The Dilemma.
the scenario.
We’re in a bit of a pickle.
The CEO of Foogle (definitely not Google) has been hit with a ransomware attack. Uh-oh!
The CEO has done some investigation already but seems to have given up and gone into hiding, so you've been left in charge of sorting this thing out. The only things left behind were a locked briefcase, phone, wallet and a notebook.
You have one hour before the attacker releases our sensitive information to Rupert Murdoch and his cronies, damaging our reputation with clients beyond repair. Good luck!
learning outcomes.
-
Password Complexity
Identify weak passwords used throughout the scenario and discuss ways to improve complexity.
-
OSINTable passwords
Understand the use of relatives, birthdays, etc. as password components is not good cyber security hygiene.
-
password reuse
Experience how password reuse can assist criminals in furthering their attacks on individuals and organisations.
-
phishing awareness
Identify how the attackers were able to effectively phish the CEO and discuss appropriate steps for remediation.
see the dilemma in action.
We brought together 50 of the industry's best and brightest to experience The Dilemma first hand. Watch the video for insights into how our events run, what people have to say about us, and maybe some clues for your next cyber escape room with us!
why choose esc?
Engaging & Interactive Learning
Our cyber security escape rooms provide hands-on, interactive experiences that make learning about cyber security fun and engaging. Unlike traditional training methods, our activities immerse participants in scenarios, enhancing retention and practical application of cyber security concepts.
expertise & innovation in training
Our team comprises cyber security professionals with extensive experience in the field. We continuously innovate our training methods to incorporate the latest trends and threats in cyber security, ensuring that your team receives up-to-date and relevant training that prepares them for the evolving landscape of cyber threats.
Tailored & Flexible Solutions
We offer both off-the-shelf and bespoke cyber security activities, allowing organisations to choose the training that best fits their needs. Whether you need ready-made games for quick deployment or custom-designed scenarios to address specific challenges, our flexible solutions ensure effective and relevant training.
Out of the Box Games.
Explore our range of ready-made cyber security escape room games, interactive workshops and CTF events, each designed to address key cyber security topics. These solutions are perfect for quick deployment and can be easily integrated into your existing training programme or event agenda.
The Heist.
Someone's left their bag on a train... using your hacking skills can you steal money from their back account before they notice?!
Learn about OSINT and privacy in this interactive and fun scenario.
Elementary.
Mr Potts is concerned when he receives a letter demanding payment in exchange for not releasing his factory blueprint.
We cover insider risk, code breaking, and password security in this entirely technology free scenario.
build breakout.
Test your DevSecOps skills in this CTF challenge, expertly crafted by the team at Punk Security.
By tackling all of the OWASP Top 10 CI/CD Risks, participants can learn and enhance their skills through play!
under the hood.
Ideal for larger audiences, our interactive theatre workshop dramatises a cyber attack and subsequent data breach at a major automotive company.
As the story unfolds, the audience must try identify the insider threat.
trusted by
MoD
C4
Chelmsford
Trading Standards
nclose
logicalis
global
dtx
recorded future
KnowBe4
trend
freshworks
csk
bae
express vpn
starr