Find your situation.
The products are the same. How they fit into your programme depends on where you're starting from. These pages are for the specific situations teams actually bring to us.
situation
is the
brief.
Most training decisions start from a product. An escape room hire, a phishing simulation, an awareness platform. The product gets purchased, deployed once, and retired when the novelty wears off.
We work differently. The situation is the brief. A champions network that's lost momentum needs something different from a team that just survived a breach. A new joiner programme has different requirements from an October activation. The products are the same. The deployment is not.
These pages map out how The Cyber Escape Room Co. ecosystem fits real programme scenarios: what to use, how to sequence it, and what it looks like when it's working properly.
Find the one that sounds like yours.
You've built the network. You've identified the right people and given them the role. The part most programmes skip is giving them something worth actually running with.
October comes around every year. Most programmes treat it as a spike. Here's how to make it a moment the organisation looks forward to, and one that actually changes something.
Finance. HR. Executive assistants. The people attackers actually call. Generic training doesn't cut it for the general workforce, and it certainly doesn't cut it here.
Physical experiences work brilliantly for whoever's in the building. How do you make sure the programme reaches everyone, not just the people who happen to be at HQ that day?
New joiners form habits in their first 90 days. What they learn about security in that window shapes how they behave for the rest of their time at your organisation.
After a breach or near-miss, organisations have a narrow window where people are genuinely paying attention. Most training programmes aren't built to use it. This one is.
You've got a stand, a slot, or a moment at an event and you need something that stops people walking past. Or you're hosting internally and want the security message to land, not just fill a slot on the agenda.
These seven cover the most common starting points. But every programme is different. Tell us what you're working with and we'll tell you where we'd start.