• Overview

Join us for a cyber-range exercise.

Improve your defense and response skills to a real-world cyber-attack

A one-day, hands-on-keyboard exercise in which participants observe and respond to a business email compromise (BEC) attack. Teams dive into system and network forensics to determine what happened, share and review results, identify methods for improving defenses and decide if stolen funds can be retrieved. Participants are enabled to readily share insights and arrive at mitigation among their fellow participants. Experts will also be available to answer questions and provide feedback and guidance. Each participant receives 6 CPEs.

The exercise is structured to provide participants with:

  • Realistic technical training and management interaction
  • Access to industry expert guidance and knowledge
  • Interactive learning with and from peers
  • Relationship building with local law enforcement
  • Practice of individual active defense techniques and tools
  • Tested and exercised playbook and checklists takeaways

*Participants can also attend remotely.

Register Now