InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Leveraging Cyber Ranges for Advanced Capabilities

Presented by

Charles Kolodgy, Principal | Security Mindsets LLC

About this talk

Cyber ranges are primarily thought of as a skill assessment and training tool. However, cyber ranges can be leveraged for many different purposes. The ability to run operations in a realistic yet controlled environment allows organizations to perform advanced capabilities such as testing threat hunting techniques, evaluating security controls and incident response plans, and conducting attack surface simulations. The presentation will provide useful insight and information, including examples, on how cyber ranges are an important tool in building and maintaining operational resilience. With this information, attendees will expand their overall knowledge of the capabilities available from cyber ranges. Join this discussion to: - Understand the workings and capabilities of a modern cyber range - Gain an understanding of how cyber ranges can foster collaboration, communication, and teamwork among cybersecurity teams - How cyber ranges fulfil use cases beyond training - The value cyber ranges bring to an organization - The way other organizations have used cyber ranges to bolster their attack surface management and threat hunting capabilities - Learn how AI is enhancing cyber range activities - What are some of the leading cyber ranges available
Information Security

Information Security

259130 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics