Poison Ivy Scenario: Financial Advisory Surveillance
Financial Surveillance • PoisonIvy
STAKES
Client financial privacy + Strategy integrity + Regulatory compliance + Advisory trust
HOOK
Advisory teams at Westfield Financial Advisors report unauthorized after-hours account views, portfolio workstations showing remote cursor activity, and unexplained session prompts during private client reviews. Network telemetry shows encrypted outbound sessions from advisory systems while endpoint scans reveal no destructive malware indicators.
PRESSURE
- Decision window: Thursday 4:00 PM
- Asset scope: $2 billion AUM
- Strategic exposure: $310 million high-net-worth strategy exposure
FRONT • 120 minutes • Intermediate
Financial Surveillance • PoisonIvy
NPCs
- Richard Hartwell (Managing Director): Owns continuity, disclosure, and trust posture
- Maria Santos (CTO): Leads technical containment and environment hardening
- David Kim (Compliance Director): Directs regulatory response and client-notification posture
- Rachel Green (CISO): Coordinates evidence handling and authority engagement
SECRETS
- Monitoring prioritized broad endpoint alerts over operator-behavior analytics
- Privileged advisory roles had broader access than least-privilege policy intended
- Covert remote access focused on high-value client strategy artifacts before visible disruption
Poison Ivy Scenario: Financial Advisory Surveillance
Financial Surveillance • PoisonIvy
STAKES
Client financial privacy + Strategy integrity + Regulatory compliance + Advisory trust
HOOK
Advisory teams at Ashworth Wealth Partners report unauthorized after-hours account views, portfolio workstations showing remote cursor activity, and unexplained session prompts during private client reviews. Network telemetry shows encrypted outbound sessions from advisory systems while endpoint scans reveal no destructive malware indicators.
PRESSURE
- Decision window: Thursday 16:00
- Asset scope: GBP 1.5 billion AUM
- Strategic exposure: GBP 240 million high-net-worth strategy exposure
FRONT • 120 minutes • Intermediate
Financial Surveillance • PoisonIvy
NPCs
- James Ashworth (Managing Director): Owns continuity, disclosure, and trust posture
- Priya Sharma (CTO): Leads technical containment and environment hardening
- Eleanor Davies (Compliance Director): Directs regulatory response and client-notification posture
- Fiona MacLeod (CISO): Coordinates evidence handling and authority engagement
SECRETS
- Monitoring prioritized broad endpoint alerts over operator-behavior analytics
- Privileged advisory roles had broader access than least-privilege policy intended
- Covert remote access focused on high-value client strategy artifacts before visible disruption
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
Poison Ivy Financial Advisory Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:
Poison Ivy Financial Advisory Scenario Slides
Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support
Scenario Details for IMs
Hook
“It is Tuesday at 8:55 AM at Westfield Financial Advisors. Advisors preparing quarterly portfolio reviews report unexplained remote session activity, intermittent workstation control loss, and unauthorized access events in client-account tools. Security teams confirm suspicious outbound connections while standard endpoint scans appear clean. Leadership must contain likely covert surveillance without breaking client-trust commitments.”
“Initial anomalies were logged at 8:55 AM, with executive decisions due by Thursday 4:00 PM.”
“Operational scope: Advisory firm with 150 employees and $2 billion AUM and $2 billion AUM.”
“(Regional context: US financial advisory response.)”
“It is Tuesday at 08:55 at Ashworth Wealth Partners. Advisors preparing quarterly portfolio reviews report unexplained remote session activity, intermittent workstation control loss, and unauthorized access events in client-account tools. Security teams confirm suspicious outbound connections while standard endpoint scans appear clean. Leadership must contain likely covert surveillance without breaking client-trust commitments.”
“Initial anomalies were logged at 08:55, with executive decisions due by Thursday 16:00.”
“Operational scope: Advisory firm with 120 employees and GBP 1.5 billion AUM and GBP 1.5 billion AUM.”
“(Regional context: UK financial advisory response.)”
Initial Symptoms to Present:
- “Advisor systems show intermittent remote cursor activity and session prompts”
- “Client account tools show unauthorized after-hours access patterns”
- “Endpoint scans appear mostly clean despite persistent suspicious behavior”
- “Encrypted outbound sessions originate from portfolio and strategy workstations”
Key Discovery Paths:
Detective Investigation Leads:
- Timeline reconstruction shows covert access before visible operational impact
- Access traces indicate focused interest in high-value client strategy artifacts
- Evidence suggests long-duration surveillance optimized for intelligence collection
Protector System Analysis:
- Advisor endpoints show remote-control artifacts and command-execution anomalies
- Segmentation controls reduced but did not eliminate sensitive exposure pathways
- Recovery confidence depends on evidence preservation before broad reset actions
Tracker Network Investigation:
- Forensics identify periodic encrypted beaconing from advisory systems
- Transfer patterns indicate staged exfiltration from client and strategy repositories
- Infrastructure overlap suggests organized surveillance tradecraft rather than opportunistic activity
Communicator Stakeholder Interviews:
- Advisory leadership needs clear guidance on safe continuation thresholds
- Clients request confidence statements on account and strategy integrity
- Compliance and legal teams need disclosure thresholds tied to evidence quality
Mid-Scenario Pressure Points:
- Hour 1: Leadership cannot confirm integrity of active advisory strategy baselines
- Hour 2: Indicators suggest unauthorized reads of high-value client strategy materials
- Hour 3: Clients request formal incident posture updates and account-risk guidance
- Hour 4: Regulatory and fiduciary confidence declines as unresolved scope expands
Evolution Triggers:
- If containment is delayed, covert access persists and collection scope increases
- If systems are reset too quickly, key investigative evidence may be lost
- If communication is delayed, client trust and compliance defensibility decline rapidly
Resolution Pathways:
Technical Success Indicators:
- Verified removal of covert access paths and restoration of trusted advisory baselines
- Evidence package preserved for authority and legal coordination
- Monitoring strategy upgraded to detect persistent remote-control behavior
Business Success Indicators:
- Continuity and disclosure decisions remain defensible with documented rationale
- Client communication stays timely, accurate, and confidence-scoped
- Fiduciary and regulatory risk is managed through coordinated governance
Learning Success Indicators:
- Team recognizes long-duration remote-access surveillance patterns in financial contexts
- Participants practice balancing evidence preservation with client-service urgency
- Group coordinates technical, compliance, and executive decisions under pressure
Common IM Facilitation Challenges:
If Teams Rush to Reimage Systems:
“Which evidence artifacts are essential before reset actions, and who signs off on that tradeoff?”
If Advisory Pressure Overrides Security Discipline:
“What evidence threshold is required before asserting client-account and strategy integrity?”
If Authority Coordination Is Delayed:
“SEC supervisory contacts request incident status and ask when affected clients and authorities will be notified of potential financial-data exposure.”
“FCA supervisory contacts request incident status and ask when affected clients and authorities will be notified of potential financial-data exposure.”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 2 investigation rounds, 1 decision round
Focus: Remote-access detection and immediate client-protection posture decisions
Key Actions: Scope exposure, preserve evidence, issue first confidence statement
Lunch & Learn (75-90 minutes)
Structure: 4 investigation rounds, 2 decision rounds
Focus: Parallel forensic triage, compliance posture, and notification sequencing
Key Actions: Build timeline confidence, protect high-value advisory assets, align advisory and compliance messaging
Full Game (120-140 minutes)
Structure: 6 investigation rounds, 3 decision rounds
Focus: End-to-end financial-surveillance response under high-stakes client pressure
Key Actions: Coordinate leadership and advisory teams, decide continuity posture, define durable remediation
Advanced Challenge (150-170 minutes)
Structure: 7-8 investigation rounds, 4 decision rounds
Expert Elements: Fiduciary-liability tension, disclosure conflict, and governance pressure
Additional Challenges: Ambiguous scope, client escalation, and compressed decision windows
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): Security operations at Westfield Financial Advisors confirms covert remote-control behavior in advisory environments.
- Clue 2 (Minute 10): Investigators identify unauthorized reads from repositories supporting active portfolio strategy work.
- Clue 3 (Minute 15): Compliance Director David Kim confirms unauthorized reads of portfolio strategy notes, allocation models, and client briefings used for this week’s advisory meetings.
- Clue 1 (Minute 5): Security operations at Ashworth Wealth Partners confirms covert remote-control behavior in advisory environments.
- Clue 2 (Minute 10): Investigators identify unauthorized reads from repositories supporting active portfolio strategy work.
- Clue 3 (Minute 15): Compliance Director Eleanor Davies confirms unauthorized reads of portfolio strategy notes, allocation models, and client briefings used for this week’s advisory meetings.
Pre-Defined Response Options
Option A: Evidence-Preserved Containment
- Action: Isolate high-risk systems, preserve evidence, and execute staged recovery with compliance and authority coordination.
- Pros: Improves attribution confidence and long-term defensibility.
- Cons: Slower short-term recovery and immediate advisory pressure.
- Type Effectiveness: Super effective for durable strategic resilience.
Option B: Continuity-First Operations
- Action: Maintain broad operations while applying targeted controls to minimize disruption.
- Pros: Supports near-term advisory continuity and client-service stability.
- Cons: Higher risk of ongoing covert collection and uncertain exposure scope.
- Type Effectiveness: Partially effective with elevated strategic risk.
Option C: Phased Confidence Restoration
- Action: Prioritize critical accounts, restore in waves, and sequence disclosure as confidence improves.
- Pros: Balances operational urgency with evidence discipline.
- Cons: Extended ambiguity can strain client and regulator trust.
- Type Effectiveness: Moderately effective when governance remains disciplined.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Covert Access Discovery (30-35 min)
Investigation Clues:
- Clue 1 (Minute 5): Advisory systems show persistent covert behavior and control anomalies.
- Clue 2 (Minute 10): Forensics indicate sustained unauthorized visibility into strategy workflows.
- Clue 3 (Minute 15): Compliance Director David Kim confirms unauthorized reads of portfolio strategy notes, allocation models, and client briefings used for this week’s advisory meetings.
- Clue 3 (Minute 15): Compliance Director Eleanor Davies confirms unauthorized reads of portfolio strategy notes, allocation models, and client briefings used for this week’s advisory meetings.
- Clue 4 (Minute 20): Leadership requests immediate containment recommendation with client-impact estimate.
Round 2: Reporting and Confidence Posture (30-35 min)
Investigation Clues:
- Clue 5 (Minute 30): Clients request formal confidence statements on account and strategy integrity.
- Clue 6 (Minute 40): SEC supervisory contacts request incident status and ask when affected clients and authorities will be notified of potential financial-data exposure.
- Clue 6 (Minute 40): FCA supervisory contacts request incident status and ask when affected clients and authorities will be notified of potential financial-data exposure.
- Clue 7 (Minute 50): Advisory leadership requests a clear continuity posture decision.
- Clue 8 (Minute 55): Compliance teams require documented rationale for disclosure choices.
Round Transition Narrative
After Round 1 -> Round 2:
“FBI reports recurring financial-surveillance operations where covert remote access persisted through multiple advisory cycles before detection.”
“NCSC reports recurring financial-surveillance operations where covert remote access persisted through multiple advisory cycles before detection.”
Facilitation questions:
- “What minimum evidence supports a credible confidence statement to clients?”
- “Which decisions cannot wait for full forensic certainty?”
- “How do you communicate uncertainty without eroding trust?”
Debrief Focus:
- Integrating remote-access forensics with fiduciary-governance decisions
- Balancing client pressure with evidence quality and compliance obligations
- Preserving confidence as exposure scope evolves through recovery phases
Full Game Materials (120-140 min, 3 rounds)
The Full Game expands from 2 guided rounds to 3 open-ended rounds. Players drive their own investigation using the Key Discovery Paths above rather than timed clues. Round 3 focuses on institutional recovery and advisory-governance redesign.
Round 1: Executive Briefing and Scope Discovery (35-40 min)
Managing Director Richard Hartwell opens an emergency briefing and states that advisory confidence cannot degrade before this quarter’s client cycle. CTO Maria Santos confirms remote-control artifacts in portfolio systems. Compliance Director David Kim reports potential exposure of confidential client strategy materials. CISO Rachel Green requests immediate containment with evidence preservation for FBI and regulatory coordination.
Managing Director James Ashworth opens an emergency briefing and states that advisory confidence cannot degrade before this quarter’s client cycle. CTO Priya Sharma confirms remote-control artifacts in portfolio systems. Compliance Director Eleanor Davies reports potential exposure of confidential client strategy materials. CISO Fiona MacLeod requests immediate containment with evidence preservation for NCSC, NCA, and FCA coordination.
Players investigate openly using role capabilities. Early findings include covert repository access, uncertain scope, and rising client pressure.
If team stalls: “You can prioritize speed or confidence first. Which path remains defensible to advisory leadership and clients by end of day?”
Round 2: Regulatory Coordination and Continuity Decisions (35-40 min)
- Technical teams complete artifact collection and present containment/recovery options.
- Leadership requests a clear recommendation for continuity posture and disclosure timing.
- Coordination now spans SEC and FINRA client-data and market-integrity obligations, SEC supervisory channels, FBI, and SEC stakeholders.
- Coordination now spans UK GDPR and FCA client-data obligations, FCA supervisory channels, NCSC and NCA, and FCA stakeholders.
Facilitation questions:
- “What controls must be in place before asserting advisory integrity confidence?”
- “How will you document rationale for decisions likely to face later review?”
Round 3: Institutional Recovery and Strategic Resilience (40-45 min)
Opening: Two weeks later, immediate containment is complete and leadership requests a 90-day remediation roadmap with owner-assigned milestones and measurable outcomes.
Pressure events:
- Clients request proof of sustained control improvements and governance maturity
- Compliance leadership requests objective metrics tied to reduced surveillance risk
- Advisory teams request controls that preserve service quality
Victory conditions for full 3-round arc:
- Verified clean baseline for critical advisory and client-service systems
- Defensible reporting package for clients, regulators, and legal counsel
- Durable financial-surveillance controls aligned to operational constraints
Debrief Questions
- “Which early indicator most clearly signaled strategic surveillance rather than routine technical noise?”
- “How did client pressure alter risk tolerance across teams?”
- “What evidence was essential for credibility with clients and regulators?”
- “How can advisory firms improve readiness without undermining client-service quality?”
Debrief Focus
- Financial advisory surveillance incidents combine fiduciary risk with client-confidence pressure
- Defensible response requires synchronized technical, compliance, and governance decisions
- Long-term resilience depends on evidence discipline, segmentation, and transparent accountability
Advanced Challenge Materials (150-170 min)
Red Herrings and Misdirection
- A legitimate advisor remote-support session overlaps with incident timing and distorts triage.
- A separate portfolio-platform outage appears related but is operationally independent.
- Internal rumor of accidental client-data mishandling diverts focus from forensic evidence.
Removed Resources and Constraints
- No dedicated playbook for covert remote-access campaigns in advisory environments
- Evidence collection procedures are inconsistent across support teams
- Immediate external specialist support is delayed by contractual lead time
Enhanced Pressure
- Leadership demands same-day confidence statements on client-service continuity
- Clients request detailed updates before full forensic scope is confirmed
- Executive governance requires written rationale for each high-impact decision
Ethical Dilemmas
- Pause advisory operations for stronger evidence confidence, or continue with higher residual risk.
- Disclose broad uncertainty early, or wait for cleaner scope at trust risk.
- Preserve full forensic integrity, or accelerate restoration with attribution loss.
Advanced Debrief Topics
- Building advisory doctrine for covert surveillance incidents
- Structuring governance when client urgency and technical certainty diverge
- Sustaining long-term security investment in high-pressure fiduciary environments