under the hood.
In "Under the Hood", actors dramatise a cyber attack at a major automotive company, asking the audience to help identify the insider threat within the organisation as the story unfolds. Perfect for corporate events, training sessions, and conferences, this interactive play will leave your audience informed, inspired, and better prepared to handle cybersecurity threats.
the scenario.
"Under the Hood" is a dynamic, five-act play that follows the journey of a leading car manufacturing firm as it faces a serious cyber security threat.
With a plot centred around an insider threat, this play is designed to educate and engage audiences on the complexities of cybersecurity in a relatable and entertaining way.
Between each act, the audience is invited to participate in the story by guessing who the insider threat might be. This interactive element not only keeps the audience engaged but also reinforces the importance of vigilance and critical thinking in cyber security.
learning outcomes.
-
Insider Threat
Learn how to recognise the signs and characteristics of insider threat and gain insight into the motives behind it.
-
Access Controls
Understand the reasoning behind the use of access controls to protect sensitive data.
-
recognise importance of training
Make clear the benefits of simulated attacks and ongoing cyber security training to keep employees informed about threats
-
phishing & social engineering
Recognise the importance of promptly reporting potential security incidents, including phishing and social engineering attempts.
story overview.
Act one: Ignition
Join the team at Cheetah Automotive as they unveil their latest innovation, the CheetahDrive system. The celebration is cut short by a mysterious system glitch, raising concerns about a potential insider threat.
Act two: Warning Lights
Discover the unauthorised access to the CheetahDrive source code. As suspicions grow, a cyber security consultant is brought in to investigate, uncovering alarming signs of an internal breach.
Act three: under the radar
Engage in the investigation as interviews reveal potential motives and opportunities for various employees. The tension rises as hints of external collaboration come to light.
Act four: brake point
Witness another breach targeting the production line, revealing evidence of an insider aiding a competitor. The team races against time to prevent further sabotage.
Act five: the reveal
Participate in the dramatic finale where the true insider threat is exposed. Learn how the company takes decisive actions to strengthen their cyber security measures and prevent future threats.
engaging and educational
This play combines entertainment with education, making complex cybersecurity concepts accessible and memorable.
interactive participation
Audience members actively participate in the story, making the learning experience immersive and impactful.
relatable scenario
The storyline is designed to reflect real-world challenges faced by modern organisations, providing practical insights and solutions.
Customisable Content
Tailor the narrative to your industry to address specific cybersecurity challenges and regulatory requirements.
Like what you see?
Learn more about how we can help enhance your security awareness activities. Contact us today.
what else is on offer?
Check out our range of off-the-shelf activities, perfect for building security awareness amongst end users, senior leadership, and your technical teams.
The Dilemma
Can you save the day and help recover the organisation's data before the gang leaks it to the press?!
Learn about ransomware, phishing and password security in this immersive escape room game!
cyber breach workshop.
Test out your incident response plan, or build a brand new one, in this immersive workshop from IP Performance.
Experience the fun (can we call it that?) of a breach without the fall out from the real thing.
build breakout.
Test your DevSecOps skills in this CTF challenge, expertly crafted by the team at Punk Security.
By tackling all of the OWASP Top 10 CI/CD Risks, participants can learn and enhance their skills through play!
The Heist.
Someone's left their bag on a train... using your hacking skills can you steal money from their back account before they notice?!
Learn about OSINT and privacy in this interactive and fun scenario.
trusted by
MoD
C4
Chelmsford
Trading Standards
nclose
logicalis
global
recorded future
KnowBe4
trend
freshworks
csk
bae
express vpn
starr
SHMA
LV
Admiral