Adversary Personas

Method Overview

An interactive role-playing game, designed for industry teams to critically engage and think broadly and creatively about potential cybersecurity threats.

Example of a portion of the card deck available from the method website.

Getting Started

Materials: Adversary Persona card deck

Participants: Team (2-10 people)

Steps (from the method website description):

  1. Write down a list of things you want to protect
  2. Identify who your adversaries are
  3. Generate a list of needs of adversaries
  4. Respond to the list of needs of adversaries
  5. Discover existing and unexpected resources adversaries have at their disposal
  6. Role-play adversary personas and map out attackers’ needs or desires

    This methods microsite is based off of analysis which is available in a preprint manuscript. Feel free to review our methodology and other details! We welcome your comments and feedback ! Please also use this form if you would like to suggest a method as an addition to the collection!