team coaching products
Select a strong project team or spot a future manager.
Choose to get the sessions recorded for later dialog with the team members.
Can also be used by Universities and Schools to enhance collaboration and communication. We offer a substantial discount for this group to invest in our common future.
More than 30’000 people have so far tried “the investigation”.
collaboration & communication
Enhance communication across departmental, functional, and geographical borders by overcoming challenges together. The chain is only as strong as the weakest link.
Uncover each team member’s strong and weak sides and make them acknowledge that they are stronger as a team than as individuals.
Bring the organization together across borders and languages.
project team optimization
Select the optimal project team.
Each team will have to collaborate and communicate while solving a range of challenges. This will provide a unique insight into each team-members personality, strong/weak sides, and capabilities to balance “weaknesses”.
Highlight the importance of cyber-security for your organization.
More than 50% of cyber-attack vulnerability comes from the people inside the company.
This special tool addresses cyber security in 2 levels: awareness and analysis.
Collaboration & Communication
Each Team member is assigned a role to fill (Leader / Motivator / Analyst / Supporter). A reflection break happens halfway through the game. No facilitator needed, but the program-master gets a "fact-list" and can observe and advise during the program.more
Project Team Optimization
- Risk Management
- Time Management
- Conflict Resolution
You will be taken to Alcatraz on a helicopter where your team must solve a range of challenges to find “the truth which could have changed world-history”. You must get back to the helicopter in time not to be left on the island.more
the cyber attack
Simulates a cyber-attack and challenge the employees to make crucial decisions on how to react and shows the consequences of their decisions.
Reveals your organization’s cyber-risk-profile by examining processes to uncover weak areas and provide recommendations to improve your cyber security.