idga stats

Using the Evolved Cyber Range to Arm and Train U.S. Warriors to Win Cyber War

This FREE webinar was recorded on:
Tuesday, April 05, 2011
02:00 PM - 03:00 PM EDT
To continue viewing this content please fill out the form below and become an Management member.
Or if you're already a Management member, sign in below to download.
Become a member to Watch

By entering in your information and submitting the form, you give the sponsor permission to contact you regarding their product and you agree to our User Agreement, Privacy Policy, and Cookie Policy.

Sponsor:
Using the Evolved Cyber Range to Arm and Train U.S. Warriors to Win Cyber War

How are military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and Northrop Grumman (U.S. and U.K.) deploying cyber range technology? What are these organizations doing to develop the expertise of personnel and then equipping them with the advanced tools needed to fulfill cyber security missions?

Join BreakingPoint Systems, the global leader in cyber range technology, and learn how U.S. government and military can properly train personnel with the skills to defend against cyber terrorism, espionage, and theft of intellectual property.

Listen to the best practice case studies of DISA, EUCOM, and Northrop Grumman as they use the latest technology and establish a turnkey system to deliver a complete, scalable, and operational cyber range.

Learn how to use technology to simulate Internet-scale cyber war conditions in a controlled environment in order to establish IT certification methods and curriculum needed for assessing, training, and qualifying cyber warrior personnel.

After attending this webinar you will know how to:

  • Deploy and use a modern cyber range machine to create an operationally relevant environment that precisely mirrors the Global Information Grid (GIG), enabling sophisticated simulation of real-world cyber conditions
  • Optimize and harden the resiliency—the performance, stability, and security—of next-generation deep packet inspection (DPI) devices to carry out effective Lawful Intercept programs and related missions
  • Model and research advanced cyber threats including Stuxnet and botnet-driven distributed denial of service (DDoS) attacks
  • Implement a scalable approach for training and certifying cyber warriors in critical Information Assurance (IA), Information Operations (IO), and Mission Assurance (MA) skills.
  • Establish centralized command and control to monitor and manage a distributed network of remote cyber ranges

View the whitepaper

Presenter:

Scott Register
Director of Product Management
BreakingPoint Systems, Inc.

BreakingPoint Systems has delivered cyber range devices to the world’s largest enterprises and government agencies and are already operational in military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and major contractors including Northrop Grumman (U.S. and U.K.) and many others.

As the Director of Product Management, Scott Register helps direct the development and introduction of BreakingPoint’s breakthrough cyber range technologies. Working directly with BreakingPoint’s global list of customers, Scott manages the introduction of the latest cyber range products and services.