Military Cyber Training Methods

There's a war raging between criminal hackers and corporate computer defense systems, and when it comes to wars, military organisations know how to fight them best.

The Israeli military is known for the high quality of its cybersecurity training, and that's what Cyberbit's Cyber Range offers: The same military-grade training and simulation systems.

Cyberbit was founded in 2015 as a subsidiary of Elbit Systems, a leading Israeli defense contractor. Its goal is to commercialise the cybersecurity training and technologies Elbit had developed in its work with Israel's military and government agencies.

Distributing this former military technology more widely makes sense in today's world, because all companies are essentially on the front lines of a raging cyber war. The military is good at monitoring national borders, but today's borders are much closer. They are in the firewalls and routers.

A corporation's cybersecurity teams are its first responders to a serious attack, and they need to coordinate the use of many different tools within a tight timeframe.

"It's not enough to buy security tools, you need to make sure your people know how to use them and how to combine them against multi-stage attacks," says Adi Dar, CEO of Cyberbit.

"When a company is under attack, people have to know how to work in teams and how to make quick decisions under intense pressure. We make sure they know what to do under many different situations."

Cyberbit's Cyber Range systems get its name from a firing range -- a place where the military tests its weapons and the skills of its soldiers. Cyberbit argues that the same approach should apply to corporate security training: The ability to test the performance of security tools and people in real-world environments.

A key capability of the Cyber Range is being able to create a virtual model of a company's IT network -- its routers, servers, and software, and then simulate many different types of attacks in real-time. These systems are regularly updated to train teams on best ways to respond to the latest types of cyberattacks such as Ransomware. They can also be used to research future possible attack scenarios and proactively prepare defenses.

"The best cybersecurity teams are the ones with the most experience," says Dar. "Our simulations are hyper-realistic which means teams can build experience in dealing with some of the worst and most damaging attacks and then learn from any mistakes without risking the organization."

The shortage of cybersecurity experts in the US is a key driver of Cyber Range system sales as universities and colleges create new courses to meet high demand. Cybersecurity Ventures predicts as many as 3.5 million open cyber security jobs in 2021. Dar says that customers also use the Cyber Range systems to test job applicants and make sure their teams have the required mix of skill sets.

Cyber Range systems have been installed in many US locations and also in India, Australia, France, Germany, and Austria.

Cyberbit also offers Security Orchestration, Automation, and Response software; Industrial Control Systems security; and Endpoint Detection and Response tools. These help filter out high alert volumes created by the complexity of IT systems and can be used in combination against multi-level attacks.

The company is constantly evaluating new security threats. Its Malware Research team recently analysed a new version of the Ursnif Trojan, a highly sophisticated malware creation that uses a file-less technique to hide and steal data

ZDNet

You Might Also Read:

Revealed: Top Secret Israeli Hackers For Hire:

 

 

« White Hat Female Hacker Leads The Way
Meeting The Cyber Talent Challenge Head-On »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

4Securitas

4Securitas

4Securitas is an innovative cyber security firm focused on protecting critical data at the core of every organisation.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.