Get ready to dive deep into the world of cybersecurity and put your investigative skills to the test. Your mission is to uncover who stole sensitive data from a company's server, determine where the theft took place, and uncover how it was done. Good luck, and may the best team solve the mystery!
Game overview
- Duration: Four weeks (One forensic briefing each week)
- When: Fridays, 11:30 a.m. to 12:00 p.m.
- Participants: Digital forensic investigators (that's you!)
- Objective: Identify the culprit, the location of the theft, and the method used.
How to participate
- Collaborate as a team or work independently to uncover who stole the data.
- Attend weekly briefings: Participate in the scheduled forensic briefings every Friday 11:30 to 12:00pm to receive new clues, discuss the previous information and discuss findings. All information will be in the Team’s chat.
- Analyze clues: Each week, you'll receive new evidence and alibis. Work together to examine the clues.
- Submit your findings: Use the provided form to submit your answers not later than Oct. 31 at 5 p.m.: Data Heist Mystery Game (Answers) (office.com)
- Compete for prizes: those who submit the form with the correct information will be eligible to win one of four $25 e-gift cards.
Game play: Weeks 1-4
Activities:
- Watch the videos during briefings to understand the game's background.
- Join the group in discussing cyber education to include: phishing and insider threats.
- Read the suspect reports, including alibis, security photos, and potential motives for characters.
- Review the initial set of clues along with guidance on what digital footprints to look for.
- Connect alibis and evidence to identify patterns in each suspects behavior.
- Work with your forensic peers to eliminate suspects by cross-referencing alibis with new evidence and establish a timeline of events.
- Identify the culprit, the location of the theft, and the method used.
- Submit your final answers via the provided form by October 31st at 5 PM: Data Heist Mystery Game (Answers) (office.com)
Key elements of the game
- Collaborative deduction: collaborate closely with the group to analyze clues and share insights.
- Eliminating suspects: Use each piece of evidence to narrow down the list of suspects.
- Piecing together evidence: Connect digital clues like emails and search histories with physical evidence like badge logs and USB drives.