Part 4 of 4
A 90-minute, interactive, gamified leadership exercise
Enhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies.
In the Achilles Systems Hack Assessment series we have discussed a specific incident experience to see how our core Triad concepts address the incident by any of the cybersecurity Framework function areas including: Govern, Identify, Prevent, Detect, Respond and Recover. We focused on operations through the CIS Controls, Vulnerability Management and Security Operations. This event will bring these discussions into practice as we navigate the various event components and discuss the best responses. No need to have attended the webcast series first, but for a deeper understanding please review the webcast series here.
As cyber-attacks become more common and more expensive, many organizations are making a foundational shift to view operations from the point of view of an adversary in order to protect their most sensitive information. Despite vulnerability tools and programs being available for several decades, breaches still happen regularly from known vulnerabilities. Complicating the matter more are a wide range of modern technologies requiring more time and knowledge to manage, more known vulnerabilities than ever before, an unprecedented migration to cloud, and ever-increasing legal and regulatory compliance standards. Information Assurance Engineers, Auditors, SOC Analysts, and Cybersecurity Managers need more to better defend an organization's data systems.
Cyber42 is a leadership simulation game that puts you in the driver's seat of making tough leadership calls on behalf of a fictitious organization that needs your expertise. Each outcome will be followed by thoughtfully group discussion. The winner will be decided by who makes the strongest security cultural impact to the fictitious organization.
Requirements:
A laptop with a current, modern web-browser.
Learning Objectives:
You will work through different scenarios, each focusing on different elements needed as an Operational Cybersecurity Executive: Vulnerability Management, Security Operations and Defensive Controls. Walk away after the even having advanced the following:
The content from this webcast supports concepts from the following SANS courses:
Register for all previous parts in the series: