| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
It?s not polite to hack your neighbor but how else can a national-CSIRT and critical enterprises train and assess cyber warriors? Simulations and games are an effective approach. However, there are many cyber security games, competitions and training platforms. They vary widely in effectiveness, assessment capabilities and flexibility. In addition, most are closed and proprietary in nature. What is needed is a publicly adopted cyber operations simulation standard to support training, assessment and tool & technique development across platforms. I will share an innovative way to describe Cyber Operations Simulation elements by abstracting the primitives and describing their interaction via a Scenarios Definition Language. I will describe the methodology & approach, fundamental object types and teach attendees how to run their own simulations. Bio: A committed security practitioner and entrepreneur, Bryan is currently a Senior Cyber Physical Security Consultant for BT. Having spent over 25 years in mission-critical environments, Bryan is uniquely qualified to advise organizations on what works and what doesn't. Bryan has worked with organizations in every major vertical throughout the world and has established himself as a trusted advisor. "The challenges facing organizations today require a business reasonable approach to managing risk, trust and limited resources while protecting what matters."
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast