Step 1 - Set the Stage 10 min · or assign offline
The Byte Club interactive tutorial covers cybersecurity fundamentals for context - the Cyber Kill Chain, how attackers move through a network, the defender's role, and how to play the game. No prior security knowledge needed. You have two ways to run it.
Step 2 - Host the Game 30 min
The game room is created live, during the session. Each room generates a unique code that connects everyone to your specific session. How you set it up depends on group size.
-
1Create the room during the sessionOpen Byte Club while on the call. Create a room and share the unique code via video call chat. Players enter the code to join. Do not pre-share a generic link - the room code is what connects everyone to your specific live session.
-
2Brief the rules in 90 secondsOnce everyone is in the lobby: "One player is the attacker moving through the Kill Chain stages. The others are defenders trying to detect and block each step before the attacker reaches their objective." That is enough. Resist the urge to explain more - the game teaches the rest.
-
3Run the game and observeWatch for decisions made under pressure - who detects early, who waits for certainty, who prioritizes response over prevention. Note which Kill Chain stages the attacker got through undetected. These observations are your bridge into the breach exercise.
-
4Call time and note where the attacker got toAsk someone to capture the final game state. Which Kill Chain stages were completed before defenders responded? This maps directly to the real breach you will analyze next - the question is the same in both cases: where did detection fail?
Step 3 - Analyze a Real Breach 20–30 min
The game puts players inside the attacker-defender dynamic. The breach exercise connects that experience to a real organization that faced the same dynamic and lost. The structure is simple: pick a breach, write one sentence using Kill Chain language, then discuss as a group what NIST controls could have changed the outcome.
Part A - Pick Your Breach
Before the session, find a recent breach that's relevant to your audience's industry or role. A current story lands harder than a famous old one people recognize the names, the risk feels real, and the conversation goes deeper. Swap it out each time you run the workshop to keep it fresh.
Part B - Walk Through the Kill Chain
The breakdown below is pre-filled by you as the facilitator before the session. Share it on screen, print it out, or read each stage aloud then open it up for discussion. The MGM Resorts 2023 breach is used here as the example. If you sourced a different incident, swap in your own one-sentence summary for each stage using the same format.
Part C - Fill in the NIST Controls
Using the MGM breach you just mapped above, work through the six NIST Cybersecurity Framework 2.0 functions as a group. For each one, discuss what was missing, what was present but failed, and what a stronger control would have changed. The Kill Chain breakdown from Part B is your evidence the NIST table is where you ask "what should have stopped that?" Use the prompts to guide the conversation. You don't need to complete every row.
| Function | Discussion Prompt MGM Resorts 2023 |
|---|---|
| Govern Set the rules everyone operates by |
Did MGM have a policy requiring identity verification before a credential reset? Was there clear ownership of who is responsible when a social engineering attack bypasses the helpdesk? Govern is the function that defines the rules if no policy existed, this is where the failure started, before anyone picked up a phone. |
| Identify Know what matters most and how critical it is |
MGM's casino operations reservations, slot machines, payment systems, digital room keys are among its most critical assets. Were those systems classified by criticality? Did that classification connect back to the helpdesk credential reset process that served as the gateway to all of them? Identify is about knowing what you can't afford to lose, and rating the risk of every path that leads there. |
| Protect Limit the blast radius |
What access control, segmentation, or authentication requirement would have stopped the attacker between the credential reset and casino operations going offline? Where was MFA missing on the helpdesk reset process? Where was least-privilege not enforced once credentials were obtained? |
| Detect See the anomaly early |
After credentials were reset, the attacker moved through MGM's systems before deploying ransomware. What monitoring or behavioral anomaly detection would have flagged unusual access patterns a new login location, an account accessing systems outside its normal scope, lateral movement between unrelated systems? |
| Respond Contain and communicate |
Once ransomware was detected, MGM took days to restore operations. What did the incident response plan call for? Who had authority to shut down systems, and how quickly could they act? What was communicated to guests, staff, and regulators and when? |
| Recover Restore and learn |
Recovery took over a week and cost an estimated $100M+. What backups, redundant systems, or continuity plans existed for casino operations? What changed in MGM's security posture after the breach and which of those changes should have been in place before it happened? |
A Note on Facilitation
You do not need to be a security expert to run this workshop. The game builds the experiential foundation and the breach exercise is structured so the discussion guides itself. Your role is to keep the conversation moving and connect what participants say back to the game they just played.
The most powerful moment in this workshop is usually when someone maps a decision they made in the game - waiting to respond, missing a lateral movement, leaving a path open - directly onto the breach they are analyzing. When that connection lands, you do not need to explain anything. The room does it for you.
Ready to Run Your Workshop?
Byte Club is available now. Setup takes under 10 minutes and no technical background is required to facilitate.