Biotech R&D Espionage
The Game is Over.
The Learning Starts Now.
The correct response type: Patient and preservation-first.
Preserve evidence before eradicating – rushing to wipe destroys the forensic artifacts that attribution depends on.

“Let’s reconstruct what just happened – facts first, no analysis yet.”
1 minute silent: What did you see that other teams missed?
Then round-robin – 30–60 seconds each:
“Could this happen to your organisation? What would be different – and what would be the same?”
“The credential was revoked. Was the attack path closed? What second action was needed?”
“CFCS tipped you off. What if they hadn’t called? Would your own monitoring have caught this?”
“CaliSync’s build pipeline is still compromised. Other organisations are still receiving infected updates. When did you notify the vendor? Who owned that decision?”
“HANSEN-SAP-01: 18 months overdue for decommission. No patches. No monitoring. Cloud access through a never-reviewed exception. How many systems like this exist in your organisation right now?”
“Everything we discussed happened in the game. Now make it real.”
After each question: “Who owns fixing this?”
Not “the security team.” Not “IT.” A name. A person. A date.
Write it down. 2 minutes.
Then complete this sentence aloud: “When [situation], I will [specific action].”
Thank you for playing.
malwareandmonsters.com