The Dilemma.

team size

3 to 6 people

time

60 minutes

customisations

available on request

the scenario.

We’re in a bit of a pickle.

The CEO of Foogle (definitely not Google) has been hit with a ransomware attack. Uh-oh!

The CEO has done some investigation already but seems to have given up and gone into hiding, so you've been left in charge of sorting this thing out. The only things left behind were a locked briefcase, phone, wallet and a notebook.

You have one hour before the attacker releases our sensitive information to Rupert Murdoch and his cronies, damaging our reputation with clients beyond repair. Good luck!

learning outcomes.

  • Password Complexity

    Identify weak passwords used throughout the scenario and discuss ways to improve complexity.

  • OSINTable passwords

    Understand the use of relatives, birthdays, etc. as password components is not good cyber security hygiene.

  • password reuse

    Experience how password reuse can assist criminals in furthering their attacks on individuals and organisations.

  • phishing awareness

    Identify how the attackers were able to effectively phish the CEO and discuss appropriate steps for remediation.

see the dilemma in action.

We brought together 50 of the industry's best and brightest to experience The Dilemma first hand. Watch the video for insights into how our events run, what people have to say about us, and maybe some clues for your next cyber escape room with us! 

Play Video

why choose esc?

Engaging & Interactive Learning

Our cyber security escape rooms provide hands-on, interactive experiences that make learning about cyber security fun and engaging. Unlike traditional training methods, our activities immerse participants in scenarios, enhancing retention and practical application of cyber security concepts.

expertise & innovation in training

Our team comprises cyber security professionals with extensive experience in the field. We continuously innovate our training methods to incorporate the latest trends and threats in cyber security, ensuring that your team receives up-to-date and relevant training that prepares them for the evolving landscape of cyber threats.

Tailored & Flexible Solutions

We offer both off-the-shelf and bespoke cyber security activities, allowing organisations to choose the training that best fits their needs. Whether you need ready-made games for quick deployment or custom-designed scenarios to address specific challenges, our flexible solutions ensure effective and relevant training.

Back pack Mock Up (1)

Customisation Options.

Your brand matters.

Whether you need full white labelling with custom materials, a subtle incorporation of your company colours or brand, or a completely new scenario tailored to your learning objectives, industry, or product line, we are here to assist.

From escape rooms to bespoke interactive theatre, from capture-the-flag (CTF) challenges to board games, we have the expertise to deliver outstanding experiences. Let us help you impress your clients, enhance end-user training, and effectively engage your audience.

Out of the Box Games.

Explore our range of ready-made cyber security escape room games, interactive workshops and CTF events, each designed to address key cyber security topics. These solutions are perfect for quick deployment and can be easily integrated into your existing training programme or event agenda.

THE HEIST
Escape Room

The Heist.

Someone's left their bag on a train... using your hacking skills can you steal money from their back account before they notice?!

Learn about OSINT and privacy in this interactive and fun scenario.

ELEMENTARY
Escape Room

Elementary.

Mr Potts is concerned when he receives a letter demanding payment in exchange for not releasing his factory blueprint.

We cover insider risk, code breaking, and password security in this entirely technology free scenario.

Scenario Thumbnails (3)
ctf

build breakout.

Test your DevSecOps skills in this CTF challenge, expertly crafted by the team at Punk Security.

By tackling all of the OWASP Top 10 CI/CD Risks, participants can learn and enhance their skills through play!

Scenario Thumbnails (1)
interactive theatre

under the hood.

Ideal for larger audiences, our interactive theatre workshop dramatises a cyber attack and subsequent data breach at a major automotive company.

As the story unfolds, the audience must try identify the insider threat.

trusted by