SlideShare a Scribd company logo
1 of 17
A Cyber-Strategy game that’s easy to play but difficult to master
Developed by Sr CyberSecurity Consultant ‘Tabish Asifi’ (E: tabish@alhosninfosec.com; tabish.asifi@live.com | Tw: @tabish.asifi)
www.cyberstratg.com
You are the proud owner of a
$100 Million (Revenue)
Company
Your Company is
Exposed to Cyber
Threats Just Like Any
Other Company in the
Market.
Which means your business is
exposed to all the typical Cyber
Threats, which are on the rise.
High Level Objectives of this Game
Minimize the negative
impact of Cyber Threats to
your business.
1
Maximize the coverage of
mandatory Regulatory and
Legal compliance.
2
Maximize the positive
impact on business
through achievement of
security objectives.
3
Core Elements of the Game
Overall Objective: Maximize the over all net
revenue of your company over a 3 year span.
Key Resources: The Information you need for
decision making is provided in the web worksheet.
Key Skills: Identify and analyse relevant information
and take decisions in limited time.
Time at disposal
• A total of 3 year to maximize your
net revenue.
• Each year is represented by 1 hour
of gameplay. (Fast track- 20 min.)
• Total of max 14 investment
decisions per year is allowed.
• Hence you essentially get 20 - 60
min per session, for making key
decisions for your investments, in
the right security control /
capability.
Budget at disposal
• Security Budget: 1% of revenue per
year ie C$ 1 million.
• Since typically 10% of business revenue
is assigned to IT.
• And typically 10% of IT budget goes
into security.
Investment Cards
• SO- Security Objectives (Red | Black)
• SC- Security Capability
These cards are purchased by the
players every year for investment
towards threat impact mitigation,
regulatory compliance and
business objectives attainment.
A Maximum of 14 such cards can
be bought in a year.
Wheels of Threat
• A threat is randomly selected
by the Spin Wheel.
• The frequency of common
cyber threat is given due
weightage during the
selection.
• For this game, the list of
threats used is from NESA IAS
(& ADSIC) threat catalogue.
• A maximum of 6 threats are
selected every year.
Links between different components
Actualized Threats impact
negatively your revenue.
Investment in SO (Security
Objectives) and SC (Security
Capability) neutralizes or
minimizes the impact of
these random ‘threat’
exposure.
Non-Compliance found
through random regulatory
audit impacts negatively
your revenue. Investment in
all the mandatory SO (Red
Cards) saves you from the
negative impact.
SO (Security Objective)
achievement/ investment
also impacts positively your
revenue by supporting your
Business Goals.
Imp Decision Making Sheets [Web Workbook]
List of SO and SC with its Cost-Benefit & Time constraints.
List of mandatory SO for compliance audit success.
“SO.Im” Sheet
List of Threats and its Impact and Frequency.“Th.Im” Sheet
Calculation of threat exposure once a threat is realized
(that is picked by the threat wheel).“ThExp” Sheet
Players Gameboard
& Working sheets
Typical Gameplay Sequence
Team Play
Red
Team
Blue
Team
Green
Team
Team Name RED BLUE GREEN
Typical Mix CEO/CFO/MD/Board Legal/Audit/Compliance COO/CIO/CISO
Perspectives Business Audit Operational
Member no Members list below Members list below Members list below
1
2
3
4
5
Compete against each other # Recommended: 5 members for each team and each team brings a
different and unique perspective to the gameplay.
Identifying a
successful
outcome
The green team wins!
Lets Play www.cyberstratg.com

More Related Content

Similar to CyberstratG Game narrative

Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
Jojo Colina
 
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Berezha Security Group
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
Bill Lisse
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframes
scubeuser31
 
Gaming Investment Primer
Gaming Investment PrimerGaming Investment Primer
Gaming Investment Primer
THEgarygreen
 

Similar to CyberstratG Game narrative (20)

Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
 
Glo bus 2018 grand champion tips 2018-10-09 how to win GLO-BUS
Glo bus 2018 grand champion tips 2018-10-09  how to win GLO-BUSGlo bus 2018 grand champion tips 2018-10-09  how to win GLO-BUS
Glo bus 2018 grand champion tips 2018-10-09 how to win GLO-BUS
 
Microsoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis ReportMicrosoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis Report
 
Microsoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis ReportMicrosoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis Report
 
Covered Calls Probability Program
Covered Calls Probability ProgramCovered Calls Probability Program
Covered Calls Probability Program
 
Covered Calls Probability Program 2
Covered Calls Probability Program 2Covered Calls Probability Program 2
Covered Calls Probability Program 2
 
itSMF Belgium event 13/5/2015 : ABC for ICT workshop
itSMF Belgium event 13/5/2015 : ABC for ICT workshopitSMF Belgium event 13/5/2015 : ABC for ICT workshop
itSMF Belgium event 13/5/2015 : ABC for ICT workshop
 
Microsoft Corporation
Microsoft CorporationMicrosoft Corporation
Microsoft Corporation
 
Dominion Midstream Partners LP.pdf
Dominion Midstream Partners LP.pdfDominion Midstream Partners LP.pdf
Dominion Midstream Partners LP.pdf
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 
Autodesk Inc (ADSK) Stock Analysis
Autodesk Inc (ADSK) Stock AnalysisAutodesk Inc (ADSK) Stock Analysis
Autodesk Inc (ADSK) Stock Analysis
 
Microsoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis ReportMicrosoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis Report
 
CSCO Stock Forecast.pdf
CSCO Stock Forecast.pdfCSCO Stock Forecast.pdf
CSCO Stock Forecast.pdf
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Microsoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis ReportMicrosoft Corporation (MSFT) Stock Analysis Report
Microsoft Corporation (MSFT) Stock Analysis Report
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
LAFS SVI Level 7 - Game Publishing
LAFS SVI Level 7 - Game PublishingLAFS SVI Level 7 - Game Publishing
LAFS SVI Level 7 - Game Publishing
 
Promisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - WireframesPromisec - ROI Calculator - Wireframes
Promisec - ROI Calculator - Wireframes
 
Gaming Investment Primer
Gaming Investment PrimerGaming Investment Primer
Gaming Investment Primer
 

Recently uploaded

internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
AllTops
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Riyadh +966572737505 get cytotec
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
SandaliGurusinghe2
 

Recently uploaded (14)

digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 

CyberstratG Game narrative

  • 1. A Cyber-Strategy game that’s easy to play but difficult to master Developed by Sr CyberSecurity Consultant ‘Tabish Asifi’ (E: tabish@alhosninfosec.com; tabish.asifi@live.com | Tw: @tabish.asifi) www.cyberstratg.com
  • 2. You are the proud owner of a $100 Million (Revenue) Company
  • 3. Your Company is Exposed to Cyber Threats Just Like Any Other Company in the Market.
  • 4. Which means your business is exposed to all the typical Cyber Threats, which are on the rise.
  • 5. High Level Objectives of this Game Minimize the negative impact of Cyber Threats to your business. 1 Maximize the coverage of mandatory Regulatory and Legal compliance. 2 Maximize the positive impact on business through achievement of security objectives. 3
  • 6. Core Elements of the Game Overall Objective: Maximize the over all net revenue of your company over a 3 year span. Key Resources: The Information you need for decision making is provided in the web worksheet. Key Skills: Identify and analyse relevant information and take decisions in limited time.
  • 7. Time at disposal • A total of 3 year to maximize your net revenue. • Each year is represented by 1 hour of gameplay. (Fast track- 20 min.) • Total of max 14 investment decisions per year is allowed. • Hence you essentially get 20 - 60 min per session, for making key decisions for your investments, in the right security control / capability.
  • 8. Budget at disposal • Security Budget: 1% of revenue per year ie C$ 1 million. • Since typically 10% of business revenue is assigned to IT. • And typically 10% of IT budget goes into security.
  • 9. Investment Cards • SO- Security Objectives (Red | Black) • SC- Security Capability These cards are purchased by the players every year for investment towards threat impact mitigation, regulatory compliance and business objectives attainment. A Maximum of 14 such cards can be bought in a year.
  • 10. Wheels of Threat • A threat is randomly selected by the Spin Wheel. • The frequency of common cyber threat is given due weightage during the selection. • For this game, the list of threats used is from NESA IAS (& ADSIC) threat catalogue. • A maximum of 6 threats are selected every year.
  • 11. Links between different components Actualized Threats impact negatively your revenue. Investment in SO (Security Objectives) and SC (Security Capability) neutralizes or minimizes the impact of these random ‘threat’ exposure. Non-Compliance found through random regulatory audit impacts negatively your revenue. Investment in all the mandatory SO (Red Cards) saves you from the negative impact. SO (Security Objective) achievement/ investment also impacts positively your revenue by supporting your Business Goals.
  • 12. Imp Decision Making Sheets [Web Workbook] List of SO and SC with its Cost-Benefit & Time constraints. List of mandatory SO for compliance audit success. “SO.Im” Sheet List of Threats and its Impact and Frequency.“Th.Im” Sheet Calculation of threat exposure once a threat is realized (that is picked by the threat wheel).“ThExp” Sheet
  • 15. Team Play Red Team Blue Team Green Team Team Name RED BLUE GREEN Typical Mix CEO/CFO/MD/Board Legal/Audit/Compliance COO/CIO/CISO Perspectives Business Audit Operational Member no Members list below Members list below Members list below 1 2 3 4 5 Compete against each other # Recommended: 5 members for each team and each team brings a different and unique perspective to the gameplay.