NPC Development Guide
Creating Compelling Non-Player Characters for M&M Scenarios
Non-Player Characters (NPCs) transform cybersecurity incident response scenarios from technical exercises into rich, human-centered stories. Well-developed NPCs provide information, create complications, and drive narrative tension while teaching realistic organizational dynamics.
The Role of NPCs in M&M Sessions
Information Sources
NPCs provide crucial context about:
- How the incident unfolded from different organizational perspectives
- Hidden pressures and constraints affecting response options
- Organizational culture and decision-making processes
- Stakeholder concerns that complicate technical solutions
Conflict Generators
NPCs create realistic tension through:
- Competing priorities that force difficult trade-offs
- Different risk tolerances and time pressures
- Organizational politics that complicate coordination
- External stakeholder demands that limit response options
Learning Catalysts
NPCs facilitate education by:
- Representing different organizational roles and perspectives
- Demonstrating how cybersecurity impacts various business functions
- Creating opportunities for players to practice stakeholder communication
- Illustrating real-world constraints on ideal security responses
NPC Archetype Library
Executive Leadership Archetypes
The Results-Driven CEO
Typical Concerns:
- Revenue impact and customer confidence
- Competitive advantage and market position
- Regulatory compliance and legal liability
- Public relations and company reputation
Common Motivations:
- Minimize business disruption at all costs
- Protect shareholder value and quarterly results
- Maintain customer trust and market credibility
- Avoid regulatory scrutiny and legal exposure
Typical Dialogue Patterns:
- “What’s the bottom-line impact of this incident?”
- “How quickly can we get back to normal operations?”
- “Do we need to notify customers or can we handle this quietly?”
- “What’s this going to cost us in lost revenue?”
Relationship Dynamics:
- Often impatient with technical details
- Focused on business outcomes over security process
- May pressure for faster resolution than security allows
- Needs clear, non-technical communication about risks and options
Scenario Applications:
- Creates time pressure for rapid incident resolution
- Forces discussion of business continuity vs. security thoroughness
- Represents stakeholder communication challenges
- Illustrates C-level perspective on cybersecurity investments
The Compliance-Focused COO
Typical Concerns:
- Regulatory reporting requirements and deadlines
- Audit compliance and documentation standards
- Process improvement and operational efficiency
- Risk management and liability mitigation
Common Motivations:
- Ensure all regulatory obligations are met properly
- Document comprehensive response for audit purposes
- Maintain operational processes and procedure adherence
- Minimize regulatory penalties and compliance violations
Typical Dialogue Patterns:
- “What are our reporting requirements for this type of incident?”
- “How do we document our response for the auditors?”
- “Are we following established incident response procedures?”
- “What compliance violations might result from this breach?”
Relationship Dynamics:
- Values thorough documentation and process adherence
- May slow incident response to ensure proper procedures
- Strong ally for comprehensive security investment
- Provides regulatory expertise and compliance guidance
Scenario Applications:
- Adds regulatory complexity to technical response decisions
- Creates tension between speed and compliance thoroughness
- Represents organizational commitment to security processes
- Illustrates connection between security and regulatory frameworks
IT Leadership Archetypes
The Overwhelmed IT Director
Typical Concerns:
- System stability and user productivity
- Resource constraints and competing priorities
- Staff workload and technical debt management
- Balancing security with usability demands
Common Motivations:
- Keep systems running and users productive
- Manage competing demands with limited resources
- Avoid blame for security incidents or system failures
- Demonstrate IT value to organizational leadership
Typical Dialogue Patterns:
- “We’ve been telling management we need security investment for months”
- “How do we contain this without shutting down critical systems?”
- “My team is already stretched thin with other priorities”
- “Users are going to complain if we restrict access too much”
Relationship Dynamics:
- Often defensive about security gaps due to resource constraints
- Valuable source of technical context and system knowledge
- May have insights about organizational security culture
- Balances security concerns with operational demands
Scenario Applications:
- Provides realistic resource and time constraints
- Illustrates common IT security challenges and trade-offs
- Creates opportunities to discuss security investment priorities
- Represents technical expertise while highlighting organizational limitations
The Security-Conscious CISO
Typical Concerns:
- Threat landscape evolution and organizational preparedness
- Security awareness and culture development
- Incident response effectiveness and lessons learned
- Strategic security architecture and long-term planning
Common Motivations:
- Protect organizational assets and reputation through robust security
- Build security awareness and culture throughout organization
- Demonstrate security program value to executive leadership
- Continuously improve security posture based on threat intelligence
Typical Dialogue Patterns:
- “This incident validates the threats I’ve been warning about”
- “What can we learn from this to prevent future attacks?”
- “How does this change our risk assessment and security priorities?”
- “What additional security controls should we implement?”
Relationship Dynamics:
- Strong advocate for comprehensive security response
- Provides strategic security perspective and threat intelligence
- May conflict with business leaders over security vs. productivity
- Valuable mentor for technical security analysis and planning
Scenario Applications:
- Represents security expertise and strategic thinking
- Creates opportunities for threat intelligence and attribution discussion
- Illustrates tension between security thoroughness and business demands
- Provides pathway for advanced security concepts and techniques
End User Representative Archetypes
The Frustrated Department Head
Typical Concerns:
- Department productivity and work completion
- Staff morale and work environment quality
- Customer service and external relationship management
- Meeting deadlines and performance objectives
Common Motivations:
- Minimize disruption to department operations and staff productivity
- Maintain quality customer service and external relationships
- Protect staff from blame and additional work burden
- Complete critical projects and meet important deadlines
Typical Dialogue Patterns:
- “My team can’t afford downtime during our busy season”
- “How long before we can get back to normal operations?”
- “Are you saying my staff did something wrong?”
- “We have customers depending on us to deliver on time”
Relationship Dynamics:
- Often focused on immediate operational impact over security implications
- May resist security measures that reduce productivity or convenience
- Valuable source of information about user behavior and organizational culture
- Represents broader organizational perspective beyond IT and security
Scenario Applications:
- Illustrates business impact of security incidents and responses
- Creates realistic pressure for rapid resolution
- Provides opportunities to discuss user education and awareness
- Represents stakeholder communication and change management challenges
The Tech-Savvy Power User
Typical Concerns:
- Technology efficiency and advanced feature utilization
- System performance and capability optimization
- Integration between different tools and platforms
- Innovation and technology adoption opportunities
Common Motivations:
- Maximize personal and team productivity through technology
- Explore new tools and techniques for competitive advantage
- Maintain access to advanced features and system capabilities
- Share technology knowledge and mentor colleagues
Typical Dialogue Patterns:
- “I noticed unusual network behavior yesterday but didn’t think much of it”
- “Can I help with the technical investigation?”
- “What security tools should we be using to prevent this?”
- “How can we detect similar attacks in the future?”
Relationship Dynamics:
- Often helpful source of technical information and system knowledge
- May have insights about attack vectors and user behavior patterns
- Generally supportive of security measures that don’t reduce functionality
- Can serve as ally for security awareness and culture development
Scenario Applications:
- Provides technical insights from user perspective
- Creates opportunities to discuss security awareness and user education
- Illustrates value of engaged users in security monitoring and response
- Represents positive organizational security culture and engagement
External Stakeholder Archetypes
The Demanding Client
Typical Concerns:
- Service availability and performance standards
- Data security and privacy protection
- Contract compliance and service level agreements
- Competitive alternatives and vendor reliability
Common Motivations:
- Ensure contracted services meet agreed-upon standards
- Protect own organization’s data and operations
- Maintain competitive advantage through reliable vendor relationships
- Minimize risk of secondary impact from vendor security incidents
Typical Dialogue Patterns:
- “When will our systems be back online?”
- “How does this affect our data security and privacy?”
- “Are you meeting the service levels specified in our contract?”
- “Should we be looking for alternative service providers?”
Relationship Dynamics:
- Creates external pressure for rapid incident resolution
- May threaten business relationships if not satisfied with response
- Represents reputational and financial consequences of security incidents
- Often lacks understanding of technical security complexities
Scenario Applications:
- Adds external stakeholder pressure to incident response decisions
- Illustrates business consequences of security incidents
- Creates opportunities to discuss customer communication during incidents
- Represents contract and legal considerations in security response
The Regulatory Examiner
Typical Concerns:
- Compliance with applicable regulations and standards
- Documentation and evidence of proper security controls
- Organizational commitment to regulatory compliance
- Industry-wide security posture and threat management
Common Motivations:
- Ensure organization meets all applicable regulatory requirements
- Verify effectiveness of security controls and incident response procedures
- Protect consumers and industry stability through regulatory oversight
- Identify systemic risks and improvement opportunities
Typical Dialogue Patterns:
- “What evidence do you have of proper incident response procedures?”
- “How do you ensure this type of incident won’t happen again?”
- “Are you meeting all notification and reporting requirements?”
- “What changes will you make to prevent similar incidents?”
Relationship Dynamics:
- Adds regulatory complexity and potential penalties to incident response
- Requires detailed documentation and evidence of proper procedures
- May be supportive of security investment and improvement efforts
- Represents long-term consequences and organizational accountability
Scenario Applications:
- Illustrates regulatory dimensions of cybersecurity incidents
- Creates pressure for comprehensive documentation and analysis
- Represents long-term security culture and process improvement opportunities
- Adds complexity to incident response communication and reporting
NPC Relationship Mapping
Common Organizational Dynamics
IT vs. Business Leadership
Typical Tensions:
- Security thoroughness vs. business continuity demands
- Technology investment priorities vs. other business needs
- Risk tolerance differences and time pressure management
- Communication gaps between technical and business perspectives
Scenario Applications:
- Forces players to navigate competing organizational priorities
- Illustrates realistic constraints on ideal security responses
- Creates opportunities to practice stakeholder communication
- Demonstrates need for security and business alignment
Internal vs. External Stakeholder Pressure
Typical Tensions:
- Internal process adherence vs. external delivery commitments
- Regulatory compliance vs. customer satisfaction demands
- Comprehensive security response vs. rapid business recovery
- Documentation requirements vs. immediate action needs
Scenario Applications:
- Adds realism and complexity to incident response decisions
- Creates multiple audience communication challenges
- Illustrates business consequences of security incident response
- Demonstrates stakeholder management during crisis situations
Department vs. Organization-Wide Perspectives
Typical Tensions:
- Individual department productivity vs. organizational security
- Localized convenience vs. enterprise-wide consistency
- Department-specific needs vs. standardized security controls
- Short-term operational demands vs. long-term security investment
Scenario Applications:
- Represents diverse organizational perspectives and priorities
- Creates opportunities for collaborative problem-solving
- Illustrates security culture development challenges
- Demonstrates need for organization-wide security awareness
NPC Evolution During Scenarios
Information Revelation Patterns
Early Scenario (Discovery Phase):
- NPCs provide initial context and symptom information
- Characters represent different organizational perspectives
- Limited technical knowledge shared, focus on impact and concerns
- Establish relationship dynamics and competing priorities
Mid Scenario (Investigation Phase):
- NPCs reveal additional details based on player questions
- Characters show evolving understanding of incident severity
- Technical and business implications become clearer
- Relationship tensions may increase as stakes become apparent
Late Scenario (Response Phase):
- NPCs contribute to solution development and implementation
- Characters adapt to new information and changing circumstances
- Collaboration or conflict patterns become more pronounced
- Final character arcs demonstrate learning and growth
Emotional Arc Development
Beginning: Confusion, concern, initial blame or defensiveness Middle: Growing understanding, increased urgency, collaborative problem-solving End: Resolution, lessons learned, commitment to improvement
NPC Integration Techniques
During Character Creation
- Ask players about their real-world organizational experience
- Connect NPC roles to players’ professional backgrounds when appropriate
- Use NPCs to represent perspectives not covered by player roles
- Establish NPC relationships and dynamics before scenario begins
During Discovery Phase
- Use NPCs to provide symptom context and initial information
- Have NPCs represent different theories about incident cause
- Let NPCs demonstrate varying levels of technical understanding
- Use NPC dialogue to introduce organizational constraints and pressures
During Investigation Phase
- Have NPCs reveal additional information based on player questions
- Use NPCs to represent different stakeholder concerns and priorities
- Let NPCs evolve their understanding as investigation progresses
- Create NPC conflicts that mirror real organizational tensions
During Response Phase
- Use NPCs to provide resource commitments or constraints
- Have NPCs represent implementation challenges and opportunities
- Let NPCs demonstrate organizational change and learning
- Use NPC feedback to validate player response strategies
Advanced NPC Techniques
The Unreliable Narrator
- NPCs who have incomplete or incorrect information
- Characters who are defensive or blame-shifting
- Stakeholders with hidden agendas or competing priorities
- Representatives who don’t fully understand technical implications
Applications:
- Creates realistic information uncertainty
- Forces players to verify and cross-reference information
- Illustrates organizational communication challenges
- Demonstrates need for multiple information sources
The Evolving Ally
- NPCs who initially resist security measures but learn through scenario
- Characters who become advocates for security investment
- Stakeholders who develop understanding of security importance
- Representatives who facilitate organizational change
Applications:
- Demonstrates security awareness development
- Illustrates successful stakeholder engagement techniques
- Represents organizational learning and culture development
- Provides positive reinforcement for collaborative approaches
The Constraint Creator
- NPCs who represent realistic resource limitations
- Characters who enforce regulatory or policy requirements
- Stakeholders who have competing priorities and time pressures
- Representatives who introduce external pressures and complications
Applications:
- Adds realism to incident response scenarios
- Creates opportunities to practice prioritization and trade-off decisions
- Illustrates real-world constraints on ideal security responses
- Demonstrates need for creativity and flexibility in security solutions
NPC Development Worksheets
Quick NPC Creation (2 minutes per character)
Character Name: ______________________
Organizational Role: ______________________
Primary Concern: ______________________
Current Emotional State: ______________________
What They Know: ______________________
What They Don’t Know: ______________________
Key Dialogue Pattern: ______________________
Detailed NPC Development (5 minutes per character)
Character Background:
- Name and role within organization
- Professional background and expertise areas
- Relationship to cybersecurity and technology
- Personal stakes and concerns in incident resolution
Scenario Integration:
- What information can this character provide?
- What complications or conflicts might they create?
- How might they evolve during the scenario?
- What learning opportunities do they represent?
Dialogue Preparation:
- Key phrases or concerns they would express
- Questions they would ask during incident response
- Resistance or support patterns they would demonstrate
- Communication style and organizational perspective
NPC Relationship Matrix
NPC Pair | Potential Conflicts | Shared Interests | Communication Patterns |
---|---|---|---|
CEO & CISO | Speed vs. Thoroughness | Organizational Protection | Strategic vs. Technical |
IT Director & Dept Head | Security vs. Productivity | System Functionality | Technical vs. Operational |
Compliance & IT | Process vs. Efficiency | Regulatory Adherence | Policy vs. Implementation |
Integration with Scenario Cards
Scenario Card NPC Planning
Each scenario card should include 3-4 NPCs that:
- Represent different organizational perspectives
- Create realistic conflicts and complications
- Provide information needed for investigation
- Demonstrate stakeholder communication challenges
Adaptation for Different Groups
High-Expertise Groups:
- Add NPCs with advanced technical knowledge
- Include characters representing sophisticated organizational politics
- Create NPCs with industry-specific expertise and concerns
Beginner Groups:
- Focus on clear, relatable organizational roles
- Emphasize basic business and security concept connections
- Use NPCs to teach fundamental cybersecurity principles
Mixed Groups:
- Balance technical and non-technical NPC perspectives
- Use NPCs to facilitate peer teaching opportunities
- Create characters that bridge different experience levels
Remember: NPCs are tools for learning facilitation, not rigid characters to be portrayed. They should adapt to serve your group’s learning needs while maintaining realistic organizational dynamics and human motivations.