Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

DYNAMICS OF LEADERSHIPS What it Takes to be a Leader: A Primer Samuel R. Chand.
1 Inducements–Call Blocking. Aware of the Service?
Advanced Piloting Cruise Plot.
1
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
PP Test Review Sections 6-1 to 6-6
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
2 |SharePoint Saturday New York City
Green Eggs and Ham.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
VOORBLAD.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 6 Ethernet Fundamentals.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Ray Charles i can’t stop loving you 1 2 I ’ve made up my mind.
Note to the teacher: Was 28. A. to B. you C. said D. on Note to the teacher: Make this slide correct answer be C and sound to be “said”. to said you on.
Addition 1’s to 20.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Subtraction: Adding UP
Prof.ir. Klaas H.J. Robers, January 16, 2013 Supervising a graduating student 1.
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Energy Generation in Mitochondria and Chlorplasts
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
CpSc 3220 Designing a Database

Presentation transcript:

Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by Introduction 2

Powered by Introduction l Dr. Joe Adams l Vice President of Research and Cyber Security l 26 years Army Signal Corps l Associate Professor at US Military Academy l 3 time winner of the NSA’s Inter- Service Academy CDX l Senior Member IEEE 3

Powered by Agenda l Who am I? l Where is the Threat? l How am I at risk? l How to prepare? 4

Powered by Attack Surface 5

Powered by Attack Surface 6

Powered by Attack Surface 7

Powered by Attack Surface 8

Powered by Attack Surface 9

Powered by Why is this so hard? 10

Powered by Plans 11

Powered by The Price of Doing Business 12

Powered by 13

Powered by Security Theater 14

Powered by An Example of Why 15

Powered by What can we do? 16

Powered by What has to be protected? 17

Powered by What can we monitor? 18

Powered by What is on its own? 19

Powered by Make a plan 20

Powered by Policy 21

Powered by Education and Awareness 22

Powered by The Result 23

Powered by But then… 24

Powered by Practice the plan 25

Powered by Communication 26

Powered by Fight complacency 27

Powered by Internal Audits 28

Powered by Build Habits 29

Powered by It only takes once 30

Powered by What we’ve talked about 31

Powered by What we’ve talked about 32

Powered by What we’ve talked about 33

Powered by What we’ve talked about 34

Powered by l Skills training & maintenance l Classes l Events l Networking l Accessible l Persistent Using the Cyber Range

Powered by Classes l 17 Certifications l Pen Testing, Incident Handling, Ethical Hacking l Forensics l Leadership l Disaster Recovery l Classes held: l At Merit or at the customer’s location l Online l Cost includes: l Tuition l Certification Exam

Powered by Capture the Flag l Self-Paced l Threads of flags to find l Individual skills l Penetration testing l Forensics l SCADA l Scoring engine l Encourages competition

Powered by Force on Force l Paintball l Multiple teams; everyone for themselves l Penetrate system, plant a flag, secure the system l Red vs Blue l Focus on system & service security and continuity l Force on Force l Incident Response l Asynchronous l Red team creates havoc l Blue team diagnoses and recovers

Powered by Welcome to Alphaville

Powered by Alphaville

Powered by Alphaville l A persistent training environment l A Network of Things l More realistic than an IP range l Every exercise is a separate, customizable copy of the town and its infrastructure l Heterogeneous environment l Wide variety of operating systems and services l Residents of Alphaville provide “background noise” l Bot nets, rootkits, and backdoors

Powered by l Flexible terms & pricing l Pay for what you use l Voucher/Credit system Using the Cyber Range

Powered by Questions? 43