Tabletop on poisoned help desk felt uncomfortably real—in a good way.
Theo · Seoul
Identity Security
Tighten tiering, privileged access workstations, and break-glass stories without turning the forest brittle.
26 hours · Blended · Published 2026-04-02
640,000 KRW · informational listing
Scenario blocks rotate weekly: stolen laptop, poisoned help-desk account, emergency vendor access. You respond with staged changes, evidence capture, and calm comms templates.
Lab environment engineer; builds brittle-on-purpose forests for rehearsal.
Hover or focus to reveal
Any modern laptop with 16GB RAM. Labs stream via browser; optional local VM pack ships as a large download.
Hover or focus to reveal
No. We give you language and evidence shapes; your external reviewers remain independent.
Hover or focus to reveal
We do not configure hardware security modules; partners handle that scope.
Tabletop on poisoned help desk felt uncomfortably real—in a good way.
Theo · Seoul