THREAT MATRIX - The cybersecurity game
THREAT MATRIX - The cybersecurity game
The digital world has become our shop, our bank, our office and our playground. Do you consider it safe? I Don't!
The digital world has become our shop, our bank, our office and our playground. Do you consider it safe? I Don't! Read more
About this project
If you have experienced the frustration of not being able to control the situation, that everything you have done has not been enough, that failure is inevitable, then you would understand. Just ask the CEO / CIO of Sony Pictures, Target, the US postal service and Home Depot.
How do you create that same level of frustration without losing your shirt?
Would you like to play a game?
THREAT MATRIX - the game, is all about the frustration. The frustration of putting management teams in the situation where they can try their hardest but the odds are stacked against them.
Experiencing the frustration of fighting cybercrime at the senior management level and losing, will prompt more discussion about cyber security
THREAT MATRIX - the game is all about getting to the discussion. Putting management in the "what if I had done this" or "I hadn't thought about that" mind set. To get to that discussion you need to understand the frustration of losing. To get to the discussion you have to lose the fight.
THREAT MATRIX the game is designed to show why it is so hard to counteract a cyber attack. To show that the bad guys have more options and why cyber security is holistic in nature.
In contrast, business is hampered by funding, a lack of understanding, low technical expertise and usually an internal culture that is not conducive to protecting the digital assets.
About the game itself
The game is between 2 players, the manager of the organisation and the hacker. The game is usually finished within 20 Minutes making it quick, interesting and fast paced. It is definitely designed to get your adrenalin running!
The game is played on an A3 size game board.
The manager of the organisation starts with a random amount of money to purchase defenses, training and systems that will protect the organisations digital infrastructure.
Each player has 10 cards to play (After they have been paid for, of course) and each turn they can play 3 onto the board. They can also replenish them at 2 cards a turn - once again if they have the financial capability.
The hacker gets the same amount of money to invest in systems to breach the defenses, reduce income and revenue and sully the organisations reputation. The hacker has both visible attack components and hidden attacks.
There are 5 main areas to track the performance of both players.
The players have 10 turns, each turn is a month to win the game. The organisation wins if all of the total points are above a certain level.
There is also a random acts set of cards that can both help and hinder both players. A random act happens on the roll of 7 from 2 x D6 every turn.
Risks and challenges
The first stage, getting the boxed game to market is the principle component of the funding.
The game as it is at the moment has been used for the last 12 months as a training aid for our clients and friends. Each use has revealed areas of improvement to a level where it can now be used by others.
We foresee the game will be sold online costing about $50.00 each.
As threats change and technology improves the game will reflect those changes with a quarterly update.
The second component of the funding is to create the app to be used in the following way.
2 x apps on tablets showing the resources of each player, rendered on a screen. A third app on an intelligent TV / monitor that shows the process of each player and the repercussions and reactions as they battle to win the game. All three are networked together via wireless or bluetooth.
The idea behind the electronic version is to create a discussion point at seminars, trade shows and meetings.Learn about accountability on Kickstarter
Support this project
- (30 days)