Using the Evolved Cyber Range to Arm and Train U.S. Warriors to Win Cyber War

This FREE webinar was recorded on:
Tuesday, April 5, 2011,
2:00 PM - 3:00 PM ET

Sign Up for Webinar
Sponsor:


How are military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and Northrop Grumman (U.S. and U.K.) deploying cyber range technology? What are these organizations doing to develop the expertise of personnel and then equipping them with the advanced tools needed to fulfill cyber security missions?

Join BreakingPoint Systems, the global leader in cyber range technology, and learn how U.S. government and military can properly train personnel with the skills to defend against cyber terrorism, espionage, and theft of intellectual property.

Listen to the best practice case studies of DISA, EUCOM, and Northrop Grumman as they use the latest technology and establish a turnkey system to deliver a complete, scalable, and operational cyber range.

Learn how to use technology to simulate Internet-scale cyber war conditions in a controlled environment in order to establish IT certification methods and curriculum needed for assessing, training, and qualifying cyber warrior personnel.

After attending this webinar you will know how to:

  • Deploy and use a modern cyber range machine to create an operationally relevant environment that precisely mirrors the Global Information Grid (GIG), enabling sophisticated simulation of real-world cyber conditions
  • Optimize and harden the resiliency—the performance, stability, and security—of next-generation deep packet inspection (DPI) devices to carry out effective Lawful Intercept programs and related missions
  • Model and research advanced cyber threats including Stuxnet and botnet-driven distributed denial of service (DDoS) attacks
  • Implement a scalable approach for training and certifying cyber warriors in critical Information Assurance (IA), Information Operations (IO), and Mission Assurance (MA) skills.
  • Establish centralized command and control to monitor and manage a distributed network of remote cyber ranges
     

View the whitepaper


Presenter:

Scott Register

Scott Register
Director of Product Management
BreakingPoint Systems, Inc.

BreakingPoint Systems has delivered cyber range devices to the world’s largest enterprises and government agencies and are already operational in military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and major contractors including Northrop Grumman (U.S. and U.K.) and many others.

As the Director of Product Management, Scott Register helps direct the development and introduction of BreakingPoint’s breakthrough cyber range technologies. Working directly with BreakingPoint’s global list of customers, Scott manages the introduction of the latest cyber range products and services.



By entering in your information and submitting the form, you give the sponsor permission
to contact you regarding their product.


To view this FREE Webinar, register as a IDGA member below..
Or if you're already a IDGA member, Sign in to register.
First Name*
Last Name*
E-mail*
Phone*
Job Title*
Company*
Country
State
Username*
Password*
Retype Password*

comments powered by Disqus

Advertise With Us

Reach IDGA professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
Learn More >>

Join the IDGA Community

Join today and interact with a vibrant network of defence professionals, keeping up to date with the defense industry by accessing our wealth of IDGA articles, videos, live conferences and more.
Sign Up Today!

IDGA, a division of IQPC
2014 All rights reserved. Use of this site constitutes acceptance of our User Agreement and Privacy Policy.
Careers With IQPC | Contact Us | About Us  | Cookie Policy