The document discusses security war games and red team/blue team exercises. It provides examples of red team techniques like exploiting unprotected file shares and spear phishing attacks. It also gives examples of blue team detection methods like discovering backdoor command and control servers and tracking attack progression. The document emphasizes that these exercises help measure security, identify gaps, and improve incident response procedures. Running such games establishes baselines and frameworks to inventory damage and identify security investments needed to reduce the time to detect, contain, and recover from attacks.