«Piece of Cake» - the role-playing game

The secret receipe for your famous cake has been stolen! Only your biggest rival is capable of such a malicious act. Can you retrieve the receipe before it's too late?

Gather information. Sneak in. Earn your piece of cake. 

The tabletop role-playing game

Sneak into your rival's premises

Oh no! The secret receipe for your famous cake has been stolen! Without it, your bakery is ruined. Only your biggest rival is capable of such a malicious act. Can you retrieve the receipe before it's too late?

Are you ready to sneak onto your rival's premises? Your team's mission is to find the stolen receipe and steal it back. Accept your role and convince and manipulate your opponent to lead you to your most valuable asset.

Together with up to 5 people you have to try and find its whereabouts by using social engineering techniques. 

The participants learn more about the following topics:  

Data privacy is often understood as a right that each person is basically free to decide for himself or herself who should have access to which of his or her personal data and when.

More information and tips:

Data security has the technical objective of adequately securing data of any kind against loss, manipulation and other threats.

More information and tips:

Using social engineering techniques criminal hackers hack people. With the help of psychological tricks, they want to push their victim into revealing sensitive information, such as passwords.

More information and tricks:

  • book to read: The Art of Deception by Kevin Mitnick (e/f/d/i)
  • movie to watch: Catch me if you can with Leonardo DiCaprio and Tom Hanks (e/f/d/i)

It's all about hacking people


Criminal hackers found out a long time ago that it can be easier to hack people than heavily protected computer systems. Phishing, CEO Fraud or Investment Fraud are just a few attack types that use social engineering techniques to manipulate people into disclosing information or giving money.

Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. (wikipedia.org)

Piece of Cake

 

Duration: ca. 2 h
Number of participants: max. 5 pers.
Target group: employees of all fields, students
Location:  flexible
Price: on request

iBarry offers useful information on security topics for everyone. The content is free to use under the Creative Commons license.