ITEN WIRED is pleased to announce the 2nd Annual ITEN Cyber Challenges.
As cyber professionals, we understand that in a field as dynamic as cybersecurity many of our students learn best through doing, rather than observing, which is why it is so critical that curriculum includes hands-on practical experience. Fortunately, the cyberspace domain provides a unique opportunity to create an emulated, realistic and risk-free environment for learning. However, not all simulated environments are equally capable of recreating the underlying dynamic network protocols and events necessary to accurately reflect the indicators of compromise (IOCs) associated with the advanced persistent threats (APTs) that represent the future state of cybersecurity learning. These sessions will demonstrate the advanced techniques developed within the Department of Defense to emulate the cybersecurity domain of the future while seeking to reduce complexity through automation, reduce costs through open source & virtualization, and increase consistency/repeatability through lesson plans, exercises and scenarios. Through our hands-on interaction with the Florida Cyber Range, we will demonstrate how using these network emulation techniques can be used to rapidly develop/validate the knowledge and skills needed for the protection of critical national infrastructure.
The Cyber Challenges are broken down into 3 Sessions on Tuesday, October 10th in the Oleander Room:
Using the Florida Cyber Range to Develop the Next-Generation of Cybersecurity Defenders: Hands-on Ransomware Training
9:45 AM – 10:45 AM
This will be a “hands-on” event where participants will interact with several Ransomware and Malware samples via the Florida Cyber Range. The event will focus on threat scenarios, attack vectors and will touch upon mitigation techniques.
Using the Florida Cyber Range to Develop the Next-Generation of Cybersecurity Defenders: Hands-on Phishing Training
11:00 AM – 12:00 PM
This will be a “hands-on” event where participants will interact with SPAM, phishing emails, Microsoft Exchange/AD, and browser-based exploits via the Florida Cyber Range. The event will focus on threat scenarios, attack vectors and will touch upon mitigation techniques.
Cyber Defense and Incident Response Competition
2:00 PM – 5:00 PM
Participation by Registered Teams Only…Conference Attendees are welcome to observe
Teams will be tasked with defend their networks against pre-programmed cyber traffic/attack scenarios. The goal is to defend the network against an advanced and persistent cyber adversary, with a focus on identifying and responding to a cyber attack. Teams will be scored on their ability to defend and respond to the cyber events. The team with the highest score will be named the Cyber Challenge Champion.
Limited to 4 Teams. Each team must have between 4 to 7 participants.
Participants must bring a laptop to plug into the range via Ethernet.
Participants will remote into a hosted player environment, so the only software needed is an HTML5 browser, Microsoft RDP client and VNC client.
Teams are scored on responsive actions (Identify, Respond, Restore, Attribute) to pre-programmed attacks. Attacks will be identical against all teams.
October 9th: 2:00 - 4:00 PM - Team check in, rules and range familiarization
October 10th: 2:00 PM – 5:00 PM - Competition
October 11th: 3:00 PM (During Closing Remarks) – Debrief and Winners Announced
Submit entry request by completing this form by September 22, 2017.
Please note: These sessions include a hands-on exercise using remote access into the Florida Cyber Range environment. Attendeeincludeg to participate in the exercises must bring a laptop computer to connect to the range via a WiFi connection. All activity will be accomplished within the cyber range via a web-browser, so there is no risk of compromise to participants’ systems.
The Cyber Range infrastructure will be provided by the Florida Cyber Range in cooperation with the University of West Florida and Metova CyberCENTS. The Florida Cyber Range is a state-of-the-art platform for hands-on cybersecurity education, training, operations and research hosted out of the UWF Center for Cybersecurity, a National Center of Academic Excellence (CAE) and the NSA/DHS CAE Regional Resource Center for the Southeast region. The Florida Cyber Range consists of Metova CyberCENTS Cyber Operations Enhanced Network and Training Simulators (CENTS®) technologies. The pre-programmed traffic/attacks will be provided by the Metova Sentinel, Legion, AutoBuild, Myrmidon, Reconstitution (SLAM-R©) cyber effect appliance. The emulated internet will be provided by the Metova Range Global Internet (RGI®) appliance.