top of page

Cyber Security and Competitive Gaming

Writer's picture: Mark WilliamsMark Williams

Man sits at desk playing competitive game
Cyber Security and Competitive Gaming Share Many Parallels

Cyber Security Lessons Series Introduction

Understanding the lessons and challenges other industires face can help us be introspective and evaluate shortfalls in our own sector. My Cyber Security lessons series takes a keen look at some of the parallels between various pursuits and the complex world of Cyber Security.

"...doing it differently which can be 10x better"

There will undoubtedly be vast differences but also many bridge-building similarities that we can learn from in the Cyber Security world.


In previous posts I covered the world of Formula 1 and mountain bike racing. Aside from being personal passions also coincided with the Formula 1 Melbourne Grand Prix. This episode we look at another personal passion of mine. Let's look at competitive gaming and Cyber Security.



Five lessons from Competitive Gaming for Cyber Security

Competitive Gaming and the world of cyber security are very different in some many ways, however there are several lessons to be learned from gaming for those in Cyber Security


Thinking Outside the Box - Cyber Security and Competitive Gaming

In gaming, players often have to think creatively and "outside the box" to succeed. This same approach can be applied to cybersecurity, where security professionals must anticipate and respond to new and unconventional attack methods. By thinking creatively and applying novel approaches to security, security professionals can stay ahead of cybercriminals and better protect their organisations.

Thinking creatively in a business cyber security sense requires the compilation of a team with diverse thinking. People that think different. Some CISO's actively seek to build teams that many would regard as 'quirky.' However diversity can take many forms. One of the reasons cited for the CIA's failure to prevent the 9-11 terrorist attacks was lack of diversity in the organisation. Far too many "White, Ivy League Graduates."


Gaming leaderboard
Gamers Calculate the Threat of their Opponents

Threat Modeling

In gaming, players must analyse their opponents' strengths and weaknesses to develop a winning strategy. In cybersecurity, threat modelling involves analysing potential attackers' tactics, techniques, and procedures (TTPs) to identify weaknesses in the organisations security infrastructure. This approach helps security professionals prioritise their security measures, allocate resources more effectively, and develop more effective security strategies.


Simulation and Testing - Cyber Security and Competitive Gaming

Many games feature simulations that players use to practice and improve their skills. Similarly, cybersecurity professionals can use simulations and testing to identify vulnerabilities in their systems and networks and test their security measures against various attack scenarios.

As an example the Australian Government has announced that Australian Bank will conduct cyber war games to test their cyber security resilience. Many business also conduct penetration testing, for example, which involves simulating attacks against an organisation's systems and networks to identify vulnerabilities and weaknesses in their security infrastructure.

Headlone about banks using video games
Companies are Utilising Competitive Games to Identify Vulnerabilities

Adapting to Change

Gaming requires players to be able to adapt quickly to changing environments, opponents, and conditions. Similarly, in cybersecurity, security professionals must be able to adapt to new and emerging threats, such as zero-day exploits or new attack methods, and adjust their security strategies accordingly. They must be proactive in their approach to security and be able to anticipate potential threats and vulnerabilities.


Risk Assessment and Management - Cyber Security and Competitive Gaming

Woman plays jenga with stone blocks
Cybersecurity Can Be a Balancing Act

In gaming, players must assess and manage risks to succeed. Similarly, in cybersecurity, security professionals must be able to assess and manage risks to protect their systems and networks effectively. By identifying potential vulnerabilities and assessing their potential impact, security professionals can prioritise their security measures and allocate their resources more effectively. Risk management involves developing effective security policies, procedures, and protocols to mitigate risks and respond to incidents promptly and effectively.



By applying these lessons from gaming to the field of cybersecurity, security professionals can better protect their organisations against cyber threats. They can develop more effective security strategies, stay ahead of emerging threats, and improve their overall security posture.


Please provide feedback and if you haven't already please subscribe to this newsletter and share it with a friend. The next lesson for Cyber Security will be from the world of ??? stay tuned!


Mark Williams - Founder - www.quigly.com.au

bottom of page