Transcript
WEBVTT
00:00:04.847 --> 00:00:10.154
Calling all tabletop exercise incident response folks and tabletop gamers.
00:00:10.154 --> 00:00:13.128
Cybersecurity meet tabletop gaming.
00:00:13.128 --> 00:00:19.932
Welcome to A Role to Play, an RPG community podcast exploring the world of role-playing games.
00:00:19.932 --> 00:00:21.361
This is episode 10.
00:00:21.361 --> 00:00:22.282
This is episode 10.
00:00:22.282 --> 00:00:33.856
I'm Sara, your host, and today I'm talking with Glen Sorensen, a cybersecurity expert and a virtual CISO, that's, virtual Chief Information Security Officer.
00:00:33.856 --> 00:00:39.862
He has a background in role-playing games.
00:00:39.862 --> 00:00:41.524
He brings these skills together as an incident master for hackback gaming.
00:00:41.524 --> 00:00:48.563
Let's face it, tabletop exercising is boring, but role-playing games are fun, so why not put them together?
00:00:48.563 --> 00:00:54.725
I'll talk with Glenn today about the gamification of tabletop exercising with Hackback Gaming.
00:00:54.725 --> 00:00:56.209
Welcome, Glen.
00:00:56.209 --> 00:01:03.472
Glen Sorensen, Moderator and virtual CISO and managing director Cyber Risk Opportunities.
00:01:03.472 --> 00:01:03.874
Is that?
00:01:04.441 --> 00:01:05.427
what I should have checked with you.
00:01:05.519 --> 00:01:06.644
That is the correct title.
00:01:07.299 --> 00:01:09.668
That's a good title, yeah, absolutely.
00:01:09.668 --> 00:01:14.025
And also Incident Master for Hackback Gaming, as we'll get into here.
00:01:15.242 --> 00:01:17.349
Yes, and that's a pretty exciting piece.
00:01:17.349 --> 00:01:25.551
I think that that spawns off of the other title, the Virtual CSO and man director.
00:01:25.551 --> 00:01:38.001
Cyber Risk Opportunities must have had something to do with leading into Incident Master for Hackback Gaming, which is in itself an interesting title an Incident Master versus a Game Master or a Dungeon Master.
00:01:38.001 --> 00:01:57.715
But before we go to that, I just want to say, looking at your profile here, it looks like you have a lot of experience covering a lot of different industries and wow, a lot of experience also in industries in cyber roles security analyst, engineer, consultant, auditor, regulator.
00:01:57.715 --> 00:01:59.882
What haven't you done?
00:02:01.888 --> 00:02:02.490
Good question.
00:02:02.490 --> 00:02:05.981
I think I've done a lot of things, a little bit.
00:02:05.981 --> 00:02:22.475
There are certainly more areas that I've not covered, but I've always enjoyed seeing at least enough to understand an area and be able to manage it to some degree.
00:02:22.475 --> 00:02:27.640
So I've worn a lot of hats and, you know, kind of enjoyed doing that.
00:02:27.640 --> 00:02:34.993
So that is kind of ultimately what led into this, this virtual seesawing, we'll call it so.
00:02:36.379 --> 00:02:38.246
Cool, cool, all right.
00:02:38.246 --> 00:02:43.480
Well, before we get fully into that, I said earlier that I would surprise you.
00:02:43.480 --> 00:02:50.146
Well, surprise, this is the surprise, and it'll be a surprise for both of us, because I haven't done this before.
00:02:50.146 --> 00:03:21.992
But uh, I was gifted a fabulous deluxe edition of the deck of many things by a traveling wizard who thought that maybe I would never like actually pick this up myself which I wouldn't, it was right but that I should have it and that it might be useful for my podcast and that, if my guests are willing, I can offer that you can pull from the deck.
00:03:21.992 --> 00:03:23.014
Are you game?
00:03:23.014 --> 00:03:27.046
Let's do it.
00:03:27.046 --> 00:03:29.501
All right, I'll give you the option.
00:03:29.501 --> 00:03:41.372
Do you want to pull from the original 13 cards of the deck of many things, or do you feel ready to, or would you rather just pull from the, the extended version?
00:03:44.039 --> 00:03:45.004
oh, great question, let's do the extended version.
00:03:45.004 --> 00:03:46.995
Oh, great question, let's do the extended version.
00:03:48.620 --> 00:03:49.723
Wow, that's a lot of cards.
00:03:49.723 --> 00:03:50.443
Look at that.
00:03:52.889 --> 00:03:54.453
There are many things in that deck.
00:03:54.979 --> 00:03:57.223
There are very many things in this deck.
00:03:57.223 --> 00:03:58.586
I assure you.
00:03:58.586 --> 00:04:11.174
I just read the book, or was reading the book and contemplating the deck and the cards for good couple of weeks before I actually pulled the card.
00:04:11.174 --> 00:04:38.552
And then, finally, I got up the nerve and I pulled a card from the original deck of many things, which only has 13 cards and you know many of them are not cards that you would necessarily want to pull but I'm happy to say elite say the least, yeah but I am happy to say that I pulled the fates card out of that deck and that is a transformative card of like.
00:04:39.012 --> 00:04:45.692
just overnight, like whatever dire predicament you were in, your whole world has changed in a way that you never thought was possible.
00:04:45.692 --> 00:04:53.300
So, yeah, I pulled that in relation to you know, just thinking about this podcast.
00:04:53.300 --> 00:04:55.228
So I think that that's a very good sign.
00:04:55.228 --> 00:04:58.490
So let's see what fortune will hold for you.
00:04:58.490 --> 00:05:03.288
You're pulling from the extended deck here and I have to ask how many cards, sir, will you pull?
00:05:03.288 --> 00:05:15.007
Well, let's do two, two cards, all right, and how would you like to choose them?
00:05:15.007 --> 00:05:19.440
Would you like to like just tell me to stop shuffling, or would you like me to lay them out or cut the deck a certain number of times?
00:05:20.802 --> 00:05:22.225
you know what I'm.
00:05:22.225 --> 00:05:27.694
I'm good with the cards as they may be, so pull one when you see fit.
00:05:29.781 --> 00:05:30.742
You are very daring.
00:05:30.742 --> 00:05:33.569
You're not even going to tell me when to stop.
00:05:35.192 --> 00:05:35.733
How about now?
00:05:36.319 --> 00:05:37.122
This is your card.
00:05:37.122 --> 00:05:38.487
Oh, and there's two.
00:05:39.449 --> 00:05:39.951
And there's two.
00:05:42.483 --> 00:05:47.814
Well, I'm not sure what these will mean for you, but we got a pit and a mine.
00:05:49.040 --> 00:05:51.608
Well, I have an affinity for dwarves.
00:05:51.608 --> 00:06:00.307
So you know, Although the pit is maybe not the kind of pit, you want to be in there from the looks of it.
00:06:00.307 --> 00:06:01.550
Let's see.
00:06:05.180 --> 00:06:31.216
A pit and a mine, an affinity for dwarves and, and a mind so mining something open, open mining for something, yeah, digging for treasure, opportunities, opportunities abound, bringing things to light, finding things, yeah, yeah, not being afraid to go into the dark and recover what might lie there and bringing it back to the surface.
00:06:31.661 --> 00:06:34.524
That sounds good, you know, I'll take it.
00:06:35.425 --> 00:06:35.786
Yeah.
00:06:36.086 --> 00:06:36.387
Yeah.
00:06:36.548 --> 00:06:37.911
Yeah, all right.
00:06:37.911 --> 00:06:38.952
Well, that's awesome.
00:06:38.952 --> 00:06:41.588
Well, thank you for humoring me.
00:06:41.588 --> 00:06:43.425
That's fun to play a little game, isn't it?
00:06:43.899 --> 00:06:44.521
Absolutely.
00:06:45.684 --> 00:06:49.892
You know, this podcast is largely around role-playing games and the role-playing game community.
00:06:49.892 --> 00:07:03.529
Many people in this community will know exactly what we're talking about, but there's also going to be a lot of people that know of cyber attacks and cyber risks but aren't really living it day to day or not having a deeper understanding.
00:07:03.529 --> 00:07:09.375
Can you just start, maybe, with giving like a high level overview for the lay person about what this is all about?
00:07:18.959 --> 00:07:19.100
Sure.
00:07:19.100 --> 00:07:23.855
So I think there's some, maybe misconceptions even around cyber security and cyber risks, in that it's kind of the you know, the dark arts, and maybe that's something that's you know, mystical and we don't really understand it.
00:07:23.855 --> 00:07:27.966
But it's something that's you know, mystical and we don't really understand it, but it's, it's all.
00:07:27.966 --> 00:08:08.262
It's pretty grounded when you get into the, the, the details of it and it's it's really, you know how do people misuse systems for their benefit rather than the intent of the system, and we've grown to a place where this can be even an existential threat for businesses out there, with the prevalence of large-scale ransomware attacks where, whatever the case may be, and I think that's I mean, we've gotten to this stage where it's such a large-scale thing that we can't ignore it.
00:08:08.262 --> 00:08:09.543
It's not that thing.
00:08:09.543 --> 00:08:17.567
That is the dark arts that nobody except the wizards can deal with and think about and fix.
00:08:17.567 --> 00:08:20.050
It's something that everybody has a role in.
00:08:20.050 --> 00:08:23.531
So that's kind of my high level.
00:08:23.531 --> 00:08:24.492
Two cents on it these days.
00:08:24.872 --> 00:08:34.197
Maybe it's difficult to comprehend exactly how it's done, but suffice to say that there are a number of ways and they're getting pretty advanced in how they can occur.
00:08:34.197 --> 00:08:36.245
And this isn't just big companies.
00:08:36.245 --> 00:08:38.508
We're not just talking about Microsoft getting hacked here.
00:08:38.508 --> 00:08:43.006
We're talking about the town of Huntsville was hacked, like Hamilton, I think, was hacked.
00:08:44.341 --> 00:08:52.614
Small businesses, large businesses, especially the cyber criminals that are out for money and deploying ransomware.
00:08:52.614 --> 00:09:00.520
They're going for the vulnerable systems and they don't care who you are, they just want to get paid.
00:09:00.520 --> 00:09:10.308
And some of them have some fairly twisted manifestos and that they think they're they're actually doing the the world a favor, but they're not.
00:09:10.308 --> 00:09:32.801
And the the the way that we have built systems, the way that we have thought about systems in the past, it has migrated this into the realm of business risk, and a lot of what I do in my day job these days is managing cybersecurity as a business risk, and that's how we have to think about it at this point.
00:09:32.801 --> 00:09:44.551
And you know business risk, organization risk, like whatever you want to use, whatever term you want to use, it's about helping keep your mission, doing what you intend.
00:09:44.551 --> 00:09:51.549
You know keeping, keeping on your journey and and not getting stopped by something like this, somebody that wants to.
00:09:51.549 --> 00:09:53.802
You know railroad you and you know get paid.
00:09:54.523 --> 00:09:54.764
These are.
00:09:54.764 --> 00:10:00.433
These are significant real world problems and this is.
00:10:00.433 --> 00:10:02.203
This is like your, your, your day job.
00:10:02.203 --> 00:10:03.225
It's pretty serious stuff.
00:10:03.225 --> 00:10:10.265
It's like there's a lot of technical expertise that goes into this as well as just understanding, like the how of everything.
00:10:10.265 --> 00:10:11.304
How does this all work?
00:10:11.304 --> 00:10:18.768
But this is also paired with the gaming side of things, so tell me a little bit about that.
00:10:18.768 --> 00:10:22.671
Maybe let's start with how did you get into games?
00:10:23.759 --> 00:10:42.125
Well, so I played games, including especially role-playing games, growing up until I was in my probably mid-20s, and then life took me other directions and I didn't play as much, so that's part of my history there.
00:10:42.125 --> 00:10:57.663
Where this kind of came up again was a few years ago in a Slack group that was full of a bunch of CISOs and friends of CISOs and whatnot, and that CISO being Chief Information Security Officer.
00:10:57.663 --> 00:11:01.192
So the security leadership community, I guess.
00:11:02.200 --> 00:11:07.860
And Slack is like a chat group leadership community, I guess, and Slack is like a chat group.
00:11:07.860 --> 00:11:25.139
Yeah, discord and a handful of other things are similar, and what came out of that was somebody was looking for somebody that could run a tabletop exercise, a security incident response tabletop exercise in the form of a game, and they'd kind of already had the recipe.
00:11:25.139 --> 00:11:39.086
And so myself and our now CEO of Cyber Risk Opportunities kind of latched onto this and said we like games, we like security incident response, let's see what we can do and let's see what this is about.
00:11:39.086 --> 00:11:43.390
So it turns out that this is actually a lot of fun.
00:11:43.390 --> 00:11:56.581
It turns out that this is actually a lot of fun and there's a there's a good, a good basis for doing a security incident response tabletop exercise as a game, and some of the reasoning for that is, you know, the.
00:11:56.860 --> 00:12:00.663
A tabletop exercise is something where you it can be boring.
00:12:00.663 --> 00:12:03.745
It can be boring, it can be stressful.
00:12:03.745 --> 00:12:06.365
And let me back up a little bit.
00:12:06.365 --> 00:12:31.466
What a tabletop exercise is is getting people in a business or in a leadership and technical teams together to run through a scenario and think through what all the pieces are, test their incident response plans, really just kind of exercise their capabilities and find their gaps.
00:12:31.466 --> 00:12:38.250
One of the problems with traditional tabletop exercises is it can be boring or it can be stressful.
00:12:38.250 --> 00:12:40.620
It's hard to get everybody in a room to do it.
00:12:40.620 --> 00:12:44.587
There's a lot of people that won't necessarily see the value of it until they get in it.
00:12:44.587 --> 00:12:45.789
And then there is you.
00:12:45.789 --> 00:12:47.192
The value usually becomes pretty clear.
00:12:47.832 --> 00:12:51.024
But there's a lot of, there's a lot of ego that can be involved in it.
00:12:51.024 --> 00:12:59.240
There's, um, you know, not wanting to look bad in front of your, your peers and colleagues, and there there can just be a lot of pressure around it.
00:12:59.240 --> 00:13:06.707
Um, so that's where the gamification element comes in and you let somebody play a character.
00:13:06.707 --> 00:13:07.828
That's maybe.
00:13:07.828 --> 00:13:10.490
That's that's not themselves, it's maybe not their normal day to day role.
00:13:11.251 --> 00:13:16.897
So you might have an IT director that's playing a communications manager role or a chief marketing officer.
00:13:16.897 --> 00:13:31.893
Move that ego a little bit and the pressure and let somebody have some fun with a character and maybe even learn something a little bit different, like a different perspective.
00:13:31.893 --> 00:13:45.815
The communications manager, the chief marketing officer, they have very different angles, interests, things that they need to take care of in their role than you would as an IT director, for example.
00:13:45.815 --> 00:13:55.946
So I think there's a lot of benefit there and every time we run one of these the folks come away saying that was a lot of fun.
00:13:55.946 --> 00:13:56.850
When can we do it again?
00:13:56.850 --> 00:14:09.009
So that solves some of the problems around the traditional tabletop exercise when you're not herding cats to get people in a room if they want to come because they know they're going to have a good time.
00:14:09.279 --> 00:14:12.791
Yeah, the traditional approach would be here's the scenario, here's the list.
00:14:12.791 --> 00:14:16.187
Let's run down the list when are you at with these things?
00:14:16.187 --> 00:14:24.028
And it could get pretty, because it's also it's not real, which makes it safe because nothing's seriously on the line.
00:14:24.087 --> 00:14:38.272
But at the same time, there is an expectation that things will go well, because it's like a test to say you know, if this was a real exercise would we be OK, and, of course, if you find something wrong with it, then that's the win is that you're able to improve it.
00:14:38.272 --> 00:14:46.234
But I can see how people would want to come out without having too many improvements required.
00:14:46.234 --> 00:14:49.830
So, yeah, there's a safety in making something a game.
00:14:50.860 --> 00:14:59.424
Exactly, and so that removes a whole lot of the pressure and I think it also provides some structure in it in a way.
00:14:59.424 --> 00:15:01.351
That is kind of hard sometimes.
00:15:01.351 --> 00:15:16.423
Otherwise In a tabletop exercise you always have the stronger personalities that talk a lot and do everything, and you have the other ones that just like, maybe they don't want to talk a lot and they kind of sit back in the corner and want this thing to be done and get out of the room as quickly as they can.
00:15:16.423 --> 00:15:45.193
But having some structure around it it gives everybody opportunities to talk and say what they need to say, and because it's become a safer place then they're more free to say what they want to say and you know, if they see something in their, in their role, in their day to day, you know that that's maybe harder than if they see it in the game, but you can still take that that discovery in the game and, you know, apply it back to your reality.
00:15:45.559 --> 00:15:55.745
I like what you said before too, about having the IT director play a different role, play the marketing role or something, for example, because playing a different role gives a whole different view.
00:15:55.745 --> 00:15:57.833
It takes the pressure off.
00:15:57.833 --> 00:16:05.192
I don't have to now perform as the IT director and I get to play at being the marketing director and see what that's like.
00:16:05.379 --> 00:16:06.615
I don't have to know everything.
00:16:06.615 --> 00:16:09.929
Yeah, I don't have to know everything about being that role, because I don't.
00:16:09.929 --> 00:16:13.389
That's not my, that's not my day to day, and that's okay, right.
00:16:14.130 --> 00:16:20.293
Right, and that really opens up like the mind for for learning to say like well, what is this all about?
00:16:20.293 --> 00:16:23.429
What is the experience of being the marketing director in this scenario?
00:16:23.429 --> 00:16:29.601
What is that about Right?
00:16:29.601 --> 00:16:32.974
So there's like learning that can happen with that and I would think a lot of empathy to say, oh, this is what you have to deal with.
00:16:32.994 --> 00:16:56.110
And that's one of the things I really love about it when you, when you start shuffling you know roles and characters around a little bit and removing those from the, the, the individual and their, you know their own real self, then you get a lot of opportunity to really understand what somebody else goes through in a security incident, in this case.
00:16:56.110 --> 00:16:58.506
But I think the applicability is a lot larger than that.
00:16:58.506 --> 00:17:22.862
But I mean, I do the same thing with your communications manager and your chief marketing officer and put them in the IT director's role or the security analyst role and suddenly, like you have to think about things a little bit different way or you know, are compelled to, and you do so and, being a character, the pressure is not there, you can have fun with it.
00:17:22.862 --> 00:17:24.105
The pressure is not there, the you can have fun with it.
00:17:24.125 --> 00:17:33.190
One of the things we like to do with characters too is just like, have that, that one thing that's just a little bit over the top that you can have a lot of fun with.
00:17:33.190 --> 00:17:49.422
Like, the chief marketing officer has a book deal, it's on the table and you know everything wants, they want to talk about the book and you know there's, maybe there's a systems architect that is just like pro-Microsoft all the time, and we all know folks that just have those things.
00:17:49.422 --> 00:17:52.990
And lets you exaggerate it a little bit and really just have fun with it.
00:17:53.721 --> 00:17:55.204
Right, that's neat.
00:17:55.204 --> 00:18:03.426
So each role kind of gets like they get like sheet or a card or something that says these are your character traits and the things that are important to you.
00:18:03.426 --> 00:18:04.449
Can you describe that a bit?
00:18:05.211 --> 00:18:10.202
Yeah, so we have a number of kind of pre-built characters that we've used.
00:18:11.065 --> 00:18:22.383
We've also experimented with a little bit of character creation and I think there's probably some middle ground that we want to try again, where the character is partially built out but you let the player then customize it a little bit.
00:18:22.383 --> 00:18:29.568
But we have let the player then customize it a little bit, but we have, depending on the scenario, because you need different scenarios all the time.
00:18:29.568 --> 00:18:35.634
There's plenty of room to customize that and I mean really the sky's the limit, just like any other RPG.
00:18:35.634 --> 00:18:55.025
But we have those roles like the chief financial officer, chief marketing officer, some of the C levels, and then you have, you know, on down into you know, kind of middle, middle management, it, um, security, um, uh, I guess your your frontline service, desk help, desk, sorts.
00:18:55.025 --> 00:19:10.711
So we've got a number of characters like that that are, you know, prebuilt that way, um, and the way the, the way the game plays out, you have the, the incident master, that's kind of keeping the facilitation going, much like your dungeon master or game master.
00:19:11.413 --> 00:19:12.815
This is you, yeah, yeah.
00:19:13.580 --> 00:19:15.248
And that's the role I typically play.
00:19:15.248 --> 00:19:25.954
But we usually have a second person that is like an assistant or assistant incident master, for lack of a better term.
00:19:25.954 --> 00:19:36.711
But you know they keep track of some of the turn orders and some of the, you know, the company health, the things that we like as the game there.
00:19:38.141 --> 00:19:39.226
Sorry, I love it.
00:19:39.226 --> 00:19:41.445
You just said company health and turn orders.
00:19:42.249 --> 00:19:43.030
Company health.
00:19:43.030 --> 00:19:47.663
Yes, Exactly so.
00:19:47.663 --> 00:19:53.193
Like this is a little bit of structure and rules to the game, which I can get into here in a minute.
00:19:53.193 --> 00:20:28.344
Npcs or play roles that are just like, okay, I'm the third party vendor coming in to sell you incident response services or digital forensics or things that you might need, and I mean that can be a lot of fun in and of itself, but if there's not any reason to have the CEO as a full player in there, that's how you can have the, you know the, the NPC come in and, you know, have a little minor role in it.
00:20:29.326 --> 00:20:30.087
I would love that.
00:20:30.087 --> 00:20:32.133
It just sounds so fun.
00:20:33.160 --> 00:20:35.993
Yeah, so uh, we always have a good time with it.
00:20:38.061 --> 00:20:42.833
So how many people are typically involved in an exercise like this?
00:21:05.680 --> 00:21:15.882
lose attention span, in that we have experimented a little bit with team games, where a couple of people can play a character or maybe a function in the exercise, and some of the things that we've done have worked fairly well there.
00:21:15.882 --> 00:21:27.711
So that's a way that you can expand it to have a much larger audience, but it becomes a different game at that point, which is okay too.
00:21:28.480 --> 00:21:32.652
Well, there must be a lot of planning that goes into even just negotiating to get this set up.
00:21:33.061 --> 00:21:34.000
Yeah, absolutely.
00:21:34.000 --> 00:21:46.259
We do this for a number of audiences actually and we've done it as a security vendor, sales and marketing event, marketing event to where they will invite their customers or prospects or whatever, and then we play the game and that's.
00:21:46.259 --> 00:21:51.413
That's a different, that's more, more fun, more salesy sort of event.
00:21:51.413 --> 00:21:55.325
The other case is really training your incident response team.
00:21:55.325 --> 00:22:02.234
When you you have somebody from the same organization or you know it can be multiple organizations, organizations too, depending on how you do it.
00:22:02.599 --> 00:22:10.426
But understanding the goals of the exercise up front and the audience that's going to be in it are extremely important.
00:22:10.426 --> 00:22:20.884
I mean, it's it's easy to miss the mark and have uh, you know, if you're not conscious of that, have a have a scenario that doesn't make sense or have elements in it that doesn't make sense in the context of the people you've got.
00:22:20.884 --> 00:22:30.592
I guess, when it comes to characters and roles, there will be people that aren't going to be that comfortable in moving well, outside of their role.
00:22:30.592 --> 00:22:38.032
So not everybody's going to be comfortable moving from an IT director to a marketing officer, communications manager role.
00:22:38.032 --> 00:22:41.470
So you have to be conscious of the personality involved there too.
00:22:42.299 --> 00:22:46.892
What would you say has surprised you the most about how this has gone over, how it's been received?
00:22:47.779 --> 00:22:50.547
It's almost universally positive.
00:22:50.547 --> 00:23:06.309
Everybody has a good experience with it, which is not always something that you expect, and maybe that's just me that paranoid, cynical part of my brain it's like not not everybody's going to have fun all the time, but it's.
00:23:06.309 --> 00:23:08.522
It's really been pretty positive.
00:23:08.522 --> 00:23:22.789
On that front, I think one of the challenges that we we run into with it is not everybody's really on drunk the Kool-Aid yet, in that that you can actually have a gamified exercise that has a lot of learning value in it.
00:23:22.789 --> 00:23:23.632
It's this.
00:23:23.632 --> 00:23:25.403
There's still that, that gap.
00:23:25.584 --> 00:23:33.409
In some cases, when I'm, when I'm trying to sell the concept in conversation, like you can see the people that light up and get it.
00:23:33.409 --> 00:23:35.192
Those, those are the folks.
00:23:35.192 --> 00:23:38.147
They get excited about it pretty quickly and you can just see it.
00:23:38.147 --> 00:23:45.933
You know those are the folks that'll that'll champion the game and get other people involved and, you know, make it happen.
00:23:45.933 --> 00:24:03.441
What I found, too, is there's a remarkable number of people who have some sort of history with role-playing games, people you wouldn't expect Like you know, in technology and security communities that's a pretty prevalent thing, I would say to have been involved in games in one way or another.
00:24:03.441 --> 00:24:10.894
But lawyers and executives and marketing people and financial people.
00:24:10.894 --> 00:24:13.267
They've come out of the woodwork.
00:24:14.130 --> 00:24:14.510
Really.
00:24:15.240 --> 00:24:16.001
Yeah, yeah.
00:24:16.001 --> 00:24:40.614
So I've seen that quite a bit, and what you end up with in a game like this is you'll have a mix of people that have some experience with RPGs and whatnot and some that won't, and then the ones that do are easier to get into their character and they pull the other people along with them, so it becomes a well, it's okay to do this, so let's have fun doing it.
00:24:42.240 --> 00:24:51.824
It would be kind of neat if there was like a I don't know like an epilogue game, that, where the stakes aren't as high, but you can just go and play this for fun, understanding what it's like to be in the hot seat of the CISO, for example.
00:24:52.385 --> 00:25:10.067
Yeah, and we have a lot of plans for this and we have a GitHub repo that we're planning on open sourcing some of this stuff with in the future, and the idea really is that you know, you let somebody just pick it up and do whatever they want with it.
00:25:10.067 --> 00:25:25.865
When we get that done, I want to I'll just be really interested to see where the community takes that and what they, what they come up with, because you know as much as I talk about it and have been in it like I have my silo in how I view this and there will be people that have completely different ideas.
00:25:25.986 --> 00:25:28.112
And can you expand on that a little bit?
00:25:28.112 --> 00:25:29.582
You said GitHub repo.
00:25:29.781 --> 00:25:40.327
That is a place where you can let other people one see what you've done, but then take it and branch off and take, then take it their own direction.
00:25:40.327 --> 00:25:40.788
So it's.
00:25:40.788 --> 00:25:51.365
It's commonly thought of as a software development code repository, something that only developers use, but you can do that with documents and other things too.
00:25:51.365 --> 00:25:56.787
So that's kind of where we're going with it and it just like you can take it and do whatever you want with it.
00:25:57.359 --> 00:26:05.894
So sharing some of the foundations of the game itself, like to say you can take this and then build your own exercise off of that or turn it in a new way.
00:26:05.894 --> 00:26:18.003
So the value that is coming that Hackback Gaming is offering then is the facilitation of the exercise and all of the expertise that goes into that and the game itself, the rules of the game.
00:26:18.003 --> 00:26:22.211
It's kind of like an open source gaming license, you know.
00:26:22.211 --> 00:26:27.068
Kind of comparable to that, like wizards, yeah exactly we want to.
00:26:27.328 --> 00:26:32.405
What we want to sell is really the experience, exactly what you said and what.
00:26:32.405 --> 00:26:42.691
What I think we're going to find is that, in the same way we do a lot of other things, we we share knowledge as as freely as we can, and I mean I'm talking to the cybersecurity business side of it.
00:26:42.691 --> 00:26:43.625
We share as much knowledge as we can, and I mean I'm talking the cybersecurity business side of it.
00:26:43.625 --> 00:26:51.806
We share as much knowledge as we can because that just opens doors and broadens horizons, makes everybody a little bit better.
00:26:51.806 --> 00:26:55.711
But what we find is the knowledge is not the same as the experience.
00:26:57.380 --> 00:27:00.119
And the things that are going on in the cybersecurity world.
00:27:00.119 --> 00:27:01.244
They're always changing.
00:27:01.244 --> 00:27:08.730
There's so many different ways that you need to interface within a company and externally, like with vendors or law enforcement or regulators.
00:27:08.730 --> 00:27:20.521
So it would take quite a bit of coordination and knowledge and then even just to run the exercise like having a basic understanding of how all those pieces are like.
00:27:20.521 --> 00:27:28.210
It's one thing to run the exercise for the company and following your plan, and then it's another to take that and actually gamify it.
00:27:36.247 --> 00:27:37.867
So that's like a whole next level piece.
00:27:37.867 --> 00:27:48.757
You understand that whatever scenario you craft, you never know exactly what the players are going to do or what direction they're going to take things or where they're going to want to go.
00:27:48.757 --> 00:27:51.079
So you may find yourself.
00:27:51.079 --> 00:27:53.608
So you have to think on your feet and adapt a little bit.
00:27:53.608 --> 00:28:10.009
And I would say a security incident response is a little bit more defined in how that works than you know, kind of an open world where you know players can do anything they can imagine, but the same principle applies and things do.