SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
VP, Federal Sales,
VMware
@vmwaregov
Confidential │ ©2019 VMware, Inc.
VMware Digital Learning PlatformTM :
Cyber Range Solution
Accelerating Productivity through a Digital Learning
Experience
Bill Rowan
VP, Federal
October 2019
Confidential │ ©2019 VMware, Inc.
Many innovators had a hand in shaping the
cloud, but probably none were more important
than the small band of technologists – Diane
Greene, Mendel Rosenblum, Scott Devine, Ellen
Wang, and Eduard Bugnion – who in 1998
created VMware, the unique software program
referenced above which went public in 2007.
Without VMware there could be no
cloud…Why?...
~Thomas Friedman
Confidential │ ©2019 VMware, Inc.
Technology
Good Badand
amplifies human behavior…
:
or ?.
Confidential │ ©2019 VMware, Inc.
Tech as a Force For Good
Confidential │ ©2019 VMware, Inc. 5
Confidential │ ©2019 VMware, Inc.
ENGINEERING FOR GOODREQUIRES
GOOD ENGINEERING
ENGINEERING FOR GOOD
Confidential │ ©2019 VMware, Inc.
Cyber Crime at
Scale
Disinformation
at Scale
Privacy
at Risk
The Law of
Unintended Consequences
“We’re going to
give you free apps and
services that enhance
your life.”
“We’re going to bring
communities
together online.”
“We’re going
to use blockchain to
promote
transparency and
inclusion.”
Confidential │ ©2019 VMware, Inc.
There’s never been a more exciting time
to be a technologist.
Confidential │ ©2019 VMware, Inc. 8
Confidential │ ©2019 VMware, Inc.
Edge Computing
Hybrid Clouds
Public
Clouds
Art of the Possible > Mission Optimized, Software-Defined Digital Foundation
VMware Vision for a Mission-Driven Cloud
Consistent
Infrastructure
Consistent
Operations
Intrinsic
Security
Josh Townsend May 2019
ANY DEVICE
ANY APPLICATION
ANY CLOUD
Community
Cloud
Global Reach
Mission Optimized, Software Defined Digital Foundation
ML AI Blockchain
Future
Public Clouds
Tactical Edge
Clouds
Confidential │ ©2019 VMware, Inc.
Impacts to the Economy, Social, Health and Government Cyber Landscape
Improving Organization’s Cyber Security Posture
Introduction
Top Types of Cyber Attacks
• Denial-of-service (DoS)
• (DDoS) attacks
• Man-in-the-middle
(MitM) attack
• Phishing and spear
phishing attacks
• Drive-by attack
• Password attack
• SQL injection attack
• Cross-site scripting (XSS)
attack
• Eavesdropping attack
$2.4 million average cost
of a malware attack
Damage related to
cybercrime is projected to
hit $6 trillion annually by
2021
The damage from hacks
costs businesses $400
billion a year
5.4 billion attacks by the
WannaCry virus were
blocked
400,000 machines were
infected by the Wannacry
costing $4 billion to
remediate
Ransomware attacks
occur every 14 seconds
Ransomware attacks to
increase 5X by 2021
24,000 malicious mobile
apps are blocked every
day
Root Causes
• 48% malicious or criminal attacks
• 27% human error
• 25% IT and business process failures
Readiness
How to prepare you team and
infrastructure against Cyber Attacks?
Response
When an attack occurs what do we do
to stop?
Recovery
How do we address vulnerabilities?
Resiliency
How do you mitigate impacts of future
attacks?
Cyber Strategies
Confidential │ ©2019 VMware, Inc.
Defining the Value
What and Why a Cyber Range?
Cyber Threats
•High Risk to “live”
infrastructure
•Rapid Change
•Highly Complex
•Illegal in the wild
Cyber-workers
•Need diverse, realistic, real-
world and real-time
environments
•Need experience working
together to improve teamwork
and enhance team capabilities
Target
Environments
•Difficult or cost prohibitive to
duplicate
•Can be damaged or
permanently compromised
•Simulation is difficult or
impossible
Introduction
By 2022, 15% of large enterprises will be
using cyber ranges to develop the skills of
their security teams, up from less than 1%
today.
~Source: Gartner
A cyber range is a simulation platform that
enables cybersecurity teams to train and
develop cybersecurity expertise and manage
workforce planning.
~Source: Gartner
Image Source: redballon.com
Confidential │ ©2019 VMware, Inc.
• Static Cyber Learning
• Hands-on Lab Learning
• Vulnerability Research
• Exploitation
• Operating Systems Internals
• Exercise Expansion
• Production Network
Simulation
• Evolving Deployment Models
• Exercise Blueprint Library
Cyber Range Baseline Simulated Environments
• Dynamic Environments
• Red Team/Blue Team
• Capture-the-Flag
• Industrial Control Systems
Integration
Dynamic Exercises
Developing and Evolving Cyber Range Competencies
Cyber Range Use Cases
V a r y i n g M a t u r i t y & E v o l v i n g C y b e r R a n g e U s e C a s e s
Use Cases
Confidential │ ©2019 VMware, Inc.
Digital Learning Platform
Cyber Range Solution
On/Off-Prem Simulated
Enterprise Network Environment
VMware Digital Learning Platform & Cyber Range Solution
Introducing the VMware Cyber Range Solution
Introduction
Cybergaming, Blueprints, Consulting &
Operations
Improved Cyber Posture
Solutions & Innovations
V a l u e – S i m p l i c i t y - S c a l e - S e r v i c e s
ü Market & Customer Specific Solutions
ü Speed-and-Scale-to-Market
ü Consistent & Validated Platforms
Confidential │ ©2019 VMware, Inc.
Consistency, Security, Agility Across Cyber Modalities
VMware Cyber Range Solution
Consistent Digital Learning Platform Control Plane
Automation and Operations • Across Clouds
Consistent Infrastructure
VM Infrastructure • Container Infrastructure
Consistent Cyber Instructor and Worker Experience
CyberRangeSolution Solution Overview
Exercise Elements
Exercise Expansion
Vulnerability Research
Operating System Internals
Exploitation
Industrial Control System Security
Confidential │ ©2019 VMware, Inc.
The Cyber Maturity Builder TM offers a full range of skill-development challenges, meeting customers’
cyber maturity from “Foundational” to “Advanced”
Initial range content offerings
Maturity Model
Common
Exploit
Discovery
Common
Vulnerabilities
andAttacks
DataExfiltration
andDiscoveryLevel 1
Level 2
Level 3
Intermediate
Exploitationand
Discovery
Moderate
Vulnerabilitiesand
Attacks
DataExfiltration
andDiscovery
Level 1
Level 2
Level 3
Sophisticated
ExploitationDiscoveryand
Response
Sophisticated
VulnerabilityandAttacks
HighlySophisticated
DataExfiltration
Level 1
Level 2
Level 3
Skillset
Maturity
Cyber Maturity Model
Confidential │ ©2019 VMware, Inc.
Defining Benefits, Advantages, & Efficiencies
Cyber Range Solution Value
Solutions & Innovations
Cyber Range Solution
Readiness.
Response.
Recovery.
Resiliency.
E n h a n c e C y b e r s e c u r i t y P o s t u r e D e v e l o p C y b e r S e c u r i t y P r o f e s s i o n a l s
Integration
Flexibility to integrate with external
environments (e.g. cloud) and devices
(e.g. IoT, SCADA, ICS, etc.)
Learning Content
Platform for Classroom Learning,
Personal Assessment, & Certification;
develop Cybersecurity Professionals
Assess
Capability to monitor, report, and grade
Cyber exercises through
internal/external monitoring tools
Exercise &
Competitions
Host Cyber learning: static content,
exercise & competition, and simulated
environments
Segmented &
Secure
Segmented infrastructure platform to
simulate and test elements of Cyber
warfare not authorized for enterprise/
production networks
Network
Simulation
Simulate network architecture, traffic,
and services (e.g. topologies, patterns,
and web/app/e-mail)
Automation
Ability to automate the deployment of
networks and environments for Cyber
Range exercises and events
Testing &
Preparation
Utilize for Cyber Security testing of
application development and pre-
production release simulation
Value Wheel
Confidential │ ©2019 VMware, Inc.
VMware Cyber Range
Where are we showcasing?
October 11, 2019
Capture the Flag Competition: During this session,
participants will be provided a simulated
environment to conduct cyber game activities. Hunt
for security vulnerabilities in a system.
October 2019
Cyber Maturity Builder &
Howdy Neighbor/ICS Village Capture the Flag
Exercises
2019 Annual
Cyber Awareness Symposium
October 2019
Rapid Prototyping Event:
Riot in the Factory
Showcases
Confidential │ ©2019 VMware, Inc.
Edge Computing
Hybrid Clouds
Public
Clouds
Art of the Possible > Mission Optimized, Software-Defined Digital Foundation
VMware Vision for a Mission-Driven Cloud
Consistent
Infrastructure
Consistent
Operations
Intrinsic
Security
Josh Townsend May 2019
ANY DEVICE
ANY APPLICATION
ANY CLOUD
Community
Cloud
Global Reach
Mission Optimized, Software Defined Digital Foundation
ML AI Blockchain
Future
Public Clouds
Tactical Edge
Clouds
Confidential │ ©2019 VMware, Inc.
Thank You
WASHINGTON DC

Más contenido relacionado

La actualidad más candente

The Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiThe Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS Lebowski
QAware GmbH
 

La actualidad más candente (20)

DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - Twistlock
 
DevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it WorkDevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it Work
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Enterprise Cloud Native is the New Normal
Enterprise Cloud Native is the New NormalEnterprise Cloud Native is the New Normal
Enterprise Cloud Native is the New Normal
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no try
 
The Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiThe Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS Lebowski
 
Cloud-native Data
Cloud-native DataCloud-native Data
Cloud-native Data
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
Software Architecture Conference - Monitoring Microservices - A Challenge
Software Architecture Conference -  Monitoring Microservices - A ChallengeSoftware Architecture Conference -  Monitoring Microservices - A Challenge
Software Architecture Conference - Monitoring Microservices - A Challenge
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 

Similar a Enhancing your Cyber Skills through a Cyber Range

Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
 

Similar a Enhancing your Cyber Skills through a Cyber Range (20)

Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
SAP Concur’s Cloud Journey
SAP Concur’s Cloud JourneySAP Concur’s Cloud Journey
SAP Concur’s Cloud Journey
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
 
Incident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Incident Response: Eyes Everywhere - AWS Security Week at the SF LoftIncident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Incident Response: Eyes Everywhere - AWS Security Week at the SF Loft
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 

Más de scoopnewsgroup

Más de scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
 
The Key to Innovation: Happy, Engaged, Valued Employees
The Key to Innovation: Happy, Engaged, Valued EmployeesThe Key to Innovation: Happy, Engaged, Valued Employees
The Key to Innovation: Happy, Engaged, Valued Employees
 

Último

Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
ScottMeyers35
 
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
HyderabadDolls
 

Último (20)

Bhubaneswar Call Girls Patia 👉👉 9777949614 Top Class Call Girl Service Avai...
Bhubaneswar Call Girls Patia  👉👉 9777949614  Top Class Call Girl Service Avai...Bhubaneswar Call Girls Patia  👉👉 9777949614  Top Class Call Girl Service Avai...
Bhubaneswar Call Girls Patia 👉👉 9777949614 Top Class Call Girl Service Avai...
 
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s education
 
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
Fun all Day Call Girls in Erode { 9332606886 } VVIP NISHA Call Girls Near 5 S...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort ServicePremium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
 
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
Nagerbazar @ Independent Call Girls Kolkata - 450+ Call Girl Cash Payment 800...
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery ServiceWomen Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
 
Call Girl Service in West Tripura 9332606886Call Girls Advance Cash On Deliv...
Call Girl Service in West Tripura  9332606886Call Girls Advance Cash On Deliv...Call Girl Service in West Tripura  9332606886Call Girls Advance Cash On Deliv...
Call Girl Service in West Tripura 9332606886Call Girls Advance Cash On Deliv...
 
Call Girl In Prayagraj Call Girls Service 👉 6378878445 👉 Just📲 Call Ruhi Call...
Call Girl In Prayagraj Call Girls Service 👉 6378878445 👉 Just📲 Call Ruhi Call...Call Girl In Prayagraj Call Girls Service 👉 6378878445 👉 Just📲 Call Ruhi Call...
Call Girl In Prayagraj Call Girls Service 👉 6378878445 👉 Just📲 Call Ruhi Call...
 

Enhancing your Cyber Skills through a Cyber Range

  • 2. Confidential │ ©2019 VMware, Inc. VMware Digital Learning PlatformTM : Cyber Range Solution Accelerating Productivity through a Digital Learning Experience Bill Rowan VP, Federal October 2019
  • 3. Confidential │ ©2019 VMware, Inc. Many innovators had a hand in shaping the cloud, but probably none were more important than the small band of technologists – Diane Greene, Mendel Rosenblum, Scott Devine, Ellen Wang, and Eduard Bugnion – who in 1998 created VMware, the unique software program referenced above which went public in 2007. Without VMware there could be no cloud…Why?... ~Thomas Friedman
  • 4. Confidential │ ©2019 VMware, Inc. Technology Good Badand amplifies human behavior… : or ?.
  • 5. Confidential │ ©2019 VMware, Inc. Tech as a Force For Good Confidential │ ©2019 VMware, Inc. 5
  • 6. Confidential │ ©2019 VMware, Inc. ENGINEERING FOR GOODREQUIRES GOOD ENGINEERING ENGINEERING FOR GOOD
  • 7. Confidential │ ©2019 VMware, Inc. Cyber Crime at Scale Disinformation at Scale Privacy at Risk The Law of Unintended Consequences “We’re going to give you free apps and services that enhance your life.” “We’re going to bring communities together online.” “We’re going to use blockchain to promote transparency and inclusion.”
  • 8. Confidential │ ©2019 VMware, Inc. There’s never been a more exciting time to be a technologist. Confidential │ ©2019 VMware, Inc. 8
  • 9. Confidential │ ©2019 VMware, Inc. Edge Computing Hybrid Clouds Public Clouds Art of the Possible > Mission Optimized, Software-Defined Digital Foundation VMware Vision for a Mission-Driven Cloud Consistent Infrastructure Consistent Operations Intrinsic Security Josh Townsend May 2019 ANY DEVICE ANY APPLICATION ANY CLOUD Community Cloud Global Reach Mission Optimized, Software Defined Digital Foundation ML AI Blockchain Future Public Clouds Tactical Edge Clouds
  • 10. Confidential │ ©2019 VMware, Inc. Impacts to the Economy, Social, Health and Government Cyber Landscape Improving Organization’s Cyber Security Posture Introduction Top Types of Cyber Attacks • Denial-of-service (DoS) • (DDoS) attacks • Man-in-the-middle (MitM) attack • Phishing and spear phishing attacks • Drive-by attack • Password attack • SQL injection attack • Cross-site scripting (XSS) attack • Eavesdropping attack $2.4 million average cost of a malware attack Damage related to cybercrime is projected to hit $6 trillion annually by 2021 The damage from hacks costs businesses $400 billion a year 5.4 billion attacks by the WannaCry virus were blocked 400,000 machines were infected by the Wannacry costing $4 billion to remediate Ransomware attacks occur every 14 seconds Ransomware attacks to increase 5X by 2021 24,000 malicious mobile apps are blocked every day Root Causes • 48% malicious or criminal attacks • 27% human error • 25% IT and business process failures Readiness How to prepare you team and infrastructure against Cyber Attacks? Response When an attack occurs what do we do to stop? Recovery How do we address vulnerabilities? Resiliency How do you mitigate impacts of future attacks? Cyber Strategies
  • 11. Confidential │ ©2019 VMware, Inc. Defining the Value What and Why a Cyber Range? Cyber Threats •High Risk to “live” infrastructure •Rapid Change •Highly Complex •Illegal in the wild Cyber-workers •Need diverse, realistic, real- world and real-time environments •Need experience working together to improve teamwork and enhance team capabilities Target Environments •Difficult or cost prohibitive to duplicate •Can be damaged or permanently compromised •Simulation is difficult or impossible Introduction By 2022, 15% of large enterprises will be using cyber ranges to develop the skills of their security teams, up from less than 1% today. ~Source: Gartner A cyber range is a simulation platform that enables cybersecurity teams to train and develop cybersecurity expertise and manage workforce planning. ~Source: Gartner Image Source: redballon.com
  • 12. Confidential │ ©2019 VMware, Inc. • Static Cyber Learning • Hands-on Lab Learning • Vulnerability Research • Exploitation • Operating Systems Internals • Exercise Expansion • Production Network Simulation • Evolving Deployment Models • Exercise Blueprint Library Cyber Range Baseline Simulated Environments • Dynamic Environments • Red Team/Blue Team • Capture-the-Flag • Industrial Control Systems Integration Dynamic Exercises Developing and Evolving Cyber Range Competencies Cyber Range Use Cases V a r y i n g M a t u r i t y & E v o l v i n g C y b e r R a n g e U s e C a s e s Use Cases
  • 13. Confidential │ ©2019 VMware, Inc. Digital Learning Platform Cyber Range Solution On/Off-Prem Simulated Enterprise Network Environment VMware Digital Learning Platform & Cyber Range Solution Introducing the VMware Cyber Range Solution Introduction Cybergaming, Blueprints, Consulting & Operations Improved Cyber Posture Solutions & Innovations V a l u e – S i m p l i c i t y - S c a l e - S e r v i c e s ü Market & Customer Specific Solutions ü Speed-and-Scale-to-Market ü Consistent & Validated Platforms
  • 14. Confidential │ ©2019 VMware, Inc. Consistency, Security, Agility Across Cyber Modalities VMware Cyber Range Solution Consistent Digital Learning Platform Control Plane Automation and Operations • Across Clouds Consistent Infrastructure VM Infrastructure • Container Infrastructure Consistent Cyber Instructor and Worker Experience CyberRangeSolution Solution Overview Exercise Elements Exercise Expansion Vulnerability Research Operating System Internals Exploitation Industrial Control System Security
  • 15. Confidential │ ©2019 VMware, Inc. The Cyber Maturity Builder TM offers a full range of skill-development challenges, meeting customers’ cyber maturity from “Foundational” to “Advanced” Initial range content offerings Maturity Model Common Exploit Discovery Common Vulnerabilities andAttacks DataExfiltration andDiscoveryLevel 1 Level 2 Level 3 Intermediate Exploitationand Discovery Moderate Vulnerabilitiesand Attacks DataExfiltration andDiscovery Level 1 Level 2 Level 3 Sophisticated ExploitationDiscoveryand Response Sophisticated VulnerabilityandAttacks HighlySophisticated DataExfiltration Level 1 Level 2 Level 3 Skillset Maturity Cyber Maturity Model
  • 16. Confidential │ ©2019 VMware, Inc. Defining Benefits, Advantages, & Efficiencies Cyber Range Solution Value Solutions & Innovations Cyber Range Solution Readiness. Response. Recovery. Resiliency. E n h a n c e C y b e r s e c u r i t y P o s t u r e D e v e l o p C y b e r S e c u r i t y P r o f e s s i o n a l s Integration Flexibility to integrate with external environments (e.g. cloud) and devices (e.g. IoT, SCADA, ICS, etc.) Learning Content Platform for Classroom Learning, Personal Assessment, & Certification; develop Cybersecurity Professionals Assess Capability to monitor, report, and grade Cyber exercises through internal/external monitoring tools Exercise & Competitions Host Cyber learning: static content, exercise & competition, and simulated environments Segmented & Secure Segmented infrastructure platform to simulate and test elements of Cyber warfare not authorized for enterprise/ production networks Network Simulation Simulate network architecture, traffic, and services (e.g. topologies, patterns, and web/app/e-mail) Automation Ability to automate the deployment of networks and environments for Cyber Range exercises and events Testing & Preparation Utilize for Cyber Security testing of application development and pre- production release simulation Value Wheel
  • 17. Confidential │ ©2019 VMware, Inc. VMware Cyber Range Where are we showcasing? October 11, 2019 Capture the Flag Competition: During this session, participants will be provided a simulated environment to conduct cyber game activities. Hunt for security vulnerabilities in a system. October 2019 Cyber Maturity Builder & Howdy Neighbor/ICS Village Capture the Flag Exercises 2019 Annual Cyber Awareness Symposium October 2019 Rapid Prototyping Event: Riot in the Factory Showcases
  • 18. Confidential │ ©2019 VMware, Inc. Edge Computing Hybrid Clouds Public Clouds Art of the Possible > Mission Optimized, Software-Defined Digital Foundation VMware Vision for a Mission-Driven Cloud Consistent Infrastructure Consistent Operations Intrinsic Security Josh Townsend May 2019 ANY DEVICE ANY APPLICATION ANY CLOUD Community Cloud Global Reach Mission Optimized, Software Defined Digital Foundation ML AI Blockchain Future Public Clouds Tactical Edge Clouds
  • 19. Confidential │ ©2019 VMware, Inc. Thank You