An attacker steals some of the organisation’s data and makes a ransom demand. The data is subsequently maliciously altered and released into the public sphere.
You will find three documents for download below: Facilitator notes, Handouts and Slides. After minimal rebranding and any customisation, this is all you will need to run the exercise.
Facilitator notes
Handouts
Slides