• Overview

Join us for a cyber-range exercise.

Improve your defense and response skills to a real-world cyber-attack

A one-day, hands-on-keyboard exercise in which participants observe and respond to a cloud leak of sensitive information. Teams dive into system and network forensics to determine what happened, what information was exposed, share and review results and identify methods for improving defenses. Participants are enabled to readily share insights and arrive at mitigation among their fellow participants. Experts will also be available to answer questions and provide feedback and guidance. Each participant receives 6 CPEs.

The exercise is structured to provide participants with:

  • Realistic technical training and management interaction
  • Access to industry expert guidance and knowledge
  • Interactive learning with and from peers
  • Relationship building with local law enforcement
  • Practice of individual active defense techniques and tools
  • Tested and exercised playbook and checklists takeaways

*Participants can also attend remotely.

Register Now