Cybersecurity Training, Military Style

USAF cyberwarriors of the 328th weapons squadron, Nellis, Nevada.

Cybersecurity-training programs modeled on military tactics are making their way to the private sector.

Similar to how the armed forces stage war games to test the readiness of their troops for battle, these “hands on” training programs put companies through simulated breaches designed to test the effectiveness of the security tools, policies and teams they’ve put in place to defend themselves.

Insufficient planning and preparedness is the most significant barrier to achieving a high level of cyber-resilience within an organisation, 65% of IT professionals said in a recent survey released by the Ponemon Institute, a Michigan-based security-policy research center.

And as highly publicized hacks on organisations such as Sony Corp., J.P. Morgan Chase & Co. and the Internal Revenue Service have shown, even large, well-funded organisations can easily fall victim to cybercriminals, whose attacks are growing more sophisticated as the security industry struggles to keep up.

Identifying Gaps

Lance Hayden, a former Cisco Systems Inc. security manager and now Berkeley Research Group LLC managing director, says practicing cybersecurity skills in a safe, controlled environment before a breach ever happens is a smart thing to do. “You can only go so far with book knowledge before you need to try these things in a lab environment,” he says.

Among the cybersecurity firms championing military-style preparedness training is iSight Partners, which was acquired by FireEye Inc. earlier this year. The company’s ThreatSpace training program, run by retired Adm. Patrick Walsh, uses data collected by iSight’s intelligence agents around the world to create simulations that mirror the latest emerging security threats. ThreatSpace then puts a company’s IT security team through a multiday exercise to practice how it would respond to the various threat scenarios if they were actually happening.

Done on a company’s home turf, the ThreatSpace training is designed to help organizations identify vulnerabilities not only in their networks, but in their employee training and corporate security policies, as well, says Adm. Walsh, who spent more than 30 years in the Navy. “We want to energize and pressurize a team to evaluate their readiness,” he says, adding that the cybersecurity industry needs to learn what the Navy learned long ago—that having a training environment that mimics the fighting environment is the best way to improve preparedness.

Think like a Hacker

Whereas iSight’s product is focused on identifying gaps and weaknesses in a company’s defenses, other training programs want to help companies come at the issue from the mind-set of a hacker.

The SANS Institute, a nonprofit computer-security training organization, says companies are expressing increased interest in its Netwar training program in the wake of the many corporate breaches reported in 2014 and 2015.

Netwar was inspired by DEF CON, one of the world’s largest hacking conventions, held annually in Las Vegas. The conference holds a tournament every year where some of the world’s best hackers attempt to attack each other.

Tim Medin, a SANS Institute instructor and self-proclaimed hacker, says Netwar training involves two teams competing in a virtual version of the playground game King of the Hill. Each team has what Netwar calls a castle, and they have to defend their own castle while trying to attack the opposing team’s.

Although they are engaged in a game, the cybersecurity professionals are using the same equipment a security team would actually use in a typical company, including Web servers and Linux software. Mr. Medin says SANS updates the game every year to include recently identified threats, and the training can be done on-site at a company or at an off-site location.

The purpose of Netwar, he says, is to help security and IT professionals think creatively and engage in hacking behavior they typically wouldn’t be able to experiment with at work. “You can sit someone in front of a book or a class, and it’s good to learn but it loses some of the excitement,” Mr. Medin says.

Inspiring employees

Though their training programs come at the issue of cybersecurity preparedness from two different angles, both Adm. Walsh and Mr. Medin say the hands-on experiences inspire employees to stay later and learn more. Mr. Medin says it isn’t uncommon to see employees strategizing until 3 a.m.

Adm. Walsh says it is important that companies see how well their security systems and teams perform in the heat of the moment, before a real breach happens. It helps them understand their “level of readiness in a way they’re not going to see unless there’s an actual breach,” he says. “It is one of those triple plays where you feel like you’re really helping people get ahead.”

WSJ: http://on.wsj.com/1RYQTdg

« North Korea Denies Cyber Attacks On South Korea
Big Data: The 4 Layers Everyone Must Know »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).

Universal Technical Resource Services (UTRS)

Universal Technical Resource Services (UTRS)

UTRS is a technology firm that delivers a wide range of engineering, technical, strategic, and digital services to the public and private sectors.