 
      The Cybersecurity Game Master
From Role Playing Games to Tabletop Exercises that Engage and Inspire
- Publisher's listprice GBP 110.00
- 
          
            52 552 Ft (50 050 Ft + 5% VAT)The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly. 
- Discount 10% (cc. 5 255 Ft off)
- Discounted price 47 297 Ft (45 045 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
52 552 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher CRC Press
- Date of Publication 18 December 2025
- ISBN 9781032998206
- Binding Hardback
- No. of pages202 pages
- Size 234x156 mm
- Language English
- Illustrations 8 Illustrations, black & white; 1 Halftones, black & white; 7 Line drawings, black & white; 28 Tables, black & white 700
Categories
Short description:
In today's digital landscape, no company is immune to cyber-attacks, making preparedness essential for any organization, regardless of size. Enter the world of Tabletop Exercises (TTX), a cost-effective and results-driven approach to test cyber crises proactively.
MoreLong description:
In today's digital landscape, no company is immune to cyber-attacks, making preparedness essential for any organization, regardless of size. Enter the world of Tabletop Exercises (TTX), a cost-effective and results-driven approach to test cyber crises proactively. However, workplace dynamics can hinder effective participation as the fear of proposing wrong decisions and the apprehension of appearing less competent in front of colleagues can still stifle creativity, even during a simple exercise. This book addresses these concerns by injecting a fresh perspective, seamlessly integrating elements from Role Playing Games (RPG) into the design and execution of TTX scenarios to make them more engaging and fun. "The Cybersecurity Game Master" invites readers not only to master the TTX mindset but also to embrace it as a gamified experience, fostering a dynamic learning environment without the fear of judgment. By infusing fun into the serious business of cybersecurity, this book redefines TTX design, allowing teams to enjoy the process of understanding their company, procedures, and future challenges in a stress-free manner.
MoreTable of Contents:
Part 1: From Facilitator to Cybersecurity Game Master. Chapter 1: The Purpose of Tabletop Exercises. What is a tabletop exercise (TTX)?. The documents. No documents? No problem!. References. Chapter 2: Planning and Running a TTX. Using NIST800-61 to drive TTX design. TTX Example 1. Using the MITRE ATT&CK framework to articulate realistic threats. TTX Example 2. Limitations of TTX in a corporate environment. References. Chapter 3: An Introduction to Gamification, Fun, and Role-Playing Games. Understanding Players and "Fun". The Origins of Role-Playing Games. The Inner Workings of an RPG. References. Chapter 4: Putting the RPG into the TTX. The Cybersecurity RPG Classes. Stats and Skills. Applying the System. RPG-TTX Example: Data Breach. Chapter 5: Making the most out of an RPG-TTX. Creating Relevant and Engaging Cybersecurity Quests. How to debrief players. How to Measure Success: a Cybersecurity Game Master's Perspective. Intermezzo - Chapter 6: Expert Interviews. Prof. Dr. Agostino Bruzzone, University of Genoa. Ms. Francesca Bosco, Cyber Peace Institute. Part 2: Sample Documents and Quests. Chapter 7: The Documents. Incident Response Plan (IRP). Incident Playbook: Distributed Denial of Service (DDOS) Attack. Incident Playbook: Malware Infection via Phishing. Incident Playbook: Ransomware Attack. Chapter 8: The Great Blackout: a DDOS Crisis. The Quest. Comments and Additional Ideas. Chapter 9: The Silent Intruder: a Spear-Phishing APT Attack. The Quest. Comments and Additional Ideas. Chapter 10: To RDP or not to RDP? A Ransomware Crisis. The Quest. Comments and Additional Ideas. Appendix A: Incident Response Plan Template. Appendix B: Incident Playbook Template. Appendix C: RPG-TTX Character Sheet. Appendix D: Pre-Rolled Characters.
More