An approach is provided that retrieves organization information that pertains to a computer system operated by an organization and a set of current cyber security threat data that pertains to the organization. A security simulation is generated based on the current cyber security threat data and the organization data with the simulation including any number of decision-linked simulation segments. The simulation is then performed during which a user makes decisions based on the decision-linked simulation segments. The result of the simulation is an evaluated cyber security threat that corresponds to the organization's computer system.