Using the Evolved Cyber Range to Arm and Train U.S. Warriors to Win Cyber War


This FREE webinar was recorded on:
2011-04-05
02:00 PM - 03:00 PM EST

To view this webinar, please fill out the form to register and become a IDGA member.
Or, if you're already a IDGA member, sign in below to view.

By entering in your information and submitting the form, you give the sponsor permission to contact you regarding their product and you agree to our User Agreement, Privacy Policy, and Cookie Policy.

How are military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and Northrop Grumman (U.S. and U.K.) deploying cyber range technology? What are these organizations doing to develop the expertise of personnel and then equipping them with the advanced tools needed to fulfill cyber security missions?

Join BreakingPoint Systems, the global leader in cyber range technology, and learn how U.S. government and military can properly train personnel with the skills to defend against cyber terrorism, espionage, and theft of intellectual property.

Listen to the best practice case studies of DISA, EUCOM, and Northrop Grumman as they use the latest technology and establish a turnkey system to deliver a complete, scalable, and operational cyber range.

Learn how to use technology to simulate Internet-scale cyber war conditions in a controlled environment in order to establish IT certification methods and curriculum needed for assessing, training, and qualifying cyber warrior personnel.

After attending this webinar you will know how to:

  • Deploy and use a modern cyber range machine to create an operationally relevant environment that precisely mirrors the Global Information Grid (GIG), enabling sophisticated simulation of real-world cyber conditions
  • Optimize and harden the resiliency—the performance, stability, and security—of next-generation deep packet inspection (DPI) devices to carry out effective Lawful Intercept programs and related missions
  • Model and research advanced cyber threats including Stuxnet and botnet-driven distributed denial of service (DDoS) attacks
  • Implement a scalable approach for training and certifying cyber warriors in critical Information Assurance (IA), Information Operations (IO), and Mission Assurance (MA) skills.
  • Establish centralized command and control to monitor and manage a distributed network of remote cyber ranges

View the whitepaper

Presenters:
Scott Register Director of Product Management BreakingPoint Systems, Inc.