What we can learn from the best collegiate cyber defenders

This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams […]

The post What we can learn from the best collegiate cyber defenders appeared first on Security Intelligence.

Continue reading What we can learn from the best collegiate cyber defenders

How to Embed Gen Z in Your Organization’s Security Culture

Generation Z, which Pew Research Center defines as those born after 1996, is considered the first digital-native generation. This group of young people always has the latest technology at their fingertips. Yet even with this strong digital connection, the National Cybersecurity Alliance (NCSA) found that Gen Zers have higher cyber incident victimization rates than previous […]

The post How to Embed Gen Z in Your Organization’s Security Culture appeared first on Security Intelligence.

Continue reading How to Embed Gen Z in Your Organization’s Security Culture

What Drives Incident Responders: Key Findings from the 2022 Incident Responder Study

Cyberattacks seldom happen when it’s convenient. In fact, it’s relatively common for them to occur on weekends or holidays — threat actors capitalize on the fact that there is fewer staff on site, and those who are there are focused on the coming weekend or time off. It’s also not uncommon for attacks of this […]

The post What Drives Incident Responders: Key Findings from the 2022 Incident Responder Study appeared first on Security Intelligence.

Continue reading What Drives Incident Responders: Key Findings from the 2022 Incident Responder Study

Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency

Threat intelligence and response teams need to be ready to respond to an increasing barrage of risks and changes. To be exact, this is where breach-and-attack-simulation (BAS) comes in. Most groups use BAS platforms to validate security controls against various types of data breaches. Meanwhile, IBM Security saw that it could also be very useful as […]

The post Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency appeared first on Security Intelligence.

Continue reading Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency

Chaos Engineering and Security: Upgrading Simulation Exercises For More Dynamic Threat Environments

As the recent pandemic has swept the globe, malicious hackers have quickly pivoted to leverage the confusion to their benefit in carrying out cyberattacks. On April 8, 2020, the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) jointly released an alert […]

The post Chaos Engineering and Security: Upgrading Simulation Exercises For More Dynamic Threat Environments appeared first on Security Intelligence.

Continue reading Chaos Engineering and Security: Upgrading Simulation Exercises For More Dynamic Threat Environments

Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage

How to Develop an Immersive Cybersecurity Simulation

A well-planned cybersecurity simulation can help the entire organization, from incident responders to top leadership, practice their crisis management skills in a low-stakes yet immersive environment.

The post How to Develop an Immersive Cybersecurity Simulation appeared first on Security Intelligence.

Continue reading How to Develop an Immersive Cybersecurity Simulation