE | CARPET MONKEY |
| 4 | HARBOR KNIGHT | VISION QUARTZ | JASPER WILLOW | SUMMIT STREAM | PARROT FABRIC |
| 5 | MEADOW COBALT | FABRIC SPHINX | FALCON BINARY | ORCHID PRISM | LANTERN OXYGEN |
Factor 1 Enter coordinate A1 — provide the TOP word
Factor 2 Enter your PIN 1234
How Two-Factor Works
· Factor 1 — Find the coordinate (e.g., A1, B3) and enter the TOP or BOTTOM word
· Factor 2 — Read your 4-digit PIN, then enter it in the PIN field.
· Both factors required — Both the word and PIN answer must be correct
· New challenge — Click 'New' to randomize a fresh coordinate, PIN, and question
Identity systems go down. Devices die. Networks fail. MFA pushes get fatigue-approved. Credential spraying succeeds. But physical proof of identity—a printed grid, memorized coordinates, a PIN you control—doesn't require infrastructure, doesn't depend on connectivity, and can't be phished. The Identity Challenge Card removes every justification for every MFA exception.
Enroll every employee. All in one day.
Authentication Definition
Deviceless MFA
Verification does not require a smartphone, token, or biometric reader. It requires proof of identity and an enrollment system rigorous enough to stand behind it. That is the standard. Everything else is a workaround.
Device or network dependency at the moment of authentication
Workforce coverage — including every environment you previously exempted
True two-factor: something you have, something you know. Printed. Offline.
The Difference
Device-Dependent MFA
Identity Challenge Card
This is your fallback identity layer.
Executive Value
For CFOs
Prevents multi-million dollar downtime
Protects workforce productivity
Reduces recovery costs
For CIOs
Immediate fallback authentication
No infrastructure dependency
Works across all systems
For CISOs
Air-gapped = not remotely attackable
Eliminates device-based attack paths
Zero credential exposure
For AI Leaders (AIO)
Extends identity beyond devices
Works in degraded or disconnected environments
Future-proofs identity for AI-driven systems
No commitment · 30-min live demo · same-day response
Protecting the world's workforce since 1997
Transparency
Our cost estimates are grounded in peer-reviewed research, government data, and industry-standard breach economics. Here’s exactly how every number is derived.
The Cyber Attack Cost Calculator models five categories of financial impact: employee productivity loss, revenue disruption, incident response & recovery costs, reputational damage, and market capitalization impact. Each category uses conservative base assumptions derived from publicly available data, which users can adjust to match their organization’s profile.
When a stock ticker is entered, the calculator pulls real-time data from Yahoo Finance (employee count, annual revenue, market capitalization) and median employee compensation from SEC DEF 14A proxy filings to populate accurate starting values for that specific company.
Important disclaimer:These estimates model plausible financial impact based on industry benchmarks. Actual costs vary significantly based on an organization’s recovery maturity, identity resilience posture, insurance coverage, and incident-specific factors. This tool is intended for educational and planning purposes and does not constitute financial advice.
Employer Costs for Employee Compensation survey — used for fully loaded hourly cost benchmarks ($45–$70/hr across industries).
Median employee compensation figures from annual proxy statements — auto-populated when a stock ticker is entered.
Annual revenue figures sourced from SEC filings and Yahoo Finance for real-time ticker lookups.
Gartner / Forrester
Industry benchmarks for average downtime costs and revenue impact during cyber incidents.
Global benchmark: average total cost of a data breach reached $4.88M, with identity-related breaches averaging higher.
Research on incident response costs, forensics, legal notification, and system rebuild expenses across severity levels.
Analysis of stock price effects following data breaches — average 6.7% decline within 5 trading days of disclosure, with major breaches causing 3–15% drops.
Annual analysis of breach vectors — 80%+ of breaches involve compromised credentials, validating identity-centric risk modeling.
Advisory on Iranian state-sponsored cyber operations targeting U.S. critical infrastructure and enterprise authentication systems.
U.S. Cybersecurity and Infrastructure Security Agency threat alerts and best practices for identity system protection.
Methodology last reviewed: April 2026 · Data sources are refreshed as new reports are published.