The Traitor Within the Keep
Insider Threat — Privileged Data Theft
A trusted member of your inner council has turned traitor. Under cover of darkness, they have plundered the realm's most sacred records — the identities and fortunes of your most powerful patrons. As the treachery unravels, the conspiracy may reach higher than anyone expected.
Compliance Frameworks
🛡️ Roles & Party Members
War Chief Required
Incident CommanderLeads the response team, makes containment and escalation decisions
Arcane Engineer Required
IT Operations LeadProvides technical context, reviews access logs, proposes containment
Keeper of the Codex Required
Compliance / DPOAssesses regulatory notification obligations, advises on data breach classification
Loremaster Required
Legal CounselAdvises on employment law, evidence preservation, potential prosecution
Guild Master Optional
HR RepresentativeManages employee handling, disciplinary procedures, interview coordination
High Council Elder Optional
Senior ManagementProvides executive decision authority, manages SM&CR implications
Herald of the Realm Optional
Client RelationsManages client communication if notification is required
⚡ Inject Timeline
Anomalous Activity Detected — The First Whisper
T+0 MinutesThe Data Loss Prevention (DLP) system has generated an alert. A senior portfolio analyst with privileged access to the Client Relationship Management (CRM) system has downloaded an unusually large dat...
Investigation Findings — The Plot Thickens
T+20 MinutesA covert review of the analyst's email (authorised by Legal and the DPO under the bank's Acceptable Use Policy) reveals the following: The analyst sent an encrypted ZIP file to a personal email addre...
Complications — The Conspiracy Deepens
T+35 MinutesDuring a discreet meeting with HR and Legal, the analyst becomes confrontational and claims they were acting on verbal instructions from their line manager (a Managing Director) to prepare a 'client t...
📋 Debrief Questions
Post-Battle Assessment
- Were DLP controls effective in detecting the data exfiltration?
- Was the investigation handled with appropriate legal and HR coordination?
- Were evidence preservation procedures adequate?
- Were regulatory notification obligations understood?
- How should privileged access controls be improved?
- What training or awareness measures should be implemented?