Download presentation
Presentation is loading. Please wait.
Published byKennedi Campbell Modified over 10 years ago
1
Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range
2
Powered by Introduction 2
3
Powered by Introduction l Dr. Joe Adams l Vice President of Research and Cyber Security l 26 years Army Signal Corps l Associate Professor at US Military Academy l 3 time winner of the NSA’s Inter- Service Academy CDX l Senior Member IEEE 3
4
Powered by Agenda l Who am I? l Where is the Threat? l How am I at risk? l How to prepare? 4
5
Powered by Attack Surface 5
6
Powered by Attack Surface 6
7
Powered by Attack Surface 7
8
Powered by Attack Surface 8
9
Powered by Attack Surface 9
10
Powered by Why is this so hard? 10
11
Powered by Plans 11
12
Powered by The Price of Doing Business 12
13
Powered by 13
14
Powered by Security Theater 14
15
Powered by An Example of Why 15
16
Powered by What can we do? 16
17
Powered by What has to be protected? 17
18
Powered by What can we monitor? 18
19
Powered by What is on its own? 19
20
Powered by Make a plan 20
21
Powered by Policy 21
22
Powered by Education and Awareness 22
23
Powered by The Result 23
24
Powered by But then… 24
25
Powered by Practice the plan 25
26
Powered by Communication 26
27
Powered by Fight complacency 27
28
Powered by Internal Audits 28
29
Powered by Build Habits 29
30
Powered by It only takes once 30
31
Powered by What we’ve talked about 31
32
Powered by What we’ve talked about 32
33
Powered by What we’ve talked about 33
34
Powered by What we’ve talked about 34
35
Powered by l Skills training & maintenance l Classes l Events l Networking l Accessible l Persistent Using the Cyber Range
36
Powered by Classes l 17 Certifications l Pen Testing, Incident Handling, Ethical Hacking l Forensics l Leadership l Disaster Recovery l Classes held: l At Merit or at the customer’s location l Online l Cost includes: l Tuition l Certification Exam http://www.merit.edu/cyberrange/courses.php
37
Powered by Capture the Flag l Self-Paced l Threads of flags to find l Individual skills l Penetration testing l Forensics l SCADA l Scoring engine l Encourages competition
38
Powered by Force on Force l Paintball l Multiple teams; everyone for themselves l Penetrate system, plant a flag, secure the system l Red vs Blue l Focus on system & service security and continuity l Force on Force l Incident Response l Asynchronous l Red team creates havoc l Blue team diagnoses and recovers
39
Powered by Welcome to Alphaville
40
Powered by Alphaville
41
Powered by Alphaville l A persistent training environment l A Network of Things l More realistic than an IP range l Every exercise is a separate, customizable copy of the town and its infrastructure l Heterogeneous environment l Wide variety of operating systems and services l Residents of Alphaville provide “background noise” l Bot nets, rootkits, and backdoors
42
Powered by l Flexible terms & pricing l Pay for what you use l Voucher/Credit system Using the Cyber Range
43
Powered by Questions? http://www.merit.edu/cyberrange/ 43
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.