{"id":19509,"date":"2023-01-23T10:00:00","date_gmt":"2023-01-23T09:00:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=19509"},"modified":"2024-11-06T23:09:02","modified_gmt":"2024-11-06T22:09:02","slug":"cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/","title":{"rendered":"Cracking the recipe: making employees hungry for more cyber awareness activities"},"content":{"rendered":"\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">In a never-ending quest to find innovative ways to raise awareness on cybersecurity topics, the\u00a0Wavestone team might have very well unearthed the new golden nugget.<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Tested and approved by hundreds of our clients&#8217; employees,\u00a0<strong>read on to find out the secret recipe that makes cybersecurity best practices so easy to digest.\u00a0<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24559 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-1-1.png\" alt=\"Cyber escape game as a secret recipe for maximizing awareness-raising efforts\" width=\"1002\" height=\"318\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-1-1.png 1002w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-1-1-437x139.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-1-1-71x23.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-1-1-768x244.png 768w\" sizes=\"auto, (max-width: 1002px) 100vw, 1002px\" \/><\/p>\n<div class=\"reader-image-block reader-image-block--full-width\" style=\"text-align: justify;\">\n<figure class=\"reader-image-block__figure\">\n<div class=\"ivm-image-view-model   \">\n<div class=\"ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex\n    \n    \">\u00a0<\/div>\n<div>\u00a0<\/div>\n<div class=\"ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex\n    \n    \"><span style=\"font-size: revert; color: initial;\">The concept, inspired by a beloved leisure activity, is\u00a0<\/span><strong style=\"font-size: revert; color: initial;\">simple, yet mightily potent.\u00a0<\/strong><\/div>\n<\/div>\n<\/figure>\n<\/div>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Employees are assembled into teams of four or five participants.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">The mission starts with a 10-minute briefing where they receive a lightning-fast training to become agents, and step into the shoes of hackers to perform their mission &#8211; should they accept it.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">They are then given 15 minutes to uncover as many confidential documents as they will find in their fictional target&#8217;s office. The game elaborately weaves in clues of varying difficulty level related to key security topics, including\u00a0<strong>passwords, physical security, and social engineering<\/strong>\u00a0to name a few.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Finally, participants come out of their adventure eyes bright and laughing, enthusiastic to move on to a 15-minute debriefing, where best cybersecurity practices are explained.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">In the end,\u00a0<strong>the activity mobilizes employees for a mere 40 minutes, which pass by in a flash, and leaves them motivated to implement concrete actions to protect their organization<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24561\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-2.png\" alt=\"What sets the cyber game apart?\" width=\"966\" height=\"325\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-2.png 966w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-2-437x147.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-2-71x24.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-2-768x258.png 768w\" sizes=\"auto, (max-width: 966px) 100vw, 966px\" \/><\/p>\n<div class=\"reader-image-block reader-image-block--full-width\" style=\"text-align: justify;\">\n<figure class=\"reader-image-block__figure\">\n<div class=\"ivm-image-view-model   \">\n<h2 class=\"ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex\n    \n    \">\u00a0<\/h2>\n<\/div>\n<\/figure>\n<\/div>\n<h2 class=\"reader-text-block__heading2\" style=\"text-align: justify;\">Gamification never disappoints\u00a0\u00a0<\/h2>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Quite a few years might have passed since you and the members of your organization ran around your school&#8217;s playground, but one thing remains the same:\u00a0<strong>games are still a unanimously popular way to learn.\u00a0<\/strong><\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Through gamification,\u00a0<strong>people become actors, instead of spectators<\/strong>, of the learning process and embody the principles that you aim to instill in them.\u00a0Keeping in mind that\u00a0<strong>practice makes up 70% of the learning process<\/strong>, that is an opportunity that is hard to pass by.<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">When adopting an active posture, participants get immersed in the activity, and they do not even realize that they are\u00a0<strong>acquiring precious skills that will serve them and their organization&#8217;s security well for years to come.\u00a0<\/strong><\/p>\n<h2 class=\"reader-text-block__heading2\" style=\"text-align: justify;\">Spice it up with competition\u00a0<\/h2>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">What do football, chess, and Monopoly have in common? Besides the fact that they are all games, they also include an element of competition.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">In the context of a challenge,\u00a0<strong>competition acts as a strong motivator and a driver to perform<\/strong>. Add a fun and safe environment to the mix, and you have yourself a perfect combination to tremendously boost engagement.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Our cyber escape game includes a\u00a0<strong>smart scoring system<\/strong>, so teams feel driven to reach the highest score, and you can gather information on overall performance. That&#8217;s what we call a win-win.\u00a0<\/p>\n<figure id=\"attachment_19496\" aria-describedby=\"caption-attachment-19496\" style=\"width: 872px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19496\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-1.png\" alt=\"Example of scoring sheet for the cybersecurity escape game\" width=\"872\" height=\"637\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-1.png 872w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-1-261x191.png 261w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-1-53x39.png 53w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-1-768x561.png 768w\" sizes=\"auto, (max-width: 872px) 100vw, 872px\" \/><figcaption id=\"caption-attachment-19496\" class=\"wp-caption-text\"><em>Example of scoring sheet<\/em><\/figcaption><\/figure>\n<div class=\"reader-image-block reader-image-block--resize\" style=\"text-align: center;\">\n<figure class=\"reader-image-block__figure\">\n<div class=\"ivm-image-view-model   \">\n<div class=\"ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex\n    \n    \">\u00a0<\/div>\n<\/div>\n<figcaption class=\"display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light\"><\/figcaption>\n<\/figure>\n<\/div>\n<h2 class=\"reader-text-block__heading2\" style=\"text-align: justify;\">The more the merrier\u00a0<\/h2>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">When faced with a puzzle to solve, who would be against a little bit of help?\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Indeed, completing an exercise on one&#8217;s own can be daunting, if not just plain lonely.\u00a0\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">As part of a cyber escape game, people are encouraged to collaborate to solve clues.\u00a0<strong>Teamwork then makes the challenge even more fun<\/strong>\u00a0as creative ideas to break codes burst and are implemented, rendering their success all the more rewarding.\u00a0<\/p>\n<figure id=\"attachment_19498\" aria-describedby=\"caption-attachment-19498\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19498\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-2.jpg\" alt=\"Briefing session in Krakow\" width=\"1024\" height=\"768\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-2.jpg 1024w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-2-255x191.jpg 255w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-2-52x39.jpg 52w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-2-768x576.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-2-600x450.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-19498\" class=\"wp-caption-text\"><em>Briefing before the escape game<\/em><\/figcaption><\/figure>\n<div class=\"reader-image-block reader-image-block--resize\" style=\"text-align: center;\">\n<figure class=\"reader-image-block__figure\">\n<div class=\"ivm-image-view-model   \">\n<div class=\"ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex\n    \n    \">\u00a0<\/div>\n<\/div>\n<figcaption class=\"display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light\"><\/figcaption>\n<\/figure>\n<\/div>\n<h2 class=\"reader-text-block__heading2\" style=\"text-align: justify;\">Bring the human touch to learning experiences\u00a0<\/h2>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">To complement online training initiatives, providing staff with a way to\u00a0<strong>engage in-person with cybersecurity experts<\/strong>\u00a0allows to go the extra mile in accompanying them on their learning journey.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Indeed, this format promotes\u00a0live discussions\u00a0and gives people the opportunity to\u00a0receive personalized answers to their specific questions related to security.<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">The result? Employees coming out of the activity with\u00a0<strong>advice that precisely\u00a0solves their pain points<\/strong>.\u00a0<\/p>\n<figure id=\"attachment_19500\" aria-describedby=\"caption-attachment-19500\" style=\"width: 1395px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19500\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-3.png\" alt=\"Positive feedback from the cybersecurity escape game\" width=\"1395\" height=\"919\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-3.png 1395w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-3-290x191.png 290w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-3-59x39.png 59w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Photo-3-768x506.png 768w\" sizes=\"auto, (max-width: 1395px) 100vw, 1395px\" \/><figcaption id=\"caption-attachment-19500\" class=\"wp-caption-text\"><em>Feedback from participants of our latest session<\/em><\/figcaption><\/figure>\n<div class=\"reader-image-block reader-image-block--resize\" style=\"text-align: center;\">\n<figure class=\"reader-image-block__figure\">\n<div class=\"ivm-image-view-model   \">\n<div class=\"ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex\n    \n    \">\u00a0<\/div>\n<\/div>\n<figcaption class=\"display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light\"><em><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24563\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-3.png\" alt=\"Make it happen\" width=\"1004\" height=\"320\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-3.png 1004w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-3-437x139.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-3-71x23.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/image-3-768x245.png 768w\" sizes=\"auto, (max-width: 1004px) 100vw, 1004px\" \/><\/em><\/figcaption>\n<\/figure>\n<\/div>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Not only is the format of the cyber escape game particularly appreciated by employees, it also presents multiple advantages for your organization in terms of implementation.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Take it from the Wavestone team !<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Over the course of the month of October 2022,\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/wavestone\/\" data-entity-hovercard-id=\"urn:li:fs_miniCompany:10133\" data-entity-type=\"MINI_COMPANY\">Wavestone<\/a>\u00a0Belgium carried out +100 cyber escape games sessions with +400 players\u00a0across 6 countries.\u00a0\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">As\u00a0training sessions last 40 minutes each,<strong>\u00a0up to 45 collaborators can be trained in one day<\/strong>,\u00a0maximizing time-efficiency.\u00a0<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Further,\u00a0<strong>customization\u00a0<\/strong>is at the core of our approach, with a debriefing that exposes concrete ways to\u00a0<strong>apply the best security practices that are most crucial to your organization<\/strong>.<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Although we could keep on enumerating the benefits that a cyber escape game can bring to an entity&#8217;s security, a game is still worth a thousand words.<\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">Curious to understand how the cyber escape game leaves employees asking for another serving of awareness activities?\u00a0<strong>Get in touch with our expert\u00a0<\/strong><a href=\"https:\/\/www.linkedin.com\/in\/thomasvodinh?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAABXDa2gB3uuIfNKDhMbmEedA2haY2hHz1UA\" data-entity-hovercard-id=\"urn:li:fs_miniProfile:ACoAABXDa2gB3uuIfNKDhMbmEedA2haY2hHz1UA\" data-entity-type=\"MINI_PROFILE\">Thomas Vo Dinh<\/a><strong>\u00a0to organize a free session.<\/strong><\/p>\n<p class=\"reader-text-block__paragraph\" style=\"text-align: justify;\">See you on the other side, agent &#x1f609;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0 In a never-ending quest to find innovative ways to raise awareness on cybersecurity topics, the\u00a0Wavestone team&#8230;<\/p>\n","protected":false},"author":1378,"featured_media":19494,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,3977],"tags":[3407,4221],"coauthors":[3569,4219],"class_list":["post-19509","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-focus","tag-awareness","tag-escapegame-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cracking the recipe: making employees hungry for more cyber awareness activities - RiskInsight<\/title>\n<meta name=\"description\" content=\"Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cracking the recipe: making employees hungry for more cyber awareness activities - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-23T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T22:09:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Vo-Dinh, Caroline Boyer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Vo-Dinh, Caroline Boyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\"},\"author\":{\"name\":\"Thomas Vo-Dinh\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d3b12548308857aaa1f6c184cdbd87ff\"},\"headline\":\"Cracking the recipe: making employees hungry for more cyber awareness activities\",\"datePublished\":\"2023-01-23T09:00:00+00:00\",\"dateModified\":\"2024-11-06T22:09:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\"},\"wordCount\":814,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg\",\"keywords\":[\"awareness\",\"EscapeGame\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\",\"name\":\"Cracking the recipe: making employees hungry for more cyber awareness activities - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg\",\"datePublished\":\"2023-01-23T09:00:00+00:00\",\"dateModified\":\"2024-11-06T22:09:02+00:00\",\"description\":\"Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg\",\"width\":1999,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cracking the recipe: making employees hungry for more cyber awareness activities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d3b12548308857aaa1f6c184cdbd87ff\",\"name\":\"Thomas Vo-Dinh\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/thomas-vo-dinh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cracking the recipe: making employees hungry for more cyber awareness activities - RiskInsight","description":"Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/","og_locale":"en_US","og_type":"article","og_title":"Cracking the recipe: making employees hungry for more cyber awareness activities - RiskInsight","og_description":"Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/","og_site_name":"RiskInsight","article_published_time":"2023-01-23T09:00:00+00:00","article_modified_time":"2024-11-06T22:09:02+00:00","og_image":[{"width":1999,"height":600,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg","type":"image\/jpeg"}],"author":"Thomas Vo-Dinh, Caroline Boyer","twitter_misc":{"Written by":"Thomas Vo-Dinh, Caroline Boyer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/"},"author":{"name":"Thomas Vo-Dinh","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d3b12548308857aaa1f6c184cdbd87ff"},"headline":"Cracking the recipe: making employees hungry for more cyber awareness activities","datePublished":"2023-01-23T09:00:00+00:00","dateModified":"2024-11-06T22:09:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/"},"wordCount":814,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg","keywords":["awareness","EscapeGame"],"articleSection":["Cyberrisk Management &amp; Strategy","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/","name":"Cracking the recipe: making employees hungry for more cyber awareness activities - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg","datePublished":"2023-01-23T09:00:00+00:00","dateModified":"2024-11-06T22:09:02+00:00","description":"Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?\u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/01\/Article-Escape-Game-Banniere.jpg","width":1999,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cracking the recipe: making employees hungry for more cyber awareness activities"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d3b12548308857aaa1f6c184cdbd87ff","name":"Thomas Vo-Dinh","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/thomas-vo-dinh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/19509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1378"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=19509"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/19509\/revisions"}],"predecessor-version":[{"id":24565,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/19509\/revisions\/24565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/19494"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=19509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=19509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=19509"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=19509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}