The Meeting.

team size

3 to 6 people


45 minutes


available on request

the scenario.

We need your help.

Our daughter, Lauren, has gone missing and we can’t find her anywhere. We spoke to her best friend who said she’s meeting someone in half an hour but she’s not sure who or where.

Her cellphone is missing but we have found her school bag in her bedroom. Maybe that holds some clues?

Can you help us to find Lauren before her meeting so we can make sure she’s ok?

We’re counting on you.

learning outcomes.

  • Social Media Privacy

    Keeping your personal information secure online is paramount to not only your cyber safety but also, potentially, your physical safety.

  • Basic Cryptography

    Learn about how codes are used to encrypt data and keep information secure.

  • password security

    Understand how weak passwords and poor password security protocols in every day life can help cyber attackers.

  • Online Safety

    Gain knowledge about the dangers of oversharing on the internet and see real life consequences of not following social media best practice.

why choose esc?

Engaging & Interactive Learning

Our cyber security escape rooms provide hands-on, interactive experiences that make learning about cyber security fun and engaging. Unlike traditional training methods, our activities immerse participants in scenarios, enhancing retention and practical application of cyber security concepts.

expertise & innovation in training

Our team comprises cyber security professionals with extensive experience in the field. We continuously innovate our training methods to incorporate the latest trends and threats in cyber security, ensuring that your team receives up-to-date and relevant training that prepares them for the evolving landscape of cyber threats.

Tailored & Flexible Solutions

We offer both off-the-shelf and bespoke cyber security activities, allowing organisations to choose the training that best fits their needs. Whether you need ready-made games for quick deployment or custom-designed scenarios to address specific challenges, our flexible solutions ensure effective and relevant training.

Back pack Mock Up (1)

Customisation Options.

Your brand matters.

Whether you need full white labelling with custom materials, a subtle incorporation of your company colours or brand, or a completely new scenario tailored to your learning objectives, industry, or product line, we are here to assist.

From escape rooms to bespoke interactive theatre, from capture-the-flag (CTF) challenges to board games, we have the expertise to deliver outstanding experiences. Let us help you impress your clients, enhance end-user training, and effectively engage your audience.

Out of the Box Games.

Explore our range of ready-made cyber security escape room games, interactive workshops and CTF events, each designed to address key cyber security topics. These solutions are perfect for quick deployment and can be easily integrated into your existing training programme or event agenda.

Escape Room

The Heist.

Someone's left their bag on a train... using your hacking skills can you steal money from their back account before they notice?!

Learn about OSINT and privacy in this interactive and fun scenario.

Escape Room


Mr Potts is concerned when he receives a letter demanding payment in exchange for not releasing his factory blueprint.

We cover insider risk, code breaking, and password security in this entirely technology free scenario.

Scenario Thumbnails (3)

build breakout.

Test your DevSecOps skills in this CTF challenge, expertly crafted by the team at Punk Security.

By tackling all of the OWASP Top 10 CI/CD Risks, participants can learn and enhance their skills through play!

Scenario Thumbnails (1)
interactive theatre

under the hood.

Ideal for larger audiences, our interactive theatre workshop dramatises a cyber attack and subsequent data breach at a major automotive company.

As the story unfolds, the audience must try identify the insider threat.

trusted by