Military Cyber Training Methods

There's a war raging between criminal hackers and corporate computer defense systems, and when it comes to wars, military organisations know how to fight them best.

The Israeli military is known for the high quality of its cybersecurity training, and that's what Cyberbit's Cyber Range offers: The same military-grade training and simulation systems.

Cyberbit was founded in 2015 as a subsidiary of Elbit Systems, a leading Israeli defense contractor. Its goal is to commercialise the cybersecurity training and technologies Elbit had developed in its work with Israel's military and government agencies.

Distributing this former military technology more widely makes sense in today's world, because all companies are essentially on the front lines of a raging cyber war. The military is good at monitoring national borders, but today's borders are much closer. They are in the firewalls and routers.

A corporation's cybersecurity teams are its first responders to a serious attack, and they need to coordinate the use of many different tools within a tight timeframe.

"It's not enough to buy security tools, you need to make sure your people know how to use them and how to combine them against multi-stage attacks," says Adi Dar, CEO of Cyberbit.

"When a company is under attack, people have to know how to work in teams and how to make quick decisions under intense pressure. We make sure they know what to do under many different situations."

Cyberbit's Cyber Range systems get its name from a firing range -- a place where the military tests its weapons and the skills of its soldiers. Cyberbit argues that the same approach should apply to corporate security training: The ability to test the performance of security tools and people in real-world environments.

A key capability of the Cyber Range is being able to create a virtual model of a company's IT network -- its routers, servers, and software, and then simulate many different types of attacks in real-time. These systems are regularly updated to train teams on best ways to respond to the latest types of cyberattacks such as Ransomware. They can also be used to research future possible attack scenarios and proactively prepare defenses.

"The best cybersecurity teams are the ones with the most experience," says Dar. "Our simulations are hyper-realistic which means teams can build experience in dealing with some of the worst and most damaging attacks and then learn from any mistakes without risking the organization."

The shortage of cybersecurity experts in the US is a key driver of Cyber Range system sales as universities and colleges create new courses to meet high demand. Cybersecurity Ventures predicts as many as 3.5 million open cyber security jobs in 2021. Dar says that customers also use the Cyber Range systems to test job applicants and make sure their teams have the required mix of skill sets.

Cyber Range systems have been installed in many US locations and also in India, Australia, France, Germany, and Austria.

Cyberbit also offers Security Orchestration, Automation, and Response software; Industrial Control Systems security; and Endpoint Detection and Response tools. These help filter out high alert volumes created by the complexity of IT systems and can be used in combination against multi-level attacks.

The company is constantly evaluating new security threats. Its Malware Research team recently analysed a new version of the Ursnif Trojan, a highly sophisticated malware creation that uses a file-less technique to hide and steal data

ZDNet

You Might Also Read:

Revealed: Top Secret Israeli Hackers For Hire:

 

 

« White Hat Female Hacker Leads The Way
Meeting The Cyber Talent Challenge Head-On »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

National Cyber Security Centre (NCSC) - Norway

National Cyber Security Centre (NCSC) - Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.