{"id":244,"date":"2021-09-12T09:22:45","date_gmt":"2021-09-12T09:22:45","guid":{"rendered":"http:\/\/caterinhuang.com\/dataheist\/?page_id=244"},"modified":"2021-09-12T10:10:41","modified_gmt":"2021-09-12T10:10:41","slug":"about-data-heist","status":"publish","type":"page","link":"http:\/\/caterinhuang.com\/dataheist\/","title":{"rendered":"About Data Heist"},"content":{"rendered":"\n<h2>What is Data Heist?<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 29%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" width=\"640\" height=\"849\" src=\"https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=640%2C849\" alt=\"\" class=\"wp-image-89 size-full\" srcset=\"https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=772%2C1024 772w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=226%2C300 226w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=768%2C1019 768w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=1158%2C1536 1158w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?w=1417 1417w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?w=1280 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Data Heist is the first card game in the world created to educate players on topics related to Data Protection and Personal Cyber Hygiene. It was created with simple game play so that even an 8-year-old can play, yet it has additional features that will engage a more matured players like employees, general public or anyone who uses the Internet.&nbsp;&nbsp;<\/p>\n\n\n\n<p id=\"play\">The game is a bit of an anti-thesis where players play the role of an amateur hacker. The aim of the game is for players to \u201csteal\u201d as much data as they can from unsuspecting victims in the marketplace (and there are many even in real life) using three of the most common forms of attacks that usually result in data loss.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<h2>Game Play<\/h2>\n\n\n\n<p><strong>SYNOPSIS<\/strong><\/p>\n\n\n\n<p>In the game Data Heist, players play a rookie hacker who want to be admitted into the inner circle of the hacking fraternity. To win the game players have to prove their ability by stealing as much data from the marketplace of victims and prevent your competitors from stealing as well. In advance scenarios, players can even level up their attacks and thwart attacks of other players.&nbsp;<\/p>\n\n\n\n<p><strong>NUMBER OF PLAYERS<\/strong><\/p>\n\n\n\n<p id=\"why\">The game can be played by 2 to 6 players.<br>Recommended age for players is from 8 to 80 years old or anyone who knows how to count.&nbsp;<\/p>\n\n\n\n<h2>Why Data Heist?<\/h2>\n\n\n\n<p>According to a <a rel=\"noreferrer noopener\" href=\"https:\/\/www.weforum.org\/reports\/the-global-risks-report-2021\" target=\"_blank\">Global Risk Perception<\/a> survey conducted by the World Economic Forum; Cyber Risk ranks among one of the top risk concerns in all over the world. This is not surprising because of several recent high-profile cyber-attacks that resulted massive amounts of personal data stolen and disrupted operations has caught global eye balls and raised concerns among the business communities and governments.&nbsp;<\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/T8VOaN926Ak\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n\n\n\n<p><strong>BENEFITS OF DATA HEIST<\/strong><br>Data Heist was created to be a learning tool to educate on topics related to data protection and personal cyber hygiene. Here are some of the benefits:<\/p>\n\n\n\n<ul><li>Fun and engaging way to educate players on data protection and cyber hygiene&nbsp;<\/li><li>Players get to experience through a tabletop simulation of how hacking takes place&nbsp;<\/li><li>Real threats can be made known to players so that they can be more vigilant<\/li><li>Simple game play suitable for children who are able to count<\/li><li>Vocabulary related to data protection and cyber hygiene<\/li><li>Additional features and rules in place to engage more matured players<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>LEARNING OBJECTIVES<\/strong><br>Data Heist is designed so that when the game is facilitated by an adult or trained educator, these are some of the learning objectives that can be achieved after the game.<\/p>\n\n\n\n<ul id=\"order\"><li>Develop awareness of the online threats and possible ways scammers work<\/li><li>Understand that every organization and individual is susceptible to attacks<\/li><li>Recognize common types of cyber attacks<\/li><li>Recognize various threat actors<\/li><li>Apply good person cyber hygiene habits<\/li><li>Identify different methods of protecting data&nbsp;<\/li><li>Identify data protection weaknesses of organizations&nbsp;<\/li><\/ul>\n\n\n\n<h2>Order Now<\/h2>\n\n\n\n<p>Get one for you <a href=\"http:\/\/caterinhuang.com\/dataheist\/how-to-order\/\" data-type=\"page\" data-id=\"37\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Data Heist? Order Now Get one for you here!<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"jetpack-related-posts":[{"id":36,"url":"http:\/\/caterinhuang.com\/dataheist\/why-data-heist\/","url_meta":{"origin":244,"position":0},"title":"Why Data Heist?","date":"September 7, 2021","format":false,"excerpt":"","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15,"url":"http:\/\/caterinhuang.com\/dataheist\/what\/","url_meta":{"origin":244,"position":1},"title":"What is Data Heist?","date":"September 7, 2021","format":false,"excerpt":"","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38,"url":"http:\/\/caterinhuang.com\/dataheist\/about-us\/","url_meta":{"origin":244,"position":2},"title":"About Us","date":"September 7, 2021","format":false,"excerpt":"Meet The Creator Mark Barnabas Lee was an educator in school and now a Data Protection and Privacy Practitioner who provides advisory and training on Personal Data Protection, Risk Management and Operational Excellence. He is currently based in Singapore and has lived in China, India, Malaysia and Philippines in his\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":180,"url":"http:\/\/caterinhuang.com\/dataheist\/privacy\/","url_meta":{"origin":244,"position":3},"title":"Privacy Notice","date":"September 8, 2021","format":false,"excerpt":"This Data Protection Notice (\u201cNotice\u201d) sets out the basis which Hotspot Explorer Pte Ltd (\u201cwe\u201d, \u201cus\u201d, or \u201cour\u201d) may collect, use, disclose or otherwise process personal data of our customers in accordance with the Personal Data Protection Act (\u201cPDPA\u201d). This Notice applies to personal data in our possession or under\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":67,"url":"http:\/\/caterinhuang.com\/dataheist\/using-praesidium\/","url_meta":{"origin":244,"position":4},"title":"Using Praesidium","date":"September 7, 2021","format":false,"excerpt":"For privacy and data protection practitioners who would like to know how to use Praesidium as a consulting tool please contact us here","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37,"url":"http:\/\/caterinhuang.com\/dataheist\/how-to-order\/","url_meta":{"origin":244,"position":5},"title":"How to Order?","date":"September 7, 2021","format":false,"excerpt":"Loading\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/244"}],"collection":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":4,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/244\/revisions"}],"predecessor-version":[{"id":262,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/244\/revisions\/262"}],"wp:attachment":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/media?parent=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}