SlideShare a Scribd company logo
VP, Federal Sales,
VMware
@vmwaregov
Confidential │ ©2019 VMware, Inc.
VMware Digital Learning PlatformTM :
Cyber Range Solution
Accelerating Productivity through a Digital Learning
Experience
Bill Rowan
VP, Federal
October 2019
Confidential │ ©2019 VMware, Inc.
Many innovators had a hand in shaping the
cloud, but probably none were more important
than the small band of technologists – Diane
Greene, Mendel Rosenblum, Scott Devine, Ellen
Wang, and Eduard Bugnion – who in 1998
created VMware, the unique software program
referenced above which went public in 2007.
Without VMware there could be no
cloud…Why?...
~Thomas Friedman
Confidential │ ©2019 VMware, Inc.
Technology
Good Badand
amplifies human behavior…
:
or ?.
Confidential │ ©2019 VMware, Inc.
Tech as a Force For Good
Confidential │ ©2019 VMware, Inc. 5
Confidential │ ©2019 VMware, Inc.
ENGINEERING FOR GOODREQUIRES
GOOD ENGINEERING
ENGINEERING FOR GOOD
Confidential │ ©2019 VMware, Inc.
Cyber Crime at
Scale
Disinformation
at Scale
Privacy
at Risk
The Law of
Unintended Consequences
“We’re going to
give you free apps and
services that enhance
your life.”
“We’re going to bring
communities
together online.”
“We’re going
to use blockchain to
promote
transparency and
inclusion.”
Confidential │ ©2019 VMware, Inc.
There’s never been a more exciting time
to be a technologist.
Confidential │ ©2019 VMware, Inc. 8
Confidential │ ©2019 VMware, Inc.
Edge Computing
Hybrid Clouds
Public
Clouds
Art of the Possible > Mission Optimized, Software-Defined Digital Foundation
VMware Vision for a Mission-Driven Cloud
Consistent
Infrastructure
Consistent
Operations
Intrinsic
Security
Josh Townsend May 2019
ANY DEVICE
ANY APPLICATION
ANY CLOUD
Community
Cloud
Global Reach
Mission Optimized, Software Defined Digital Foundation
ML AI Blockchain
Future
Public Clouds
Tactical Edge
Clouds
Confidential │ ©2019 VMware, Inc.
Impacts to the Economy, Social, Health and Government Cyber Landscape
Improving Organization’s Cyber Security Posture
Introduction
Top Types of Cyber Attacks
• Denial-of-service (DoS)
• (DDoS) attacks
• Man-in-the-middle
(MitM) attack
• Phishing and spear
phishing attacks
• Drive-by attack
• Password attack
• SQL injection attack
• Cross-site scripting (XSS)
attack
• Eavesdropping attack
$2.4 million average cost
of a malware attack
Damage related to
cybercrime is projected to
hit $6 trillion annually by
2021
The damage from hacks
costs businesses $400
billion a year
5.4 billion attacks by the
WannaCry virus were
blocked
400,000 machines were
infected by the Wannacry
costing $4 billion to
remediate
Ransomware attacks
occur every 14 seconds
Ransomware attacks to
increase 5X by 2021
24,000 malicious mobile
apps are blocked every
day
Root Causes
• 48% malicious or criminal attacks
• 27% human error
• 25% IT and business process failures
Readiness
How to prepare you team and
infrastructure against Cyber Attacks?
Response
When an attack occurs what do we do
to stop?
Recovery
How do we address vulnerabilities?
Resiliency
How do you mitigate impacts of future
attacks?
Cyber Strategies
Confidential │ ©2019 VMware, Inc.
Defining the Value
What and Why a Cyber Range?
Cyber Threats
•High Risk to “live”
infrastructure
•Rapid Change
•Highly Complex
•Illegal in the wild
Cyber-workers
•Need diverse, realistic, real-
world and real-time
environments
•Need experience working
together to improve teamwork
and enhance team capabilities
Target
Environments
•Difficult or cost prohibitive to
duplicate
•Can be damaged or
permanently compromised
•Simulation is difficult or
impossible
Introduction
By 2022, 15% of large enterprises will be
using cyber ranges to develop the skills of
their security teams, up from less than 1%
today.
~Source: Gartner
A cyber range is a simulation platform that
enables cybersecurity teams to train and
develop cybersecurity expertise and manage
workforce planning.
~Source: Gartner
Image Source: redballon.com
Confidential │ ©2019 VMware, Inc.
• Static Cyber Learning
• Hands-on Lab Learning
• Vulnerability Research
• Exploitation
• Operating Systems Internals
• Exercise Expansion
• Production Network
Simulation
• Evolving Deployment Models
• Exercise Blueprint Library
Cyber Range Baseline Simulated Environments
• Dynamic Environments
• Red Team/Blue Team
• Capture-the-Flag
• Industrial Control Systems
Integration
Dynamic Exercises
Developing and Evolving Cyber Range Competencies
Cyber Range Use Cases
V a r y i n g M a t u r i t y & E v o l v i n g C y b e r R a n g e U s e C a s e s
Use Cases
Confidential │ ©2019 VMware, Inc.
Digital Learning Platform
Cyber Range Solution
On/Off-Prem Simulated
Enterprise Network Environment
VMware Digital Learning Platform & Cyber Range Solution
Introducing the VMware Cyber Range Solution
Introduction
Cybergaming, Blueprints, Consulting &
Operations
Improved Cyber Posture
Solutions & Innovations
V a l u e – S i m p l i c i t y - S c a l e - S e r v i c e s
ü Market & Customer Specific Solutions
ü Speed-and-Scale-to-Market
ü Consistent & Validated Platforms
Confidential │ ©2019 VMware, Inc.
Consistency, Security, Agility Across Cyber Modalities
VMware Cyber Range Solution
Consistent Digital Learning Platform Control Plane
Automation and Operations • Across Clouds
Consistent Infrastructure
VM Infrastructure • Container Infrastructure
Consistent Cyber Instructor and Worker Experience
CyberRangeSolution Solution Overview
Exercise Elements
Exercise Expansion
Vulnerability Research
Operating System Internals
Exploitation
Industrial Control System Security
Confidential │ ©2019 VMware, Inc.
The Cyber Maturity Builder TM offers a full range of skill-development challenges, meeting customers’
cyber maturity from “Foundational” to “Advanced”
Initial range content offerings
Maturity Model
Common
Exploit
Discovery
Common
Vulnerabilities
andAttacks
DataExfiltration
andDiscoveryLevel 1
Level 2
Level 3
Intermediate
Exploitationand
Discovery
Moderate
Vulnerabilitiesand
Attacks
DataExfiltration
andDiscovery
Level 1
Level 2
Level 3
Sophisticated
ExploitationDiscoveryand
Response
Sophisticated
VulnerabilityandAttacks
HighlySophisticated
DataExfiltration
Level 1
Level 2
Level 3
Skillset
Maturity
Cyber Maturity Model
Confidential │ ©2019 VMware, Inc.
Defining Benefits, Advantages, & Efficiencies
Cyber Range Solution Value
Solutions & Innovations
Cyber Range Solution
Readiness.
Response.
Recovery.
Resiliency.
E n h a n c e C y b e r s e c u r i t y P o s t u r e D e v e l o p C y b e r S e c u r i t y P r o f e s s i o n a l s
Integration
Flexibility to integrate with external
environments (e.g. cloud) and devices
(e.g. IoT, SCADA, ICS, etc.)
Learning Content
Platform for Classroom Learning,
Personal Assessment, & Certification;
develop Cybersecurity Professionals
Assess
Capability to monitor, report, and grade
Cyber exercises through
internal/external monitoring tools
Exercise &
Competitions
Host Cyber learning: static content,
exercise & competition, and simulated
environments
Segmented &
Secure
Segmented infrastructure platform to
simulate and test elements of Cyber
warfare not authorized for enterprise/
production networks
Network
Simulation
Simulate network architecture, traffic,
and services (e.g. topologies, patterns,
and web/app/e-mail)
Automation
Ability to automate the deployment of
networks and environments for Cyber
Range exercises and events
Testing &
Preparation
Utilize for Cyber Security testing of
application development and pre-
production release simulation
Value Wheel
Confidential │ ©2019 VMware, Inc.
VMware Cyber Range
Where are we showcasing?
October 11, 2019
Capture the Flag Competition: During this session,
participants will be provided a simulated
environment to conduct cyber game activities. Hunt
for security vulnerabilities in a system.
October 2019
Cyber Maturity Builder &
Howdy Neighbor/ICS Village Capture the Flag
Exercises
2019 Annual
Cyber Awareness Symposium
October 2019
Rapid Prototyping Event:
Riot in the Factory
Showcases
Confidential │ ©2019 VMware, Inc.
Edge Computing
Hybrid Clouds
Public
Clouds
Art of the Possible > Mission Optimized, Software-Defined Digital Foundation
VMware Vision for a Mission-Driven Cloud
Consistent
Infrastructure
Consistent
Operations
Intrinsic
Security
Josh Townsend May 2019
ANY DEVICE
ANY APPLICATION
ANY CLOUD
Community
Cloud
Global Reach
Mission Optimized, Software Defined Digital Foundation
ML AI Blockchain
Future
Public Clouds
Tactical Edge
Clouds
Confidential │ ©2019 VMware, Inc.
Thank You
WASHINGTON DC

More Related Content

What's hot

DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
Chris Downey
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - Twistlock
Amazon Web Services
 
DevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it WorkDevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it Work
VMware Tanzu
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Novell
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Enterprise Management Associates
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
James Wickett
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
lior mazor
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
NotSoSecure Global Services
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Erkang Zheng
 
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
VMware Tanzu
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
Tim Mackey
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Tim Mackey
 
Enterprise Cloud Native is the New Normal
Enterprise Cloud Native is the New NormalEnterprise Cloud Native is the New Normal
Enterprise Cloud Native is the New Normal
QAware GmbH
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no try
James Strong
 
The Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiThe Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS Lebowski
QAware GmbH
 
Cloud-native Data
Cloud-native DataCloud-native Data
Cloud-native Data
cornelia davis
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
DevOps.com
 
Software Architecture Conference - Monitoring Microservices - A Challenge
Software Architecture Conference -  Monitoring Microservices - A ChallengeSoftware Architecture Conference -  Monitoring Microservices - A Challenge
Software Architecture Conference - Monitoring Microservices - A Challenge
Adrian Cockcroft
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 

What's hot (20)

DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - Twistlock
 
DevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it WorkDevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it Work
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- March 22, 2021
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Enterprise Cloud Native is the New Normal
Enterprise Cloud Native is the New NormalEnterprise Cloud Native is the New Normal
Enterprise Cloud Native is the New Normal
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no try
 
The Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiThe Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS Lebowski
 
Cloud-native Data
Cloud-native DataCloud-native Data
Cloud-native Data
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
Software Architecture Conference - Monitoring Microservices - A Challenge
Software Architecture Conference -  Monitoring Microservices - A ChallengeSoftware Architecture Conference -  Monitoring Microservices - A Challenge
Software Architecture Conference - Monitoring Microservices - A Challenge
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 

Similar to Enhancing your Cyber Skills through a Cyber Range

Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
Hamilton Oliveira
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
ControlCase
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
CA API Management
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
Iqra khalil
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Vince Garr
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Impetus Technologies
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
CDW
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
CSO_Presentations
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
ThousandEyes
 
SAP Concur’s Cloud Journey
SAP Concur’s Cloud JourneySAP Concur’s Cloud Journey
SAP Concur’s Cloud Journey
SBWebinars
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
Redington Value Distribution
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
Amazon Web Services
 
Incident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Incident Response: Eyes Everywhere - AWS Security Week at the SF LoftIncident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Incident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Amazon Web Services
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
omgmaxsmith
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
VMware Tanzu
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Amazon Web Services
 

Similar to Enhancing your Cyber Skills through a Cyber Range (20)

Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
SAP Concur’s Cloud Journey
SAP Concur’s Cloud JourneySAP Concur’s Cloud Journey
SAP Concur’s Cloud Journey
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
 
Incident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Incident Response: Eyes Everywhere - AWS Security Week at the SF LoftIncident Response: Eyes Everywhere - AWS Security Week at the SF Loft
Incident Response: Eyes Everywhere - AWS Security Week at the SF Loft
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 

More from scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
scoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
scoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
scoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
scoopnewsgroup
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
scoopnewsgroup
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
scoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
scoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
scoopnewsgroup
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
scoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
scoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
scoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
scoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
scoopnewsgroup
 
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
scoopnewsgroup
 
The Key to Innovation: Happy, Engaged, Valued Employees
The Key to Innovation: Happy, Engaged, Valued EmployeesThe Key to Innovation: Happy, Engaged, Valued Employees
The Key to Innovation: Happy, Engaged, Valued Employees
scoopnewsgroup
 

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
FedScoop Public Sector Innovation Summit Peter Wallace, CIO, Virginia Beach- ...
 
The Key to Innovation: Happy, Engaged, Valued Employees
The Key to Innovation: Happy, Engaged, Valued EmployeesThe Key to Innovation: Happy, Engaged, Valued Employees
The Key to Innovation: Happy, Engaged, Valued Employees
 

Recently uploaded

PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 

Recently uploaded (20)

PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 

Enhancing your Cyber Skills through a Cyber Range

  • 2. Confidential │ ©2019 VMware, Inc. VMware Digital Learning PlatformTM : Cyber Range Solution Accelerating Productivity through a Digital Learning Experience Bill Rowan VP, Federal October 2019
  • 3. Confidential │ ©2019 VMware, Inc. Many innovators had a hand in shaping the cloud, but probably none were more important than the small band of technologists – Diane Greene, Mendel Rosenblum, Scott Devine, Ellen Wang, and Eduard Bugnion – who in 1998 created VMware, the unique software program referenced above which went public in 2007. Without VMware there could be no cloud…Why?... ~Thomas Friedman
  • 4. Confidential │ ©2019 VMware, Inc. Technology Good Badand amplifies human behavior… : or ?.
  • 5. Confidential │ ©2019 VMware, Inc. Tech as a Force For Good Confidential │ ©2019 VMware, Inc. 5
  • 6. Confidential │ ©2019 VMware, Inc. ENGINEERING FOR GOODREQUIRES GOOD ENGINEERING ENGINEERING FOR GOOD
  • 7. Confidential │ ©2019 VMware, Inc. Cyber Crime at Scale Disinformation at Scale Privacy at Risk The Law of Unintended Consequences “We’re going to give you free apps and services that enhance your life.” “We’re going to bring communities together online.” “We’re going to use blockchain to promote transparency and inclusion.”
  • 8. Confidential │ ©2019 VMware, Inc. There’s never been a more exciting time to be a technologist. Confidential │ ©2019 VMware, Inc. 8
  • 9. Confidential │ ©2019 VMware, Inc. Edge Computing Hybrid Clouds Public Clouds Art of the Possible > Mission Optimized, Software-Defined Digital Foundation VMware Vision for a Mission-Driven Cloud Consistent Infrastructure Consistent Operations Intrinsic Security Josh Townsend May 2019 ANY DEVICE ANY APPLICATION ANY CLOUD Community Cloud Global Reach Mission Optimized, Software Defined Digital Foundation ML AI Blockchain Future Public Clouds Tactical Edge Clouds
  • 10. Confidential │ ©2019 VMware, Inc. Impacts to the Economy, Social, Health and Government Cyber Landscape Improving Organization’s Cyber Security Posture Introduction Top Types of Cyber Attacks • Denial-of-service (DoS) • (DDoS) attacks • Man-in-the-middle (MitM) attack • Phishing and spear phishing attacks • Drive-by attack • Password attack • SQL injection attack • Cross-site scripting (XSS) attack • Eavesdropping attack $2.4 million average cost of a malware attack Damage related to cybercrime is projected to hit $6 trillion annually by 2021 The damage from hacks costs businesses $400 billion a year 5.4 billion attacks by the WannaCry virus were blocked 400,000 machines were infected by the Wannacry costing $4 billion to remediate Ransomware attacks occur every 14 seconds Ransomware attacks to increase 5X by 2021 24,000 malicious mobile apps are blocked every day Root Causes • 48% malicious or criminal attacks • 27% human error • 25% IT and business process failures Readiness How to prepare you team and infrastructure against Cyber Attacks? Response When an attack occurs what do we do to stop? Recovery How do we address vulnerabilities? Resiliency How do you mitigate impacts of future attacks? Cyber Strategies
  • 11. Confidential │ ©2019 VMware, Inc. Defining the Value What and Why a Cyber Range? Cyber Threats •High Risk to “live” infrastructure •Rapid Change •Highly Complex •Illegal in the wild Cyber-workers •Need diverse, realistic, real- world and real-time environments •Need experience working together to improve teamwork and enhance team capabilities Target Environments •Difficult or cost prohibitive to duplicate •Can be damaged or permanently compromised •Simulation is difficult or impossible Introduction By 2022, 15% of large enterprises will be using cyber ranges to develop the skills of their security teams, up from less than 1% today. ~Source: Gartner A cyber range is a simulation platform that enables cybersecurity teams to train and develop cybersecurity expertise and manage workforce planning. ~Source: Gartner Image Source: redballon.com
  • 12. Confidential │ ©2019 VMware, Inc. • Static Cyber Learning • Hands-on Lab Learning • Vulnerability Research • Exploitation • Operating Systems Internals • Exercise Expansion • Production Network Simulation • Evolving Deployment Models • Exercise Blueprint Library Cyber Range Baseline Simulated Environments • Dynamic Environments • Red Team/Blue Team • Capture-the-Flag • Industrial Control Systems Integration Dynamic Exercises Developing and Evolving Cyber Range Competencies Cyber Range Use Cases V a r y i n g M a t u r i t y & E v o l v i n g C y b e r R a n g e U s e C a s e s Use Cases
  • 13. Confidential │ ©2019 VMware, Inc. Digital Learning Platform Cyber Range Solution On/Off-Prem Simulated Enterprise Network Environment VMware Digital Learning Platform & Cyber Range Solution Introducing the VMware Cyber Range Solution Introduction Cybergaming, Blueprints, Consulting & Operations Improved Cyber Posture Solutions & Innovations V a l u e – S i m p l i c i t y - S c a l e - S e r v i c e s ü Market & Customer Specific Solutions ü Speed-and-Scale-to-Market ü Consistent & Validated Platforms
  • 14. Confidential │ ©2019 VMware, Inc. Consistency, Security, Agility Across Cyber Modalities VMware Cyber Range Solution Consistent Digital Learning Platform Control Plane Automation and Operations • Across Clouds Consistent Infrastructure VM Infrastructure • Container Infrastructure Consistent Cyber Instructor and Worker Experience CyberRangeSolution Solution Overview Exercise Elements Exercise Expansion Vulnerability Research Operating System Internals Exploitation Industrial Control System Security
  • 15. Confidential │ ©2019 VMware, Inc. The Cyber Maturity Builder TM offers a full range of skill-development challenges, meeting customers’ cyber maturity from “Foundational” to “Advanced” Initial range content offerings Maturity Model Common Exploit Discovery Common Vulnerabilities andAttacks DataExfiltration andDiscoveryLevel 1 Level 2 Level 3 Intermediate Exploitationand Discovery Moderate Vulnerabilitiesand Attacks DataExfiltration andDiscovery Level 1 Level 2 Level 3 Sophisticated ExploitationDiscoveryand Response Sophisticated VulnerabilityandAttacks HighlySophisticated DataExfiltration Level 1 Level 2 Level 3 Skillset Maturity Cyber Maturity Model
  • 16. Confidential │ ©2019 VMware, Inc. Defining Benefits, Advantages, & Efficiencies Cyber Range Solution Value Solutions & Innovations Cyber Range Solution Readiness. Response. Recovery. Resiliency. E n h a n c e C y b e r s e c u r i t y P o s t u r e D e v e l o p C y b e r S e c u r i t y P r o f e s s i o n a l s Integration Flexibility to integrate with external environments (e.g. cloud) and devices (e.g. IoT, SCADA, ICS, etc.) Learning Content Platform for Classroom Learning, Personal Assessment, & Certification; develop Cybersecurity Professionals Assess Capability to monitor, report, and grade Cyber exercises through internal/external monitoring tools Exercise & Competitions Host Cyber learning: static content, exercise & competition, and simulated environments Segmented & Secure Segmented infrastructure platform to simulate and test elements of Cyber warfare not authorized for enterprise/ production networks Network Simulation Simulate network architecture, traffic, and services (e.g. topologies, patterns, and web/app/e-mail) Automation Ability to automate the deployment of networks and environments for Cyber Range exercises and events Testing & Preparation Utilize for Cyber Security testing of application development and pre- production release simulation Value Wheel
  • 17. Confidential │ ©2019 VMware, Inc. VMware Cyber Range Where are we showcasing? October 11, 2019 Capture the Flag Competition: During this session, participants will be provided a simulated environment to conduct cyber game activities. Hunt for security vulnerabilities in a system. October 2019 Cyber Maturity Builder & Howdy Neighbor/ICS Village Capture the Flag Exercises 2019 Annual Cyber Awareness Symposium October 2019 Rapid Prototyping Event: Riot in the Factory Showcases
  • 18. Confidential │ ©2019 VMware, Inc. Edge Computing Hybrid Clouds Public Clouds Art of the Possible > Mission Optimized, Software-Defined Digital Foundation VMware Vision for a Mission-Driven Cloud Consistent Infrastructure Consistent Operations Intrinsic Security Josh Townsend May 2019 ANY DEVICE ANY APPLICATION ANY CLOUD Community Cloud Global Reach Mission Optimized, Software Defined Digital Foundation ML AI Blockchain Future Public Clouds Tactical Edge Clouds
  • 19. Confidential │ ©2019 VMware, Inc. Thank You