Understanding Player Role Modifiers
Each incident response role provides specific mechanical modifiers - or bonuses - that players can apply to relevant actions during sessions. These modifiers reinforce role identity while providing concrete gameplay benefits for specialization.
Detective Modifiers:
🎲 Game Modifiers
🎲
+3 Forensic Analysis
Deep dive into logs, artifacts, and digital evidence to reconstruct attack timelines and identify critical indicators of compromise
🎲
+2 Pattern Recognition
Spot anomalies in system behavior, connect seemingly unrelated clues, and identify attack patterns across multiple data sources
🎲
+1 Documentation
Create comprehensive incident records, develop actionable IoCs, and maintain detailed evidence chains for legal and remediation purposes
Understanding Detective Modifiers in Practice:
+3 Forensic Analysis represents the Detective’s mastery of digital evidence examination. When a Detective player attempts forensic analysis, this substantial bonus reflects their ability to efficiently parse complex log files, correlate timestamps across multiple systems, and extract meaningful intelligence from technical artifacts. For the IM, this means Detective actions involving evidence analysis should almost always succeed when using appropriate tools and methods. Use this bonus when players examine system logs, analyze malware samples, reconstruct attack timelines, or investigate digital crime scenes. The high bonus acknowledges that forensic analysis is the Detective’s core competency.
+2 Pattern Recognition captures the Detective’s trained eye for spotting anomalies others miss. This moderate bonus applies when connecting seemingly unrelated events, identifying recurring attack signatures, or recognizing behavioral patterns in system activity. For the IM, grant this bonus when players attempt to link disparate clues, spot unusual network behavior, or identify attack patterns across multiple incidents. This skill helps Detectives excel at seeing the bigger picture and making connections that drive investigations forward.
+1 Documentation reflects the Detective’s methodical approach to maintaining investigation records. While less exciting than active analysis, proper documentation is crucial for incident response success. Apply this bonus when players create incident reports, develop indicators of compromise (IoCs), maintain evidence chains, or produce documentation for legal proceedings. For the IM, this bonus ensures that Detective players can reliably produce high-quality documentation that supports team coordination and post-incident analysis.
Protector Modifiers:
🎲 Game Modifiers
🎲
+3 Containment Actions
Rapidly isolate compromised systems, deploy security controls, and implement emergency protective measures to prevent attack spread
🎲
+2 Damage Assessment
Evaluate scope of system compromise, assess data integrity, and determine extent of security control failures
🎲
+1 Recovery Planning
Design restoration strategies, validate backup integrity, and coordinate secure system recovery with minimal business disruption
Understanding Protector Modifiers in Practice:
+3 Containment Actions represents the Protector’s expertise in rapidly stopping threats from spreading. This high bonus reflects their ability to quickly isolate compromised systems, deploy emergency security controls, and implement protective measures under pressure. For the IM, this means Protector actions focused on immediate threat containment should succeed reliably, especially when using established security tools and procedures. Use this bonus when players attempt to quarantine infected systems, block malicious network traffic, disable compromised accounts, or deploy emergency security controls. The substantial bonus acknowledges that containment is the Protector’s primary responsibility during active incidents.
+2 Damage Assessment captures the Protector’s skill at evaluating the extent of system compromise. This moderate bonus applies when determining how far an attack has spread, assessing data integrity, or understanding the scope of security control failures. For the IM, grant this bonus when players investigate which systems are affected, evaluate the effectiveness of existing security measures, or determine the extent of data exposure. This skill helps Protectors make informed decisions about containment priorities and resource allocation.
+1 Recovery Planning reflects the Protector’s methodical approach to system restoration. While containment is urgent, recovery planning requires careful consideration of business continuity and security requirements. Apply this bonus when players develop restoration strategies, validate backup integrity, coordinate system recovery timelines, or design secure rebuild procedures. For the IM, this bonus ensures that Protector players can reliably develop recovery plans that balance security with business needs, supporting the organization’s return to normal operations.
Tracker Modifiers:
🎲 Game Modifiers
🎲
+3 Network Analysis
Monitor network traffic patterns, map connection relationships, and track data flow to identify malicious communications and lateral movement
🎲
+2 Behavioral Detection
Recognize unusual network behavior patterns, detect anomalous data transfers, and identify indicators of system compromise through traffic analysis
🎲
+1 Communication Monitoring
Detect command-and-control communications, identify external threat actor infrastructure, and coordinate blocking of malicious network connections
Understanding Tracker Modifiers in Practice:
+3 Network Analysis represents the Tracker’s mastery of network traffic examination and data flow understanding. This substantial bonus reflects their ability to efficiently monitor network communications, map connection relationships between systems, and track how data moves through the organization’s infrastructure. For the IM, this means Tracker actions involving network investigation should succeed reliably when using appropriate monitoring tools and techniques. Use this bonus when players analyze network logs, trace connection patterns, monitor data transfers, or investigate lateral movement pathways. The high bonus acknowledges that network analysis is the Tracker’s core specialty and primary contribution to incident response.
+2 Behavioral Detection captures the Tracker’s skill at recognizing unusual patterns in network activity that might indicate compromise. This moderate bonus applies when identifying anomalous data transfers, detecting unusual communication patterns, or spotting indicators of system compromise through traffic analysis. For the IM, grant this bonus when players attempt to identify suspicious network behavior, detect data exfiltration attempts, spot unusual connection patterns, or recognize signs of lateral movement. This skill helps Trackers excel at finding threats that might otherwise go unnoticed in network traffic.
+1 Communication Monitoring reflects the Tracker’s systematic approach to detecting and blocking malicious external communications. This bonus applies to identifying command-and-control channels, mapping threat actor infrastructure, and coordinating network-based countermeasures. Apply this bonus when players work to detect C2 communications, identify external threat infrastructure, coordinate with network security tools to block malicious connections, or develop network-based indicators for threat hunting. For the IM, this bonus ensures that Tracker players can reliably identify and help disrupt external threat actor communications.
Communicator Modifiers:
🎲 Game Modifiers
🎲
+3 Stakeholder Management
Coordinate with executive leadership, manage user communications, and serve as liaison between technical teams and business units
🎲
+2 Business Impact Assessment
Evaluate organizational implications of incidents, assess financial and operational impacts, and prioritize response based on business criticality
🎲
+1 Crisis Communication
Manage external information flow, coordinate regulatory notifications, and ensure appropriate crisis communication protocols are followed
Understanding Communicator Modifiers in Practice:
+3 Stakeholder Management represents the Communicator’s expertise in coordinating with diverse organizational stakeholders during crisis situations. This substantial bonus reflects their ability to effectively brief executive leadership, manage user communications, and serve as liaison between technical teams and business units. For the IM, this means Communicator actions involving stakeholder coordination should succeed reliably, especially when using established communication channels and protocols. Use this bonus when players conduct executive briefings, coordinate with affected user communities, manage vendor relationships during incidents, or facilitate communication between technical and business teams. The high bonus acknowledges that stakeholder management is the Communicator’s primary strength and critical for organizational incident response.
+2 Business Impact Assessment captures the Communicator’s skill at evaluating the organizational implications of security incidents. This moderate bonus applies when assessing financial impacts, understanding operational disruptions, or prioritizing response activities based on business criticality. For the IM, grant this bonus when players attempt to quantify incident impacts, assess business continuity risks, evaluate regulatory implications, or help prioritize recovery efforts based on business needs. This skill helps Communicators ensure that technical response activities align with organizational priorities and business requirements.
+1 Crisis Communication reflects the Communicator’s systematic approach to managing information flow during security incidents. This bonus applies to coordinating external communications, managing regulatory notifications, and ensuring appropriate crisis communication protocols are followed. Apply this bonus when players coordinate with legal teams, manage media relations, handle regulatory reporting requirements, or develop public communications about security incidents. For the IM, this bonus ensures that Communicator players can reliably navigate the complex external communication requirements that accompany significant security incidents.
Crisis Manager Modifiers:
🎲 Game Modifiers
🎲
+3 Team Coordination
Allocate resources effectively, set clear priorities across multiple teams, and develop strategic response plans that maximize team effectiveness
🎲
+2 Multi-track Management
Coordinate parallel response efforts, manage dependencies between different workstreams, and ensure comprehensive coverage of all incident aspects
🎲
+1 Timeline Management
Balance urgency with thoroughness, establish realistic response timelines, and coordinate activities to optimize both speed and quality of response
Understanding Crisis Manager Modifiers in Practice:
+3 Team Coordination represents the Crisis Manager’s mastery of organizing and directing incident response teams under pressure. This substantial bonus reflects their ability to effectively allocate resources, establish clear priorities across multiple teams, and develop strategic response plans that maximize overall team effectiveness. For the IM, this means Crisis Manager actions involving team organization and strategic planning should succeed reliably, especially when coordinating complex multi-team responses. Use this bonus when players coordinate team assignments, establish incident response priorities, allocate resources across competing needs, or develop comprehensive response strategies. The high bonus acknowledges that team coordination is the Crisis Manager’s primary responsibility and most critical contribution to incident response success.
+2 Multi-track Management captures the Crisis Manager’s skill at handling parallel response efforts and managing complex interdependencies. This moderate bonus applies when coordinating simultaneous response activities, managing dependencies between different workstreams, or ensuring comprehensive coverage of all incident aspects. For the IM, grant this bonus when players attempt to coordinate parallel investigation and containment efforts, manage dependencies between different response activities, ensure comprehensive incident coverage, or balance competing response priorities. This skill helps Crisis Managers excel at maintaining oversight of complex, multi-faceted incident responses.
+1 Timeline Management reflects the Crisis Manager’s systematic approach to balancing speed and quality in incident response. This bonus applies to establishing realistic response timelines, coordinating time-sensitive activities, and optimizing the balance between urgency and thoroughness. Apply this bonus when players work to establish incident response timelines, coordinate time-critical response activities, balance immediate needs with long-term recovery, or ensure response activities are completed within business requirements. For the IM, this bonus ensures that Crisis Manager players can reliably develop and maintain response timelines that meet both technical and business needs.
Threat Hunter Modifiers:
🎲 Game Modifiers
🎲
+3 Proactive Investigation
Hunt for hidden threats using hypothesis-driven analysis, search for indicators of advanced persistent threats, and uncover attack activities not detected by standard security tools
🎲
+2 Advanced Technique Recognition
Identify sophisticated attack methods, recognize advanced tradecraft patterns, and understand complex adversary tactics, techniques, and procedures
🎲
+1 Intelligence Development
Create actionable threat intelligence from incident artifacts, develop hunting hypotheses based on attack patterns, and produce intelligence that improves organizational defense
Understanding Threat Hunter Modifiers in Practice:
+3 Proactive Investigation represents the Threat Hunter’s mastery of hypothesis-driven threat discovery and advanced persistent threat detection. This substantial bonus reflects their ability to hunt for hidden threats using systematic analysis, search for indicators of sophisticated attacks, and uncover malicious activities that standard security tools miss. For the IM, this means Threat Hunter actions involving proactive threat discovery should succeed reliably, especially when using advanced hunting techniques and tools. Use this bonus when players conduct hypothesis-driven hunting, search for advanced persistent threats, investigate potential threat actor presence, or look for hidden indicators of compromise. The high bonus acknowledges that proactive investigation is the Threat Hunter’s unique strength and primary contribution to comprehensive incident response.
+2 Advanced Technique Recognition captures the Threat Hunter’s skill at identifying sophisticated attack methods and understanding complex adversary tradecraft. This moderate bonus applies when recognizing advanced attack techniques, understanding sophisticated threat actor tactics, or identifying indicators of state-sponsored or advanced criminal activity. For the IM, grant this bonus when players attempt to identify advanced attack techniques, recognize sophisticated threat actor tradecraft, understand complex attack chains, or assess the sophistication level of observed threats. This skill helps Threat Hunters excel at understanding the most challenging and sophisticated threats facing the organization.
+1 Intelligence Development reflects the Threat Hunter’s systematic approach to creating actionable threat intelligence from incident artifacts and attack patterns. This bonus applies to developing hunting hypotheses, creating threat intelligence products, and producing intelligence that improves organizational defenses. Apply this bonus when players work to develop threat intelligence from incident findings, create hunting hypotheses for future investigations, produce threat assessments, or develop indicators and signatures for improved detection. For the IM, this bonus ensures that Threat Hunter players can reliably transform their investigations into actionable intelligence that strengthens the organization’s security posture.