SlideShare a Scribd company logo
2
Most read
4
Most read
8
Most read
Cyber Ranges
A New Approach to Security
Chad Holmes, Product Marketing Manager
About Security Innovation
● For over 15 years, we have been securing or helping secure
software in the toughest environments:
● Application Security Expertise:
○ 15 years research on vulnerabilities
○ Security testing methodology adopted by SAP, Symantec, Microsoft, and McAfee
○ Authors of 18 books; 10 co-authored with Microsoft
● Over 2 million licensed users of our training solutions
● Gartner MQ leader
What is a Cyber Range?
• Simulated environment for training and development
• More immersive experiences than other types of training
• Traditional focus on Infrastructure, Network, OS
• New Trend: Application Layer
• Often begin as ad hoc or organizational projects
• Increasing interest and adoption in public and private
sectors
CMD+CTRL Cyber Range Background
• Customer asked to help improve security skill sets
• Goals
• Provide immersive hacking experience
• Focus on security and engineering teams
• Exploit vulnerabilities they were learning about
• Make more lifelike than products currently available
• User experience matters!
• Hands-on Hacking + Simulation + Engaging Experience
What Does That Look Like?
Remote
Access
Detailed
Reports
Remediation
eLearning
available
Multiple
Authentic
App Sites
Real time
scoring
Scalable to
hundreds
in minutes
CMD+CTRL
Results to Date
• First commercial version of cyber range delivered mid 2016
• 100+ companies/orgs participated to date
• Growth to 7 sites/apps based on feedback
• Self service community site coming soon!
• Trends emerging that security leadership can learn from –
both challenges and findings
• More details at
https://www.securityinnovation.com/training/hackathon
Cyber Ranges: A New Approach to Security
Finding Talent
• Security is difficult and intimidating to break into
• Many barriers to entry
• Education
• Available training
• Experience
• Security talent is (justifiably) expensive!
• Greener pastures everywhere
• Measuring and assessing skills often anecdotal
Training
• CBT – Helpful and necessary, but understandable limits
• ILT – Very useful, but expensive and point in time
• Self taught/ad hoc – Error prone and unrepeatable
• Efficient training is hard
• Hard: Accurately assessing skills
• Harder: Specific training to improve and solidify skills
• Hardest: Pointed training roadmap based on assessed skills
and courses available
Team Structure
• Constantly open headcount
• Overworked team still can’t cover everything being asked of
them
• Ongoing worry about turnover and attrition
• Hiring in talent is expensive (and worth every cent)
• And still, measuring skill sets and areas to improve often
becomes anecdotal and unscientific
Findings
What We Got Right!
• Engaging experience is a must
• UI/UX, live events, diverse skill sets involved
• Easy to start, hard to complete
• Embrace the cloud
• Healthy competition
• Moderated events
• Guidance – planned and on-demand
Surprises
• Breadth of users
• Executives, HR, Engineering, Marketing
• Speeding ramp up
• Building a security skills pipeline
• Champion identification
• Don’t steal talent, expand it
Side Benefits
• Improved skills measurement
• Informed training
• Demystification of hacking culture
• Building of team camaraderie (aka, fun!)
Factors Driving Cyber Range Adoption
• Larger talent funnel needed
• Security is hot, but still difficult to break into
• Some courses and websites, but no clear training path
• Expanding and clarifying offerings will improve industry
• Passion is a double edged sword
• Security can be intimidating
• Big subject + big risk + big personalities
• How do we share passion and welcome n00bs?
Early Takeaways
• We can all act on these
• Provide earlier stage immersive experience
• Both for training and vetting skills
• Clarify entry ways into security fields
• Resources, career paths, community involvement
• Improved measurement
• Validate talent
• Identify hidden talent
• More focused approach to follow up training
Snapshot: Hack Through the Holidays
• Community event to encourage new and experienced alike
• Minimal promotion, great turnout (~500 registrants)
• First perfect score achieved! (48/48 challenges)
• 26% of registrants were Execs, Managers or Directors
• 12% of registrants solved 10+ challenges
• Lessons Learned
• Strong interest among all levels, not just competitive hackers
• Minimize barriers to entry and intimidation factor
• Great community response = similar future events!
• Great community response = identification of rough edges!
What You Can Do
• Explore and challenge these findings – they’re still early
• Reassess training and how Cyber Ranges may fit in
• Discuss/Try Cyber Ranges with your team
• Contact us
• getsecure@securityinnovation.com
• https://securityinnovation.com
• Chad Holmes (cholmes@securityinnovation.com)
Check Out Our Cyber Ranges
Come See LetSee!
• Join us live as we showcase our cyber range suite, including
our newest and most challenging site yet, LetSee.
• May 23rd @ 2pm ET
• Register today: http://bit.ly/ComeSeeLetSee
Questions?
?

More Related Content

PPTX
Assessing System Risk the Smart Way
PPTX
cloud security ppt
PDF
Security OF The Cloud
PPTX
Securing Applications in the Cloud
PDF
Best Practices in Cloud Security
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
PPTX
Shared Security Responsibility for the Azure Cloud
Assessing System Risk the Smart Way
cloud security ppt
Security OF The Cloud
Securing Applications in the Cloud
Best Practices in Cloud Security
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Shared Security Responsibility for the Azure Cloud

What's hot (20)

PDF
Managed Threat Detection & Response for AWS Applications
PDF
The AWS Shared Responsibility Model in Practice
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PDF
AWS Security Best Practices, SaaS and Compliance
PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PPTX
Cloud Security, Risk and Compliance on AWS
PPTX
CSS 17: NYC - Protecting your Web Applications
PPTX
Securing virtual workload and cloud
PDF
CSA SV Threat detection and prediction
PDF
CSS17: Houston - Azure Shared Security Model Overview
PDF
1. aws security and compliance wwps pre-day sao paolo - markry
PPTX
Cloud Security Training Crash Course
PPT
Cloud Security Alliance's GRC Stack Overview
PDF
Azure 101: Shared responsibility in the Azure Cloud
PDF
Securing Healthcare Data on AWS for HIPAA
PPTX
Venom vulnerability Overview and a basic demo
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PDF
Protecting Against Web App Attacks
PPTX
Azure Security Center
Managed Threat Detection & Response for AWS Applications
The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
AWS Security Best Practices, SaaS and Compliance
#ALSummit: Realities of Security in the Cloud
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Cloud Security, Risk and Compliance on AWS
CSS 17: NYC - Protecting your Web Applications
Securing virtual workload and cloud
CSA SV Threat detection and prediction
CSS17: Houston - Azure Shared Security Model Overview
1. aws security and compliance wwps pre-day sao paolo - markry
Cloud Security Training Crash Course
Cloud Security Alliance's GRC Stack Overview
Azure 101: Shared responsibility in the Azure Cloud
Securing Healthcare Data on AWS for HIPAA
Venom vulnerability Overview and a basic demo
CSS 17: NYC - Building Secure Solutions in AWS
Protecting Against Web App Attacks
Azure Security Center
Ad

Similar to Cyber Ranges: A New Approach to Security (20)

PPTX
A Fresh, New Look for CMD+CTRL Cyber Range
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
PDF
Preparing for a New Career in Cyber - Pulsedive
PPTX
The Future of Cybersecurity - October 2015
PPTX
Cyberskills shortage: Where is the cyber workforce of tomorrow
PDF
Cybersecurity Talent : The Big Gap in Cyber Protection
PDF
Building Security Teams
PDF
Enhancing your Cyber Skills through a Cyber Range
PDF
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
PPTX
Upskilling your engineers in Cyber security while they WFH
PPTX
I hack you hack we all hack
PDF
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
PDF
Cyber security course in Trivandrum.ppt.
PDF
GAM 2021 - Aligning Audits with Leadership Cybersecurity Questions.pdf
PPTX
So you wanna be a pentester - free webinar to show you how
PPTX
NZISF Talk: Six essential security services
PPTX
Empower Business by Filling Gap of Cyber Security Skills
A Fresh, New Look for CMD+CTRL Cyber Range
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Preparing for a New Career in Cyber - Pulsedive
The Future of Cybersecurity - October 2015
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cybersecurity Talent : The Big Gap in Cyber Protection
Building Security Teams
Enhancing your Cyber Skills through a Cyber Range
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
Upskilling your engineers in Cyber security while they WFH
I hack you hack we all hack
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Cyber security course in Trivandrum.ppt.
GAM 2021 - Aligning Audits with Leadership Cybersecurity Questions.pdf
So you wanna be a pentester - free webinar to show you how
NZISF Talk: Six essential security services
Empower Business by Filling Gap of Cyber Security Skills
Ad

More from Security Innovation (20)

PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
PPTX
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
PPTX
Protecting Sensitive Data (and be PCI Compliant too!)
PDF
5 Ways To Train Security Champions
PPTX
Aligning Application Security to Compliance
PPTX
How to Hijack a Pizza Delivery Robot with Injection Flaws
PPTX
How an Attacker "Audits" Your Software Systems
PPTX
Opening the Talent Spigot to Securing our Digital Future
PDF
Slashing Your Cloud Risk: 3 Must-Do's
PPTX
Security Testing for IoT Systems
PPTX
Is Blockchain Right for You? The Million Dollar Question
PPTX
Privacy: The New Software Development Dilemma
PPTX
Privacy Secrets Your Systems May Be Telling
PPTX
Secure DevOps - Evolution or Revolution?
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PDF
GDPR: The Application Security Twist
PDF
The New OWASP Top Ten: Let's Cut to the Chase
PPTX
How to Test for The OWASP Top Ten
PPTX
HTML5 - The Promise & The Peril
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Protecting Sensitive Data (and be PCI Compliant too!)
5 Ways To Train Security Champions
Aligning Application Security to Compliance
How to Hijack a Pizza Delivery Robot with Injection Flaws
How an Attacker "Audits" Your Software Systems
Opening the Talent Spigot to Securing our Digital Future
Slashing Your Cloud Risk: 3 Must-Do's
Security Testing for IoT Systems
Is Blockchain Right for You? The Million Dollar Question
Privacy: The New Software Development Dilemma
Privacy Secrets Your Systems May Be Telling
Secure DevOps - Evolution or Revolution?
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Threat Modeling - Locking the Door to Vulnerabilities
GDPR: The Application Security Twist
The New OWASP Top Ten: Let's Cut to the Chase
How to Test for The OWASP Top Ten
HTML5 - The Promise & The Peril

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf

Cyber Ranges: A New Approach to Security

  • 1. Cyber Ranges A New Approach to Security Chad Holmes, Product Marketing Manager
  • 2. About Security Innovation ● For over 15 years, we have been securing or helping secure software in the toughest environments: ● Application Security Expertise: ○ 15 years research on vulnerabilities ○ Security testing methodology adopted by SAP, Symantec, Microsoft, and McAfee ○ Authors of 18 books; 10 co-authored with Microsoft ● Over 2 million licensed users of our training solutions ● Gartner MQ leader
  • 3. What is a Cyber Range? • Simulated environment for training and development • More immersive experiences than other types of training • Traditional focus on Infrastructure, Network, OS • New Trend: Application Layer • Often begin as ad hoc or organizational projects • Increasing interest and adoption in public and private sectors
  • 4. CMD+CTRL Cyber Range Background • Customer asked to help improve security skill sets • Goals • Provide immersive hacking experience • Focus on security and engineering teams • Exploit vulnerabilities they were learning about • Make more lifelike than products currently available • User experience matters! • Hands-on Hacking + Simulation + Engaging Experience
  • 5. What Does That Look Like? Remote Access Detailed Reports Remediation eLearning available Multiple Authentic App Sites Real time scoring Scalable to hundreds in minutes CMD+CTRL
  • 6. Results to Date • First commercial version of cyber range delivered mid 2016 • 100+ companies/orgs participated to date • Growth to 7 sites/apps based on feedback • Self service community site coming soon! • Trends emerging that security leadership can learn from – both challenges and findings • More details at https://www.securityinnovation.com/training/hackathon
  • 8. Finding Talent • Security is difficult and intimidating to break into • Many barriers to entry • Education • Available training • Experience • Security talent is (justifiably) expensive! • Greener pastures everywhere • Measuring and assessing skills often anecdotal
  • 9. Training • CBT – Helpful and necessary, but understandable limits • ILT – Very useful, but expensive and point in time • Self taught/ad hoc – Error prone and unrepeatable • Efficient training is hard • Hard: Accurately assessing skills • Harder: Specific training to improve and solidify skills • Hardest: Pointed training roadmap based on assessed skills and courses available
  • 10. Team Structure • Constantly open headcount • Overworked team still can’t cover everything being asked of them • Ongoing worry about turnover and attrition • Hiring in talent is expensive (and worth every cent) • And still, measuring skill sets and areas to improve often becomes anecdotal and unscientific
  • 12. What We Got Right! • Engaging experience is a must • UI/UX, live events, diverse skill sets involved • Easy to start, hard to complete • Embrace the cloud • Healthy competition • Moderated events • Guidance – planned and on-demand
  • 13. Surprises • Breadth of users • Executives, HR, Engineering, Marketing • Speeding ramp up • Building a security skills pipeline • Champion identification • Don’t steal talent, expand it
  • 14. Side Benefits • Improved skills measurement • Informed training • Demystification of hacking culture • Building of team camaraderie (aka, fun!)
  • 15. Factors Driving Cyber Range Adoption • Larger talent funnel needed • Security is hot, but still difficult to break into • Some courses and websites, but no clear training path • Expanding and clarifying offerings will improve industry • Passion is a double edged sword • Security can be intimidating • Big subject + big risk + big personalities • How do we share passion and welcome n00bs?
  • 16. Early Takeaways • We can all act on these • Provide earlier stage immersive experience • Both for training and vetting skills • Clarify entry ways into security fields • Resources, career paths, community involvement • Improved measurement • Validate talent • Identify hidden talent • More focused approach to follow up training
  • 17. Snapshot: Hack Through the Holidays • Community event to encourage new and experienced alike • Minimal promotion, great turnout (~500 registrants) • First perfect score achieved! (48/48 challenges) • 26% of registrants were Execs, Managers or Directors • 12% of registrants solved 10+ challenges • Lessons Learned • Strong interest among all levels, not just competitive hackers • Minimize barriers to entry and intimidation factor • Great community response = similar future events! • Great community response = identification of rough edges!
  • 18. What You Can Do • Explore and challenge these findings – they’re still early • Reassess training and how Cyber Ranges may fit in • Discuss/Try Cyber Ranges with your team • Contact us • getsecure@securityinnovation.com • https://securityinnovation.com • Chad Holmes (cholmes@securityinnovation.com)
  • 19. Check Out Our Cyber Ranges Come See LetSee! • Join us live as we showcase our cyber range suite, including our newest and most challenging site yet, LetSee. • May 23rd @ 2pm ET • Register today: http://bit.ly/ComeSeeLetSee