cybersecurity: arm and train us warriors to win cyber war
DESCRIPTION
Quickly & easily recreate Internet scale cyber war, interpret the results, and rapidly act upon cyber threats to: -Train cyber warriors to defend against threats or neutralize the enemy. -Harden targets – networks, data centers, individual devices.TRANSCRIPT
![Page 1: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/1.jpg)
Arm and Train US Warriors to Win Cyber War Deploying the Modern Cyber Range
![Page 2: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/2.jpg)
2
Prepare for cyber war with cyber war: • Thousands of global attacks
• Botnet and global DDoS simulation
• Millions of users
• Hundreds of applications
• As much non-repetitive data as the U.S. Library of Congress in one hour
The Cyber Range Imperative
![Page 3: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/3.jpg)
Military Preparedness Requires Ranges
Every base must be able to easily recreate, interpret, and rapidly respond to cyber threats.
• Conduct basic training
• Develop ingrained skills
• Harden critical targets
![Page 4: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/4.jpg)
• Too complex
• Not scalable
• Not practical
• Not cost-effective
Legacy Methods Cannot Solve Modern Problems
![Page 5: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/5.jpg)
Legacy Thinking Breeds Costs and Delays
![Page 6: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/6.jpg)
Creates Internet-scale cyber war in controlled environment and records impact.
• Visibility to harden network and data center targets
• Intelligence needed to act on cyber events
• Repeatable, deterministic Resiliency Score™
Science of Cyber Tomography
![Page 7: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/7.jpg)
The comprehensive alternative to costly and complex cyber ranges.
• 4,500+ real-time attacks
• 150+ applications
• Traffic from millions of users
• Extensive automation speeds configuration and reporting
• Futureproof and always current
BreakingPoint Storm CTM™
![Page 8: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/8.jpg)
Harden Network and Data Center Targets
![Page 9: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/9.jpg)
Centralized Command and Control
The BreakingPoint Storm CTM is an ever current command and control center for:
• Keeping conditions up-to-date and standardized • Coordinating multi-party situational analysis • Replicating content across a network of machines • Distributing and managing cyber warming exercise
![Page 10: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/10.jpg)
We must build resiliency into every element of critical infrastructure.
• Measure and improve resiliency from chip to application
• Hold vendors accountable
• Identify and remediate stress fractures
• Monitor the effects of changes over time
Hardening Targets Throughout IT Supply Chain
![Page 11: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/11.jpg)
We must leverage science and technology to recreate, interpret, and rapidly respond to cyber threats.
• Develop elite cyber warriors
• Advance capabilities through research and development
• Harden critical targets
Evolving Voodoo into Science
![Page 12: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/12.jpg)
– Rapidly deployed operational cyber range to troops
– Armed staff to attack infrastructure to measure and harden resiliency
– Remain current with attack and application changes
Goal: Deploy operationally relevant cyber range
– Provide cyber warriors with model of Internet and curriculum to hone cyber defense skills
– Support red and blue teaming exercises with relevant conditions and new attacks
– Enable staff to stay current with attacks
Benefits: Increased performance and ROI
– Dramatically reduced the time and cost of creating war game exercises
– Exposed warriors to real attacks and network traffic in a controlled environment
– Retired 100+ linear feet of racks full of hardware
Solution: Measure resiliency with high stress conditions
US Defense Information Systems Agency
![Page 13: Cybersecurity: Arm and Train US Warriors to Win Cyber War](https://reader034.vdocument.in/reader034/viewer/2022042713/5480b62db379597b2b8b5b0f/html5/thumbnails/13.jpg)
Northrop Grumman Cyber Range