The Scattered Legion
Targeting Staff Working From Home
Your realm's defenders have been dispersed across distant lands, working from keeps and homesteads far from the central fortress. The enemy has seized upon this scattered formation, targeting the weakest outposts to find a way past the castle walls. When the guardians are far from home, every hearth becomes a potential breach point.
Compliance Frameworks
🛡️ Roles & Party Members
War Chief Required
Incident CommanderLeads the response team, coordinates containment across distributed workforce
Arcane Engineer Required
IT Operations LeadManages remote access infrastructure, endpoint security, and network containment
Shadow Watcher Required
SOC AnalystAnalyses threat indicators, monitors remote endpoints, investigates compromise scope
Keeper of the Codex Required
Compliance / DPOAssesses data protection implications of home working compromise, regulatory obligations
Guild Master Optional
HR RepresentativeManages staff welfare, addresses conduct matters, coordinates with affected employees
Town Crier Optional
Communications LeadDrafts staff advisories, manages external communication if breach is confirmed
High Council Elder Optional
Senior ManagementProvides executive decision authority, approves policy changes to remote working arrangements
⚡ Inject Timeline
The Outpost Breached — A Remote Worker Compromised
T+0 MinutesIt is 14:00 UTC on a Friday afternoon. The bank operates a hybrid working model, with approximately 60% of staff working from home on any given day. The SOC receives an alert from the EDR platform: a ...
The Widening Storm — Multiple Outposts Under Attack
T+20 MinutesThe investigation has revealed that the attack on the operations manager was not an isolated incident. The SOC has identified a coordinated campaign targeting the bank's remote workers. Over the past...
The New Order — Rebuilding Defences
T+35 MinutesThe immediate incident is contained. All compromised accounts have been disabled and re-credentialed. Affected devices have been reimaged or quarantined. The attacker has been ejected from the network...
📋 Debrief Questions
Post-Battle Assessment
- Were remote access security controls adequate to protect against targeted attacks?
- How effective was the detection and response for compromised remote endpoints?
- Were policies around personal device usage, password reuse, and public Wi-Fi adequate?
- How well did the organisation balance security with employee privacy and experience?
- Were GDPR breach notification procedures clear and timely?
- What strategic changes to remote working security architecture are needed?