CICA/CDET Observe the Attack: Cloud Leak- IMR 002
June 17 @ 9:00 am - 11:00 am CDT
This is a two-hour network defense cyber range demonstration in which expert cybersecurity engineers investigate and mitigate a cloud leak attack and share their tools, tactics, and strategies refined through years of experience.
Experience these benefits and more:
Attack breakdown: The course includes an overview of cloud-based environment attacks and how threat actors compromise systems to damage operations, escalate privileges, and exfiltrate data.
Real-time network defense: Expert facilitators outline the process of investigation, intrusion, and compromise; and how threat hunters and network defenders observe, diagnose, and mitigate attack activity as they proceed through the scenario.
Expert Q&A: Audience questions are addressed throughout the exercise, and at the end of the session.
Incident Response guidance: Best practices, guidance, and resources to maximize your organization’s capacity for incident prevention, mitigation, and recovery are included throughout.
Don’t miss your chance to take a guided tour through the attack and defense strategy of each side, to gain understanding and essential takeaways that prepare you and your organization to orchestrate an effective response to a real-time cyberattack.
This model assumes a mixed audience (e.g. from disparate teams or organizations) of low technical capability. In this model, CISA engineers perform both red (offensive) and blue (defensive) functions and lead a detailed discussion of the primary characteristics of the offensive and recommended defensive methodologies.