The Heist
Today, you're the bad guys.
Someone left their rucksack on a train. Inside is a laptop, a diary, a cryptex, and everything you ned to break into their bank account, You have 30 minutes before they realise what's happened. That's your window.
Flip the Script.
Most security training puts people in the role of the defender. The Heist does the opposite. Your team are the attackers - part of an elite hacking crew called The Breach Collective - and the rucksack sitting in front of you is an opportunity that's practically gift-wrapped.
A woman got off the train and left her bag behind. Inside is a cryptex, a laptop, a diary with personal details, and a browser bookmarked to her social media profile. Everything an attacker needs. All because she left her bag on a seat.
Your job is to work through it all - crack the padlock, unlock the cryptex, get into the laptop, find the banking credentials - and hit the transfer button before she realises what's happened.
By the time your team has done it, the lesson has already landed. You don't need to be told a sentimental password is a bad idea when you've just used one to steal someone's money.
Mission Objective
"Break in. Extract the cash. Get out. No brute forcing. no random guessing. Everything you need is in the bag."
What your team takes away
The Heist works because the lessons aren't delivered - they're experienced. Your team doesn't hear that weak passwords are dangerous. They use one to steal money. That's a different kind of learning entirely.
The file on the desktop
Your team will find something on the laptop that makes the whole room laugh... and then go quiet. Then start thinking about their own devices. It takes about four seconds to spot and about four days to stop thinking about...
The post that breaks it.
Near the end, your team will the find bank password in the last place Paula should have left it... and the first place any attacker would look. By the time it clicks, the debrief has already started. The facilitator just has to catch up.
built for the whole workforce.
General Workforce
The Heist is built for the people attackers actually target... not IT teams, but the rest of the organisation. No technical knowledge required. The scenario is deliberately built around the kind of everyday personal security mistakes that affect everyone, regardless of role or seniority.
High-Risk Individuals
Senior leaders, finance teams, and anyone with access to sensitive systems or data are prime targets for exactly the kind of attack The Heist simulates. Playing the attacker is the most effective way to understand why personal security practices matter at work as much as they do at home.
Teams Who've Already Done The Breach
The Breach puts you in the role of investigator. The Heist puts you in the role of attacker. They're designed to complement each other - same security principles, completely different perspective. Running both gives teams a genuinely rounded understanding of how attacks happen.
Away Days & Large Events
Fast-paced, immediately gripping, and runs in 30 minutes. The attacker framing makes it one of the most talked-about scenarios we run - people don't expect to enjoy playing the villain quite as much as they do. Back-to-back rotations make it easy to run across large groups in a single day.
The numbers that matter
30min
duration
Plus 15-20 minute facilitated debrief. Back-to-back rotations available for larger groups.
5
players per team
Minimum 3. Optimal at 5. Multiple kits can run simultaneously for bigger events.
1table
space required
A desk-sized space is all you need. Wi-Fi is required for the laptop element.
20min
setup time
We handle everything. You arrive to a room that's ready to go.
50+
people in a day
With back-to-back rotations across multiple kits. We'll help you plan the logistics.
3
delivery options
Facilitated, Kit Hire, or Long-Term Rental. Details below.
choose your delivery format
facilitated sessions
We turn up, set up, and run everything - including charging the laptop. Our hosts bring the energy, manage the pressure, and deliver a structured debrief that connects the heist to your team's real behaviours.
Kit hire
We ship you the complete kit. Your internal champions run the session - we'll brief you on the setup so it's ready to go before your team walks in the room.
long-term rental
Keep the kit year-round and run it as often as you like. Swap scenarios throughout the year to cover different security topics and keep the experience fresh.
Beyond having enjoyed the game, this was the most impactful messaging we've been able to deliver to support our guidance regarding passwords and use of MFA. The discussions these events have sparked within the Peabody workforce have demonstrated a level of impact and understanding we haven't previously achieved.
⎯ BISO, Peabody
Things people usually ask
Does playing the attacker feel uncomfortable?
Good uncomfortable, not bad uncomfortable. The scenario is clearly fictional (you're not hacking a real person) but the techniques are real and the recognition of your own habits is very real. That slight discomfort is exactly what makes the lesson stick. Teams consistently rate it as one of the most memorable training experiences they've had.
Do we need any technical knowledge to play?
None at all. The attack vectors in The Heist are human, not technical - weak passwords, oversharing on social media, unsecured devices. The scenario is deliberately accessible so that the people most likely to make these mistakes in real life can experience the consequences in a safe environment.
Does the kit require Wi-Fi?
Yes - the laptop element requires a Wi-Fi connection to access Paula's social media profile. We recommend using a guest network. In facilitated sessions we handle all the setup. For kit hire, we'll brief you in advance on what you need to have in place.
Can we run it for more than 5 people at once?
Yes. Multiple kits can run simultaneously, and back-to-back rotations mean you can put 50+ people through in a single day. We'll help you work out the logistics based on your group size and the space available.
How does this count towards compliance frameworks?
The Heist supports requirements under ISO 27001 (Clauses A.6.3, A.8.1, A.8.5), NIST CSF 2.0 (PR.AT, PR.AA, AM), NIS2 (Articles 20–21), and DORA (Article 13). We can provide documentation to support your audit trail.
How does this compare to The Breach?
The Breach puts you in the role of investigator trying to stop a ransomware attack. The Heist puts you in the role of attacker exploiting personal security failures. They cover complementary ground - social engineering and organisational security vs personal security and attacker mindset - and work very well run together.
Explore the Full Range
A ransomware attack. Five suspects. Five compromise paths. Crack the case, call the hackers live, and earn the decryption key before the clock runs out.
An OT incident shuts down CCTV, locks the equipment room, and knocks a PLC offline. Your team becomes the on-site SOC - physical clues, WhatsApp SOC guidance, and a clock that's counting down.
Victorian espionage. Modern lessons. Step into Sherlock's office to uncover who stole the factory blueprints - ciphers, contraptions and a suspiciously clever origami puzzle that brings encryption to life.
Let's Book The Heist
Tell us your team size, your location, and your rough timeline. We'll come back to you with everything you need to make it happen.