Presentation is loading. Please wait.

Presentation is loading. Please wait.

Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range.

Similar presentations


Presentation on theme: "Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range."— Presentation transcript:

1 Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

2 Powered by Introduction 2

3 Powered by Introduction l Dr. Joe Adams l Vice President of Research and Cyber Security l 26 years Army Signal Corps l Associate Professor at US Military Academy l 3 time winner of the NSA’s Inter- Service Academy CDX l Senior Member IEEE 3

4 Powered by Agenda l Who am I? l Where is the Threat? l How am I at risk? l How to prepare? 4

5 Powered by Attack Surface 5

6 Powered by Attack Surface 6

7 Powered by Attack Surface 7

8 Powered by Attack Surface 8

9 Powered by Attack Surface 9

10 Powered by Why is this so hard? 10

11 Powered by Plans 11

12 Powered by The Price of Doing Business 12

13 Powered by 13

14 Powered by Security Theater 14

15 Powered by An Example of Why 15

16 Powered by What can we do? 16

17 Powered by What has to be protected? 17

18 Powered by What can we monitor? 18

19 Powered by What is on its own? 19

20 Powered by Make a plan 20

21 Powered by Policy 21

22 Powered by Education and Awareness 22

23 Powered by The Result 23

24 Powered by But then… 24

25 Powered by Practice the plan 25

26 Powered by Communication 26

27 Powered by Fight complacency 27

28 Powered by Internal Audits 28

29 Powered by Build Habits 29

30 Powered by It only takes once 30

31 Powered by What we’ve talked about 31

32 Powered by What we’ve talked about 32

33 Powered by What we’ve talked about 33

34 Powered by What we’ve talked about 34

35 Powered by l Skills training & maintenance l Classes l Events l Networking l Accessible l Persistent Using the Cyber Range

36 Powered by Classes l 17 Certifications l Pen Testing, Incident Handling, Ethical Hacking l Forensics l Leadership l Disaster Recovery l Classes held: l At Merit or at the customer’s location l Online l Cost includes: l Tuition l Certification Exam http://www.merit.edu/cyberrange/courses.php

37 Powered by Capture the Flag l Self-Paced l Threads of flags to find l Individual skills l Penetration testing l Forensics l SCADA l Scoring engine l Encourages competition

38 Powered by Force on Force l Paintball l Multiple teams; everyone for themselves l Penetrate system, plant a flag, secure the system l Red vs Blue l Focus on system & service security and continuity l Force on Force l Incident Response l Asynchronous l Red team creates havoc l Blue team diagnoses and recovers

39 Powered by Welcome to Alphaville

40 Powered by Alphaville

41 Powered by Alphaville l A persistent training environment l A Network of Things l More realistic than an IP range l Every exercise is a separate, customizable copy of the town and its infrastructure l Heterogeneous environment l Wide variety of operating systems and services l Residents of Alphaville provide “background noise” l Bot nets, rootkits, and backdoors

42 Powered by l Flexible terms & pricing l Pay for what you use l Voucher/Credit system Using the Cyber Range

43 Powered by Questions? http://www.merit.edu/cyberrange/ 43


Download ppt "Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range."

Similar presentations


Ads by Google