SecurityWeek is happy to be partnering with LEO Cyber Security to offer a half-day Red Team/Blue Team ICS Cyber Security Training workshop at SecurityWeek’s 2018 ICS Cyber Security Conference. The workshop will take place on Monday, October 22 and is available as an option for conference attendees. (Registration available here)
What is Red Team/Blue Team Training?
Security aware and knowledgeable users serve as the “front line” of your overall security posture. As such, training is one of the most essential components of your risk mitigation strategy and overall cybersecurity program. However, without learning cybersecurity from the “hacker’s” perspective and gaining a true understanding of how adversaries attack and compromise ICS networks and assets, you’re only getting half of the picture. Without that other half, you’re essentially blindly deploying generic security controls and “best practices”. In order to have an efficient and cost-effective risk mitigation strategy, you must understand not only where your vulnerabilities are, but also the tactics that attackers will use to exploit these vulnerabilities. Red Team/Blue Team Training provides the opportunity to learn these adversarial tactics in conjunction with the defensive methods; and then students get to apply the skills they learn as they face off in a head-to-head competition, Blue Team (the defenders) against Red Team (the attackers).
Traditionally, Red Team/Blue Team Training has been a significant time commitment, often upwards of five days. Obviously, this can be taxing on those with constrained schedules and budgets. LEO’s Red Team/Blue Team Training uses cutting edge computer gaming technology, ThreatGENTM, developed by authors of “Hacking Exposed: Industrial Control Systems”, to offer all of the best aspects of Red Team/Blue Team Training, but in a fraction of the time and without a technical learning curve. Students of all levels can even play the part of the Red Team, regardless of experience or skill level.
In the end, students will learn that defending their ICS networks and assets is more than simply deploying “best practices” and “layered defense”. By applying the skills they learn against a live opponent who is strategizing against them, they learn how to create targeted defensive strategies and respond and adapt to active attacks.
What You Will Get Out of This Class:
- Learn and apply practical industrial cyber security concepts
- Learn vulnerabilities and attack vectors specific to industrial control systems
- Learn the methods and strategies hackers use to attack industrial control systems as well as traditional IT systems
- Learn how to deploy efficient and cost-effective mitigation strategies and security controls
- Learn how to build a complete cyber security program
- Apply what you’ve learned against a live adversary using the cutting edge, turn-based computer training simulation/game, ThreatGENTM
- Learn how to respond to, adapt, and defend against active attacks
- Participate as the blue team and the red team, regardless of experience or technical skill level
This half-day workshop is available as an option at SecurityWeek’s 2018 ICS Cyber Security Conference. (Register Here)