Scenario. You own the rollout of a new contactless payment module across 120 buses. IT Security has flagged a potential vulnerability and mandates a 14-day penetration testing window before launch. Operations leadership insists on launching on schedule to meet a public commitment and avoid $250K in legacy farebox maintenance overtime. You are facilitating a 40-minute decision meeting to align on scope, timeline, and risk mitigation.
Problem to solve. Facilitate a structured tradeoff discussion that balances security compliance with operational urgency, identifies a mutually acceptable path forward (phased rollout, conditional launch, or controlled delay), and secures explicit stakeholder commitments.
Format
cross-functional-decision · 40 min · ~2 hr prep
Success criteria
- Surfaces underlying incentives and non-negotiable constraints for both parties
- Frames tradeoffs transparently without taking sides prematurely
- Proposes or facilitates a risk-mitigated compromise (e.g., phased deployment, sandboxed pilot, or conditional sign-off)
- Ends with documented decisions, owners, and escalation triggers
What to review beforehand
- Basic contactless payment architecture and typical security review gates
- Public transit fare collection operational dependencies
- Standard risk mitigation strategies for phased tech rollouts
Ground rules
- Your role is to facilitate the decision, not to dictate the technical or operational outcome
- Focus on aligning incentives, surfacing risks, and sequencing commitments
- You may propose options, but stakeholders must own the final tradeoff
Roles in scenario
Sarah Lin, IT Security Manager (cross_functional_partner, played by cross_functional)
Motivation. Ensure zero critical vulnerabilities reach production; protect agency from data breach liability and regulatory penalties.
Constraints
- Pen test requires dedicated staging environment
- Cannot approve sign-off without full vulnerability scan
- Audit requirements are non-negotiable for payment systems
Tensions to introduce
- Refuses to compress pen test timeline under any circumstance
- Questions whether operations is willing to accept breach liability
- Suggests delaying launch entirely if full test isn't completed
In-character guidance
- Maintain firm stance on security protocols but remain open to phased approaches
- Provide honest answers about audit requirements when asked
- Push for risk documentation if any compromise is proposed
- Acknowledge operational costs but prioritize compliance
Do not
- Do not volunteer a phased testing workaround unless prompted
- Do not escalate to hostility or threaten to block all projects
- Do not solve the scheduling conflict for the candidate
- Do not concede on critical security gates without documented risk acceptance
David Torres, Operations Director (skeptical_stakeholder, played by leadership)
Motivation. Avoid service disruption, control overtime costs, and maintain public trust by hitting the announced launch date.
Constraints
- Legacy farebox maintenance contract expires in 14 days
- Public announcement already distributed to riders and press
- Driver training is scheduled for next week
Tensions to introduce
- Argues that delaying launch will cost more in overtime and public backlash
- Suggests launching with 'basic security checks' instead of full pen test
- Pressures the PM to 'take the risk' or override security temporarily
In-character guidance
- Be direct about budget and public commitment pressures
- Answer honestly about operational flexibility when questioned
- Show willingness to consider phased rollout if it limits overtime
- Push back on solutions that increase driver workload or confuse riders
Do not
- Do not volunteer a phased rollout plan unless the candidate facilitates it
- Do not agree to bypass security protocols outright
- Do not become adversarial toward the security manager
- Do not make the final decision for the candidate
Scoring anchors
- Exceeds
- Expertly aligns competing incentives, structures a risk-mitigated phased approach, secures explicit sign-offs with clear ownership, and establishes monitoring/rollback triggers that satisfy both security and operational constraints.
- Meets
- Facilitates a structured discussion, identifies core constraints, proposes a reasonable compromise, and captures decisions with minor gaps in risk documentation or escalation planning.
- Below
- Struggles to manage competing priorities, defaults to delaying or rushing without analysis, allows unproductive conflict, or ends without clear accountability or next steps.