SlideShare a Scribd company logo
1 of 15
BT Assure. Security that matters
Simulating Cyber
Operations: “Do you
want to play a game?”
Bryan K. Fite –
NICE 2017 8th
Annual
Conference
November 7, 2017
BT Assure. Security that matters 2
Trusted Advisor
My journey
Architect Risk Manager
Researcher
Pen Tester Consultant
Hacker
Innovation
Product
Manager
Security &
Compliance
Director
CISO
From the guy that said NO
to the guy that facilitates yes
BT Assure. Security that matters 3
Playing games can help train
and assess cyber warriors
Wicked problem
Shortage of cyber warriors
Many games but few
fit for purpose
BT Assure. Security that matters 4
“What is needed is a publicly adopted
cyber operations simulation standard ...”
Call to action
Cyber Operations Simulated
Environments Consortium
(COSEC) - 2012
BT Assure. Security that matters 5
“Is this a game…
…or is it real?”
“What is
the difference?”
War games
BT Assure. Security that matters 6
Models and simulations
BT Assure. Security that matters 7
“Innovative way to describe Cyber
Operations Simulation elements…”
• Objects: are a collection of predetermined
attributes used to describe a simulation element.
• Attributes: are the characteristics of an Object
that dictate how objects interact with each other
inside a simulation.
Scenario Definition Language
BT Assure. Security that matters 8
Primitives
• Node
• Network
• Software
• Artifact
• Constraint
• Objective
• Actor
• Process
• Message
BT Assure. Security that matters 9
Object Type: Node
Required Attributes: Name (N), Host / Gateway Flag (H/G), Operating
System (OS), Interface Address(es) (IA), Routing Table (RT), ARP Table
(AT), Listening Ports (LP)
Optional Attributes: Accounts, Applications, Artifact and Services
The Object ID (OID) is a unique number, in this case 11001. The Object
Type (OT) is a Node (N) named hackme running in Host mode. hackme
is running Windows XP SP2 Operating System (OS) with the TCP/IP
Address (IA) of 192.168.0.10 and a Routing Table (RT) which includes
a default gateway of 192.168.0.1/24. There are two ARP entries in the
ARP Table (AT) one assigned to hackme and the other to the default
gateway. There are two Listening Ports (LP) which represent http
(port 80) and https (port 443) services. An optional Account attribute is
included – the username Administrator and its password.
OID (11001): OT
(N):N(hackme):H/G(H):OS(WINXPSP2):IA(192.168.0.10): RT(0.0.0.0,
192.168.0.1/24):AT (192.168.0.1:88-1f-a1-2c-00-7e,192.168.0.10:88-1f-a1-
2c-ff):LP (TCP:80,443): AC(Administrator:password)
Expressing Objects
BT Assure. Security that matters 10
From this simple scenario we can derive the required primitives.
“Your mission is to identify your adversary’s security posture by
enumerating the attack surface represented by their external network
address 10.0.10.0/24. You must submit your findings by 17:00 ET
today (1 hour from now). “
“I’m going to tell you a bedtime story.”
BT Assure. Security that matters 11
Edutainment: Packetwars
•Serious Phun
•First Cyber Sport
•Evolved Over 20+
Years
•Cold War Roots
•Flexible Platform
•Train
•Assess
•Recruit
http://packetwars.com
BT Assure. Security that matters 12
•Objectives & Constraints
•Battle Space:
•Dedicated, Virtual, Cloud & Hybrid
•Telemetry, Visualization & Analytics
•Assessment & Scoring
Spectator Friendly Sport
“…I want to play those games.”
BT Assure. Security that matters 13
•http://packetwars.com
“…Let's play Global Thermonuclear War.”
BT Assure. Security that matters 14
•TROOPERS18 in Heidelberg Germany https://www.troopers.de/
Next Public Event
BT Assure. Security that matters 15
Thank You For Your Time
Questions & Answers…?
@BryanFite

More Related Content

Similar to Bt 2017 sim nice2017 final

Game Programming I - Introduction
Game Programming I - IntroductionGame Programming I - Introduction
Game Programming I - IntroductionFrancis Seriña
 
BitSquid Tech: Benefits of a data-driven renderer
BitSquid Tech: Benefits of a data-driven rendererBitSquid Tech: Benefits of a data-driven renderer
BitSquid Tech: Benefits of a data-driven renderertobias_persson
 
Using Machine Learning at Scale: A Gaming Industry Experience!
Using Machine Learning at Scale: A Gaming Industry Experience!Using Machine Learning at Scale: A Gaming Industry Experience!
Using Machine Learning at Scale: A Gaming Industry Experience!Databricks
 
Ultizen Presentation
Ultizen PresentationUltizen Presentation
Ultizen Presentationdorrit
 
Reverse code engineering
Reverse code engineeringReverse code engineering
Reverse code engineeringKrishs Patil
 
System concept and hardware
System concept and hardwareSystem concept and hardware
System concept and hardwarefiza1975
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEELinaro
 
The Next Mainstream Programming Language: A Game Developer's Perspective
The Next Mainstream Programming Language: A Game Developer's PerspectiveThe Next Mainstream Programming Language: A Game Developer's Perspective
The Next Mainstream Programming Language: A Game Developer's Perspectivekfrdbs
 
Applying AI in Games (GDC2019)
Applying AI in Games (GDC2019)Applying AI in Games (GDC2019)
Applying AI in Games (GDC2019)Jun Okumura
 
Y1 gd engine_terminology
Y1 gd engine_terminologyY1 gd engine_terminology
Y1 gd engine_terminologyrosstapher
 
Light Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxLight Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxDineshBoobalan
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET Journal
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Security Conference
 
Architecting Azure (I)IoT Solutions @ IoT Saturday 2019
Architecting Azure (I)IoT Solutions @ IoT Saturday 2019Architecting Azure (I)IoT Solutions @ IoT Saturday 2019
Architecting Azure (I)IoT Solutions @ IoT Saturday 2019pietrobr
 
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSafe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSoumitra Bhattacharyya
 

Similar to Bt 2017 sim nice2017 final (20)

Ip Sec
Ip SecIp Sec
Ip Sec
 
Sgin2013 scrum accomplished-mmog-sajitvasudevan
Sgin2013 scrum accomplished-mmog-sajitvasudevanSgin2013 scrum accomplished-mmog-sajitvasudevan
Sgin2013 scrum accomplished-mmog-sajitvasudevan
 
Game Programming I - Introduction
Game Programming I - IntroductionGame Programming I - Introduction
Game Programming I - Introduction
 
BitSquid Tech: Benefits of a data-driven renderer
BitSquid Tech: Benefits of a data-driven rendererBitSquid Tech: Benefits of a data-driven renderer
BitSquid Tech: Benefits of a data-driven renderer
 
Moein
MoeinMoein
Moein
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Using Machine Learning at Scale: A Gaming Industry Experience!
Using Machine Learning at Scale: A Gaming Industry Experience!Using Machine Learning at Scale: A Gaming Industry Experience!
Using Machine Learning at Scale: A Gaming Industry Experience!
 
Ultizen Presentation
Ultizen PresentationUltizen Presentation
Ultizen Presentation
 
Reverse code engineering
Reverse code engineeringReverse code engineering
Reverse code engineering
 
System concept and hardware
System concept and hardwareSystem concept and hardware
System concept and hardware
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
The Next Mainstream Programming Language: A Game Developer's Perspective
The Next Mainstream Programming Language: A Game Developer's PerspectiveThe Next Mainstream Programming Language: A Game Developer's Perspective
The Next Mainstream Programming Language: A Game Developer's Perspective
 
Applying AI in Games (GDC2019)
Applying AI in Games (GDC2019)Applying AI in Games (GDC2019)
Applying AI in Games (GDC2019)
 
Y1 gd engine_terminology
Y1 gd engine_terminologyY1 gd engine_terminology
Y1 gd engine_terminology
 
Light Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxLight Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptx
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
Architecting Azure (I)IoT Solutions @ IoT Saturday 2019
Architecting Azure (I)IoT Solutions @ IoT Saturday 2019Architecting Azure (I)IoT Solutions @ IoT Saturday 2019
Architecting Azure (I)IoT Solutions @ IoT Saturday 2019
 
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSafe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devices
 

Recently uploaded

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 

Recently uploaded (20)

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Bt 2017 sim nice2017 final

  • 1. BT Assure. Security that matters Simulating Cyber Operations: “Do you want to play a game?” Bryan K. Fite – NICE 2017 8th Annual Conference November 7, 2017
  • 2. BT Assure. Security that matters 2 Trusted Advisor My journey Architect Risk Manager Researcher Pen Tester Consultant Hacker Innovation Product Manager Security & Compliance Director CISO From the guy that said NO to the guy that facilitates yes
  • 3. BT Assure. Security that matters 3 Playing games can help train and assess cyber warriors Wicked problem Shortage of cyber warriors Many games but few fit for purpose
  • 4. BT Assure. Security that matters 4 “What is needed is a publicly adopted cyber operations simulation standard ...” Call to action Cyber Operations Simulated Environments Consortium (COSEC) - 2012
  • 5. BT Assure. Security that matters 5 “Is this a game… …or is it real?” “What is the difference?” War games
  • 6. BT Assure. Security that matters 6 Models and simulations
  • 7. BT Assure. Security that matters 7 “Innovative way to describe Cyber Operations Simulation elements…” • Objects: are a collection of predetermined attributes used to describe a simulation element. • Attributes: are the characteristics of an Object that dictate how objects interact with each other inside a simulation. Scenario Definition Language
  • 8. BT Assure. Security that matters 8 Primitives • Node • Network • Software • Artifact • Constraint • Objective • Actor • Process • Message
  • 9. BT Assure. Security that matters 9 Object Type: Node Required Attributes: Name (N), Host / Gateway Flag (H/G), Operating System (OS), Interface Address(es) (IA), Routing Table (RT), ARP Table (AT), Listening Ports (LP) Optional Attributes: Accounts, Applications, Artifact and Services The Object ID (OID) is a unique number, in this case 11001. The Object Type (OT) is a Node (N) named hackme running in Host mode. hackme is running Windows XP SP2 Operating System (OS) with the TCP/IP Address (IA) of 192.168.0.10 and a Routing Table (RT) which includes a default gateway of 192.168.0.1/24. There are two ARP entries in the ARP Table (AT) one assigned to hackme and the other to the default gateway. There are two Listening Ports (LP) which represent http (port 80) and https (port 443) services. An optional Account attribute is included – the username Administrator and its password. OID (11001): OT (N):N(hackme):H/G(H):OS(WINXPSP2):IA(192.168.0.10): RT(0.0.0.0, 192.168.0.1/24):AT (192.168.0.1:88-1f-a1-2c-00-7e,192.168.0.10:88-1f-a1- 2c-ff):LP (TCP:80,443): AC(Administrator:password) Expressing Objects
  • 10. BT Assure. Security that matters 10 From this simple scenario we can derive the required primitives. “Your mission is to identify your adversary’s security posture by enumerating the attack surface represented by their external network address 10.0.10.0/24. You must submit your findings by 17:00 ET today (1 hour from now). “ “I’m going to tell you a bedtime story.”
  • 11. BT Assure. Security that matters 11 Edutainment: Packetwars •Serious Phun •First Cyber Sport •Evolved Over 20+ Years •Cold War Roots •Flexible Platform •Train •Assess •Recruit http://packetwars.com
  • 12. BT Assure. Security that matters 12 •Objectives & Constraints •Battle Space: •Dedicated, Virtual, Cloud & Hybrid •Telemetry, Visualization & Analytics •Assessment & Scoring Spectator Friendly Sport “…I want to play those games.”
  • 13. BT Assure. Security that matters 13 •http://packetwars.com “…Let's play Global Thermonuclear War.”
  • 14. BT Assure. Security that matters 14 •TROOPERS18 in Heidelberg Germany https://www.troopers.de/ Next Public Event
  • 15. BT Assure. Security that matters 15 Thank You For Your Time Questions & Answers…? @BryanFite

Editor's Notes

  1. If you are here to see “The Dynamic Role of HR in Advancing Organizational Cybersecurity “ I regret to inform you that this is not that but rather…
  2. If you are here to see “The Dynamic Role of HR in Advancing Organizational Cybersecurity “ I regret to inform you that this is not that but rather…
  3. Initial Charter Adopted in 2012 – Charter members Dartmouth, Evergreen, University of Illinois, Core, Meshco and ERNW
  4. One of my favorite movies of all times came out in 1983 – WOPR – War Operation Plan Response Joshua is a computer gifted with artificial intelligence – “The only winning move is not to play”
  5. Gamification – Spectators/FANS, Teams, Rivalries, specialties…