Riskio Game Play Defence Stage

 
AttackStage2.png
 

THE DEFENCE

The Defenders (D) now consider the attack and select one card to defend against the attack and place the card face down in front of them. The defence could be prevent, detect or mitigate against the attack.

AttackStage4.png
 

THE DEFENCE CONTINUED

The Games Master (G) waits until all the Defenders (D) have selected their defence card. The Games Master (G) asks each Defender (D) in turn to show their defence card and explain motivate why they have chosen it. Defenders can be awarded up to 3 points.

Defence1.png

DEFENCE EXAMPLE 1 - Is this a good and cost effective defence?

The Attacker (A)Cyber Criminals - Attacker gathered information from corporate website and used this to create emails to target employees”.

The Defender (D) Train staff how to spot spoofed emails and implement a intranet based training solution for staff to test their skills”.

 
Defence2.png

DEFENCE EXAMPLE 2 - Is this a good and cost effective defence?

The Attacker (A) Cyber Criminals - Attacker gathered information from corporate website and used this to create emails to target employees”.

The Defender (D) “Configure the Email server to verify the IP Address of the incoming email domain and put in spam folder where does not match”.