1. Quick Reference

Essential at-a-glance information for session setup

Element Details
Malmon GaboonGrabber (Trojan/Stealth) ⭐⭐
Difficulty Tier Tier 1 (Beginner) - Perfect for new teams
Scenario Variant Healthcare - Medical Technology Implementation
Organizational Context MedTech Solutions: Healthcare technology, 200 employees, implementing EMR for Riverside General Hospital
Primary Stakes Patient safety data + HIPAA compliance + Life-critical medical device networks + $2M client relationship
Recommended Formats Lunch & Learn, Full Game (90-140 min)
Essential NPCs Sarah Chen (IT Director), Mike Rodriguez (Head Nurse), David Kim (Riverside General CIO)
Optional NPCs Jennifer Park (COO), Security team members, Hospital administrators

Scenario Hook

“It’s Friday afternoon at MedTech Solutions, and your biggest implementation ever goes live Monday morning at Riverside General Hospital. Instead of celebration, there’s growing concern—multiple staff report computer slowdowns after clicking ‘critical security updates’ during the final implementation push.”

Victory Condition

Successfully identify and contain GaboonGrabber infection while maintaining Monday go-live schedule and client relationship, demonstrating that security vigilance during high-pressure projects protects both technical systems and business partnerships.


2. Organization Context

MedTech Solutions: Healthcare Implementation Crisis During Hospital Go-Live

Quick Reference

  • Organization: Healthcare technology consulting and implementation firm, 200 employees across 4 offices, 25-person implementation team working on Riverside General Hospital EMR deployment
  • Key Assets at Risk: Proprietary EMR platform and implementation methodologies, Client healthcare data and hospital network VPN access, $2M annual recurring revenue contract, Regional healthcare market reference case
  • Business Pressure: Monday 8am hospital go-live deadline (72 hours away)—CEO personally invested in hospital leadership relationship, strategic importance for regional healthcare market expansion
  • Core Dilemma: Meet go-live deadline maintaining client satisfaction and contract revenue BUT deploy potentially compromised systems into hospital environment, OR Delay deployment for security verification protecting patient safety BUT lose CEO relationship and damage regional market reputation
Detailed Context
Organization Profile

Type: Healthcare technology consulting and implementation Size: 200 employees across 4 offices Implementation Team: 25 staff working on Riverside General

Key Assets: - Proprietary EMR platform - Implementation methodologies - Client healthcare data - Hospital network access (VPN)

Business Pressure

Contract Value: $2M annual recurring revenue Strategic Importance: Reference case for regional healthcare market expansion Executive Involvement: CEO personally invested in hospital leadership relationship Regulatory Environment: HIPAA, SOC 2, healthcare vendor security requirements Timeline: Monday 8am go-live (72 hours away)

Cultural Factors
  • High-pressure project culture: Deadlines frequently override normal processes
  • Client-first mentality: Customer satisfaction prioritized over internal procedures
  • Recent management push: “User experience” over security for client satisfaction scores
  • IT culture: Staff click through security warnings during crunch periods

3. Game Configuration Templates

Quick Demo Configuration (35-40 min)

Pre-Configured Settings:

Experience Focus: Fast-paced demonstration showing how project pressure creates security vulnerabilities. Focus on immediate recognition and basic containment.

Time Breakdown:

Facilitation Notes: Present the “Hook” and “Initial Symptoms” to establish urgency. Guide players through the “Detective Investigation Leads” at 5-minute intervals. Offer Pre-Defined Response Options focusing on network isolation vs. complete re-imaging. Debrief centers on why security controls matter even during critical project deadlines.


Lunch & Learn Configuration (75-90 min)

Pre-Configured Settings:

Experience Focus: Balanced experience exploring social engineering + technical analysis + stakeholder pressure. Allows for Malmon evolution showing multi-payload deployment capability.

Time Breakdown:

Facilitation Notes: Use full NPC cast to create complex decision-making. Round 1 focuses on discovery and identification. Round 2 introduces Malmon evolution (secondary payload deployment) raising stakes. Debrief explores balance between security and business operations.


Full Game Configuration (120-140 min)

Pre-Configured Settings:

Experience Focus: Complete immersive M&M experience with player-driven investigation, creative problem-solving, and full narrative arc showing villain’s complete plan.

Time Breakdown:

Facilitation Notes: Players explore independently using “Key Discovery Paths” as guidance. Facilitate dynamically based on player choices. All three rounds allow full narrative arc including complete villain plan execution. Connect to real-world principles: social engineering awareness, behavioral analysis importance, incident response coordination.


Advanced Challenge Configuration (180+ min)

Pre-Configured Settings:

Experience Focus: Sophisticated challenge for expert teams. Add red herrings (unrelated EMR bugs), make containment ambiguous, require innovation under pressure. Remove reference materials to test knowledge recall.

Time Breakdown:

Facilitation Notes: Minimal guidance, maximum complexity. Introduce complications: EMR system has legitimate bugs creating confusion, hospital calls hourly with increasing pressure, management demands solutions that compromise security. Challenge assumptions. Facilitate innovation. Require justification of choices with limited information.


4. Scenario Overview

Opening Presentation

“It’s Friday afternoon at MedTech Solutions, and the mood should be celebratory—your biggest implementation ever goes live Monday morning at Riverside General Hospital. This $2M annual contract represents years of business development and will showcase your electronic medical records platform to the entire regional healthcare market.

But instead of champagne, there’s growing concern. Multiple staff members are reporting computer slowdowns, and the help desk has received several calls about unexpected pop-ups. Yesterday evening, during the final push to meet Monday’s deadline, several IT staff received what appeared to be critical security updates from trusted software vendors. With everything riding on Monday’s go-live, you need to investigate what’s happening—without derailing the most important implementation in company history.”

Initial Symptoms to Present

Organizational Context Details

Organization Profile:

Cultural Factors:

Business Pressure:

Malmon Characteristics in This Scenario

GaboonGrabber exploits the perfect storm of deadline pressure, security fatigue, and cultural prioritization of client success over internal controls. The Trojan’s “Perfect Mimicry” ability is particularly effective against stressed IT staff who are conditioned to click through warnings during implementation crunch periods.

Key Capabilities Demonstrated:

Vulnerabilities to Exploit:


5. NPC Reference

Essential NPCs (Must Include)

NPC 1: Sarah Chen - IT Director

  • Position: IT Director, responsible for MedTech’s infrastructure and implementation project technical success
  • Personality: Extremely competent but currently stressed, detail-oriented under normal circumstances but cutting corners under deadline pressure, defensive about security decisions made during crunch time
  • Agenda: Wants to solve security incident without delaying Monday go-live or jeopardizing client relationship, needs to protect team from blame while acknowledging mistakes were made
  • Knowledge: Knows IT department bypassed normal software approval process for “critical updates,” understands technical infrastructure, aware of recent security warnings that were ignored, has access to all systems
  • Pressure Point: Her career advancement depends on successful go-live, personally approved expedited software installation process, fears being held responsible for security incident
  • IM Portrayal Notes: Speak quickly when anxious, ask probing technical questions to understand scope, initially defensive about decisions but becomes collaborative when treated as partner rather than blamed. Will admit mistakes if team creates safe space.

NPC 2: Mike Rodriguez - Head Nurse, Riverside General

  • Position: Head Nurse at Riverside General Hospital, represents clinical staff perspective and operational readiness
  • Personality: Patient-focused, practical, frustrated with technical delays, doesn’t understand IT security concerns, direct communicator
  • Agenda: Needs Monday go-live to proceed on schedule for patient care continuity, concerned about staff training timing, wants assurance systems will work reliably
  • Knowledge: Clinical workflow requirements, nursing staff concerns about new EMR system, patient care implications of delays, hospital leadership expectations
  • Pressure Point: Staff training is complete and nurses are prepared for Monday transition, any delay requires rescheduling training and affects patient care continuity
  • IM Portrayal Notes: Focus relentlessly on patient impact, ask “how does this affect patient care?” frequently, express frustration with technical jargon, respond positively to explanations that prioritize patient safety

NPC 3: David Kim - Riverside General CIO

  • Position: Chief Information Officer at Riverside General Hospital, client decision-maker with contract authority
  • Personality: Business-focused, impatient, expects professionalism, threatens contract penalties, represents $2M relationship at risk
  • Agenda: Demands go-live proceeds on schedule or wants to know about contract penalty compensation, concerned about hospital reputation and operational continuity
  • Knowledge: Contract terms including penalty clauses, hospital board expectations, competitive vendor landscape, previous implementation project history
  • Pressure Point: Hospital board expects Monday go-live announcement, has alternative vendors ready if MedTech fails, represents make-or-break contract decision
  • IM Portrayal Notes: Call hourly for updates using formal business language, reference contract terms and penalty clauses, soften if team demonstrates competence and transparency, emphasize reputation and board pressure

Optional NPCs (Add Depth)

NPC 4: Jennifer Park - Chief Operating Officer, MedTech

  • Position: COO responsible for operational excellence and client satisfaction
  • Personality: Results-oriented, impatient with excuses, focused on metrics and outcomes
  • Agenda: Protect company reputation, ensure client retention, minimize revenue impact
  • Knowledge: Company financial dependence on this contract, competitive landscape, operational capabilities
  • Pressure Point: Quarterly earnings call next week, needs positive announcement
  • IM Portrayal Notes: Demand action plans with timelines, focus on business impact metrics, initially resistant to anything delaying go-live

NPC 5: Alex Martinez - Security Team Member

  • Position: Information Security Analyst who raised concerns about security shortcuts
  • Personality: Technically competent, “told you so” attitude, wants vindication
  • Agenda: Prove security warnings should have been heeded, implement stronger controls
  • Knowledge: Previous security warnings issued, normal approval process that was bypassed
  • Pressure Point: Feels security concerns are regularly dismissed during crunch time
  • IM Portrayal Notes: Provide technical insights but initially unhelpful emotionally, becomes collaborative if expertise is valued

NPC 6: Hospital Board Member (Background Pressure)

  • Position: Riverside General Board Member expecting Monday announcement
  • Personality: Influential, impatient, expects professionalism
  • Knowledge: High-level strategic importance of EMR implementation
  • Pressure Point: Public announcement scheduled for Monday board meeting
  • IM Portrayal Notes: Mentioned by David Kim as source of pressure, never directly appears but creates urgency

NPC Interaction Guidelines

When to introduce NPCs:

How NPCs advance the plot:


6. Investigation Timeline

Round 1: Discovery Phase

Automatic Reveals (present to all teams):

Detective Investigation Leads:

Protector System Analysis:

Tracker Network Investigation:

Communicator Stakeholder Interviews:

Crisis Manager Coordination Discoveries:

Threat Hunter Proactive Findings:

Round 2: Investigation Phase

Situation Update:

“It’s now Friday evening, several hours into your investigation. David Kim just called for the third time demanding a go-live confirmation. Sarah Chen admits that three of the infected workstations had active VPN connections to Riverside General’s test environment when the malware was installed. Your behavioral analysis confirms this is GaboonGrabber, and based on the infection timeline, you’re approaching the 24-hour threshold where the hidden Multi-Payload Deployment ability typically activates. The question is no longer just ‘what happened’ but ‘how bad can this get?’”

Automatic Reveals:

Detective Investigation Leads:

Protector System Analysis:

Tracker Network Investigation:

Communicator Stakeholder Interviews:

Crisis Manager Coordination Discoveries:

Threat Hunter Proactive Findings:

Round 3: Response Phase

Situation Update:

“It’s late Friday night. You’ve identified GaboonGrabber and understand the threat, but now you face critical decisions. David Kim just sent an email with the hospital’s legal team CC’d, referencing contract penalty clauses for delayed go-live. Sarah Chen has offered complete cooperation but warns that taking systems offline will make Monday’s deadline impossible. Jennifer Park wants a business decision within the hour. And your threat intelligence confirms you’re 2 hours away from the 24-hour threshold where GaboonGrabber will deploy secondary payloads—potentially including ransomware. What’s your response strategy?”

Automatic Reveals:

Evidence emerging during response attempts:

Success and Failure Branches:

If team chooses thorough cleanup (delay go-live): - David Kim initially threatens contract cancellation - Transparent communication about threat severity and patient data protection convinces hospital leadership - Monday go-live delayed but security incident demonstrates MedTech’s commitment to healthcare data protection - Relationship actually strengthens due to honest handling of security incident

If team chooses partial response (maintain go-live): - Enhanced monitoring and network segmentation contain immediate threat - Go-live proceeds with increased security vigilance and transparent risk communication - Hospital appreciates business continuity balanced with security consciousness - Post-go-live cleanup scheduled as phase 2 with hospital security team collaboration

If team chooses inadequate response: - Secondary payload deploys causing wider compromise - Hospital systems potentially affected leading to patient data exposure - Contract relationship severely damaged by security incident affecting client - Learning moment: Security shortcuts during high-pressure projects create serious consequences


7. Response Options

Type-Effective Approaches

Most Effective (Trojan Strengths - Behavioral Analysis):

Moderately Effective:

Least Effective (Trojan Resistances):

Creative Response Guidance

Encourage player innovation in these areas:

Common creative solutions players develop:


8. Round-by-Round Facilitation Guide

Round 1: Discovery

Opening Narration:

“It’s Friday afternoon at MedTech Solutions. The implementation team has been working nonstop for weeks, and the Riverside General Hospital EMR go-live is just 72 hours away. The energy should be celebratory—this $2M contract represents the biggest success in company history. But instead, there’s tension in the air.

Sarah Chen, the IT Director, has just called an emergency meeting. Multiple team members are reporting computer issues: slowdowns, unexpected pop-ups, applications taking longer to start. Yesterday evening, during the final implementation push, several IT staff received what appeared to be critical security updates from trusted software vendors. Everyone was working late, clicking through warnings to maintain momentum toward Monday’s deadline.

Now Sarah needs answers. And as she explains the situation, her phone rings—it’s David Kim, the CIO of Riverside General Hospital, calling for his daily status update. She lets it go to voicemail. You can see the stress in her face as she says, ‘We need to figure out what’s going on without derailing Monday’s go-live. This contract is everything.’

What do you do?”

IM Questions to Ask:

Expected Player Actions:

Malmon Identification Moment:

Guide the team through evidence synthesis: “You’ve found process injection, memory-resident operation, sophisticated social engineering, and C2 infrastructure. The behavioral patterns—especially hiding within legitimate processes and using convincing fake software updates—point to a specific type of threat. What kind of Malmon combines stealth, social engineering mastery, and fileless techniques?”

When team identifies Trojan characteristics, introduce GaboonGrabber specifically: “Your threat intelligence matches this to GaboonGrabber, a Trojan-type Malmon known for Perfect Mimicry and Fileless Deployment. But there’s something in your research that’s concerning—GaboonGrabber has a hidden ability called Multi-Payload Deployment that activates after 24 hours. You’re approaching that threshold.”

Round Conclusion:

“As Round 1 ends, you’ve identified GaboonGrabber and understand the basic attack. But Sarah’s phone is ringing again—it’s David Kim calling for the third time today. In the background, you hear Jennifer Park, the COO, talking loudly about quarterly earnings and client retention. And your timeline analysis shows you’re 2 hours away from the 24-hour mark where GaboonGrabber typically deploys secondary payloads.

You understand what happened. Now you need to understand how bad this could get—and fast.”

Round 2: Investigation

Situation Update:

“It’s Friday evening, several hours into your investigation. The office is mostly empty except for your incident response team, Sarah Chen nervously checking her phone, and the sound of Jennifer Park on a conference call in the next room discussing ‘the IT situation.’

Your deeper investigation has revealed troubling details: Three of the infected workstations had active VPN connections to Riverside General’s test environment when the malware was installed. Your behavioral analysis confirms this is GaboonGrabber, and you’re now 90 minutes away from the 24-hour threshold.

Sarah just got off the phone with David Kim. His exact words: ‘I have the hospital board expecting a Monday go-live announcement. I have alternative vendors ready if MedTech can’t deliver. I need a yes or no by morning: Is Monday’s go-live happening or not?’

The question now is: How bad is this, and what are we going to do about it?”

IM Questions to Ask:

Pressure Points to Introduce:

Round Conclusion:

“Your investigation has painted a clear picture—and it’s worse than you initially thought. GaboonGrabber has hospital network exposure, is preparing to deploy secondary payloads (your analysis shows signs of Snake Keylogger, AgentTesla, and possibly Redline staging), and you’ve discovered the infection is more widespread than initial reports suggested.

But you’ve also discovered something important: This happened because of organizational culture and deadline pressure, not just technical vulnerabilities. The IT team bypassed security controls, management prioritized speed over safety, and everyone was conditioned to click through warnings during implementation crunch time.

David Kim’s email just arrived. The hospital’s legal team is CC’d. The subject line: ‘Re: Contract Penalty Clauses for Delayed Implementation.’

It’s time to make decisions. What’s your response strategy?”

Round 3: Response

Critical Decision Point:

“It’s late Friday night. You’ve got all the information you’re going to get before decisions must be made. The technical picture is clear: GaboonGrabber is confirmed, secondary payload deployment is imminent, hospital network exposure is real, and thorough cleanup will take 36-48 hours minimum—well past Monday’s deadline.

The business picture is equally clear: $2M contract with penalty clauses, client relationship at breaking point, company reputation in healthcare market at stake, quarterly earnings announcement depending on this success.

Sarah Chen looks exhausted but determined: ‘Tell me what you need. I’ll support whatever decision protects our client and makes this right, even if it costs me my job.’

David Kim’s assistant just called to schedule a 7am Saturday morning call with hospital executives.

Jennifer Park sent a one-line email: ‘Decision needed within 1 hour: Are we go for Monday launch?’

What do you do?”

IM Questions to Ask:

Success and Failure Branches:

If team chooses comprehensive cleanup (delay go-live):

“You make the difficult call: Thorough cleanup is necessary, Monday go-live must be delayed. Sarah supports your decision and personally calls David Kim to explain.

The conversation is tense. David’s initial reaction: ‘This is exactly what I was afraid of. I have vendors who could have this system live by Monday. Why should I wait for MedTech?’

But then Sarah does something important. She doesn’t make excuses. She explains exactly what happened, what the team discovered, why patient data protection requires thorough response, and how quickly MedTech identified and is containing a sophisticated threat that many organizations wouldn’t even detect.

David is silent for a long moment. Then: ‘Let me call you back.’

Thirty minutes later, he does. ‘I talked to our CISO. He said most vendors would have tried to hide this or rush through cleanup. He convinced the board that your transparency and security competence is exactly what we want in a healthcare technology partner. We’re delaying go-live to Wednesday. Get this done right.’”

If team chooses balanced approach (enhanced monitoring + phased remediation):

“You propose a hybrid strategy: Immediate containment of infected systems, enhanced behavioral monitoring to prevent secondary payload deployment, network microsegmentation to isolate hospital connectivity through monitored channels, and Monday go-live proceeds with increased security vigilance and post-implementation complete cleanup scheduled.

Sarah presents this to David Kim with transparent risk communication: ‘Here’s what we know, here’s the immediate threat we’re containing, here’s the long-term cleanup plan, here’s how we’re protecting patient data throughout.’

David asks hard questions. Mike Rodriguez asks about patient safety. Your team answers honestly, demonstrating both technical competence and business understanding.

The decision: Go-live proceeds Monday with security team on-site throughout, enhanced monitoring active, and contractual agreement for phase 2 cleanup the following week. The incident actually strengthens the relationship—Riverside General’s security team becomes partners in the response.”

If team chooses inadequate response (minimize incident, proceed normally):

“You decide to downplay the incident and proceed with Monday go-live without significant remediation. ‘We’ve removed the malware, everything’s fine,’ Sarah tells David Kim.

Monday morning, during go-live, your enhanced monitoring (which you did implement, at least) detects a catastrophic event: GaboonGrabber’s secondary payload deploys ransomware across the hospital’s test environment, which isn’t as isolated from production as anyone thought.

Patient care isn’t directly affected, but the incident makes regional news. HIPAA breach notifications are required. David Kim’s email is brief: ‘Contract terminated effective immediately. Legal team will be in touch regarding penalties and damages.’

The lesson is painful but clear: Security shortcuts during high-pressure projects don’t just create technical debt—they destroy business relationships and reputations.”

Resolution Narration (Adapt based on team approach):

“[Based on their response strategy, narrate the outcome, emphasizing how their decisions played out and what they learned about balancing security, business needs, and stakeholder management.]

As the incident winds down and you prepare for Monday—whether that’s go-live day or cleanup continuation—Sarah Chen pulls the team aside. ‘I learned something important,’ she says. ‘We created a culture where deadline pressure made clicking through security warnings normal. That culture made us vulnerable. This incident happened because of how we work, not just because of technical factors. We’re changing that.’

And David Kim sends one final email: ‘[Adapt message based on outcome - either praising transparency and competence, or expressing disappointment in the handling.]’

The Riverside General implementation will proceed—your decisions determined whether it happens as a partnership strengthened by security cooperation, or as a lesson learned through painful consequences.”

Round 4+ (Advanced Challenge Only)

For Advanced Challenge Format:

Add complications after initial response:

Facilitate Round 4 as adaptation to complications while executing chosen response strategy. Require innovative solutions under pressure with incomplete information.


9. Pacing & Timing Notes

Time Management Strategies

If Running Long:

If Running Short:

If Team is Stuck:

Engagement Indicators

Positive Signs:

Warning Signs:

Interventions for Warning Signs:


10. Debrief Discussion Points

Critical Learning Objectives

Technical Concepts:

Collaboration Skills:

Reflection Questions

Scenario-Specific:

Real-World Connections:

MalDex Documentation Prompts

Encourage teams to document:

Sample MalDex Entry Format:

Malmon: GaboonGrabber

Context: Healthcare technology implementation during critical client go-live deadline

Key Discovery: Behavioral analysis of process injection patterns enabled identification despite fileless deployment evading traditional AV

Effective Response: Hybrid approach using network microsegmentation + enhanced monitoring allowed Monday go-live while containing threat and scheduling thorough cleanup

Team Innovation: Transparent risk communication with hospital CIO turned potential contract failure into partnership—security competence demonstration actually strengthened client relationship

Lesson Learned: Organizational culture that prioritizes deadline pressure over security controls creates exploitable vulnerabilities. Technical solutions must address cultural root causes, not just immediate threats.


11. Facilitator Quick Reference

Type Effectiveness Chart

GaboonGrabber (Trojan/Stealth) Type Strengths:

Quick Reference for Adjudication:

Common Facilitation Challenges

Challenge 1: Team focuses excessively on technical details, ignoring business context

IM Response: “That’s excellent malware analysis. While you’re conducting this forensic investigation, David Kim just called again—he has the hospital board on speakerphone asking if Monday’s go-live is happening. How do you explain your findings to them in a way that helps them make an informed business decision?”

Challenge 2: Team wants to ignore deadline pressure and “just do security right”

IM Response: “I understand the frustration with business pressure overriding security concerns. That’s also a realistic dilemma in many organizations. In this scenario, the $2M contract and 200-person hospital nursing staff are real stakes. How do cybersecurity professionals navigate situations where ‘ideal security’ conflicts with legitimate business needs?”

Challenge 3: One role (usually Detective or Threat Hunter) dominates investigation

IM Response: “Detective, your forensic analysis has been excellent and you’ve identified critical evidence. Communicator, how would you present these technical findings to Sarah Chen and the hospital stakeholders? What questions would Mike Rodriguez ask from a patient care perspective? Protector, what containment concerns do these findings raise?”

Challenge 4: Team gets stuck debating perfect response strategy

IM Response: “You’re right that there’s no perfect solution here—there are trade-offs with every approach. Real incident response often means choosing the best available option under time pressure with incomplete information. Based on what you know now, what’s your decision? You can always adapt if new information emerges.”

Challenge 5: Players minimize social engineering, focus only on technical vulnerability

IM Response: “The technical vulnerability is real, but think about what made this attack succeed. Experienced IT professionals clicked on these emails. What organizational factors—the deadline pressure, the culture of bypassing security for speed, the management messaging about client satisfaction over controls—made them vulnerable? How do you address that?”

Challenge 6: Team proposes response that ignores Malmon type characteristics

IM Response: “Interesting approach. Remember that GaboonGrabber is a Trojan-type Malmon particularly effective at social engineering and evasion. How does your signature-based detection strategy account for its Fileless Deployment ability? What type-effective approaches might work better against Trojan characteristics?”

Dice/Success Mechanics Guidelines

For this scenario, use these DC ranges:

Investigation Actions:

Containment Actions:

Stakeholder Communication:

Modifiers:

Automatic Success Conditions:

Automatic Failure Conditions:


12. Scenario Customization Notes

Difficulty Adjustments

Make Easier (For Novice Teams):

Make Harder (For Expert Teams):

Industry Adaptations

For Healthcare Context (Primary):

For Financial Context:

For Education Context:

For Government Context:

Experience Level Adaptations

For Novice Teams:

For Mixed Experience Groups:

For Expert Teams:


13. Cross-References

Additional Resources

Real-World Incident References:

MITRE ATT&CK Techniques Demonstrated:

Professional Development Connection:

Community Contributions


Notes for IM Customization

Space for IMs to add their own notes, modifications, or insights from running this scenario

What worked well:

[Your facilitation successes and effective moments]

What to modify next time:

[Adjustments needed based on experience]

Creative player solutions to remember:

[Innovations to share with community]

Timing adjustments needed:

[Pacing observations and refinements]

Industry-specific customizations tried:

[Adaptations for different organizational contexts]

Stakeholder communication insights:

[Effective NPC portrayal techniques and dialogue]


End of Planning Document

This comprehensive planning document provides complete guidance for facilitating the GaboonGrabber Healthcare Implementation Crisis scenario. Adapt sections based on your session format, team experience level, and available time. The goal is confident facilitation that creates engaging collaborative learning experiences.