Quickly & easily recreate Internet scale cyber war, interpret the results, and rapidly act upon cyber threats to:
-Train cyber warriors to defend against threats or neutralize the enemy.
-Harden targets – networks, data centers, individual devices.
Cybersecurity: Arm and Train US Warriors to Win Cyber War
1. Arm and Train US Warriors to Win Cyber War
Deploying the Modern Cyber Range
2. The Cyber Range Imperative
Prepare for cyber war with
cyber war:
• Thousands of global attacks
• Botnet and global DDoS
simulation
• Millions of users
• Hundreds of applications
• As much non-repetitive data as
the U.S. Library of Congress in
one hour
2
3. Military Preparedness Requires Ranges
Every base must be able to easily recreate, interpret,
and rapidly respond to cyber threats.
• Conduct basic training
• Develop ingrained skills
• Harden critical targets
4. Legacy Methods Cannot Solve Modern Problems
• Too complex
• Not scalable
• Not practical
• Not cost-effective
6. Science of Cyber Tomography
Creates Internet-scale cyber war in controlled
environment and records impact.
• Visibility to harden network and data center targets
• Intelligence needed to act on cyber events
• Repeatable, deterministic Resiliency Score ™
7. BreakingPoint Storm CTM™
The comprehensive alternative to
costly and complex cyber ranges.
• 4,500+ real-time attacks
• 150+ applications
• Traffic from millions of users
• Extensive automation speeds
configuration and reporting
• Futureproof and always current
9. Centralized Command and Control
The BreakingPoint Storm CTM is an ever current command
and control center for:
• Keeping conditions up-to-date and standardized
• Coordinating multi-party situational analysis
• Replicating content across a network of machines
• Distributing and managing cyber warming exercise
10. Hardening Targets Throughout IT Supply Chain
We must build resiliency into every element of critical
infrastructure.
• Measure and improve resiliency from chip to application
• Hold vendors accountable
• Identify and remediate stress fractures
• Monitor the effects of changes over time
11. Evolving Voodoo into Science
We must leverage science and technology to
recreate, interpret, and rapidly respond to cyber
threats.
• Develop elite cyber warriors
• Advance capabilities through research and
development
• Harden critical targets
12. US Defense Information Systems Agency
Goal: Deploy operationally Solution: Measure resiliency Benefits: Increased
relevant cyber range with high stress conditions performance and ROI
– Provide cyber warriors – Rapidly deployed – Dramatically reduced
with model of Internet operational cyber the time and cost of
and curriculum to hone range to troops creating war game
cyber defense skills exercises
– Armed staff to attack
– Support red and blue infrastructure to – Exposed warriors to
teaming exercises with measure and harden real attacks and
relevant conditions and resiliency network traffic in a
new attacks controlled environment
– Remain current with
– Enable staff to stay attack and application – Retired 100+ linear feet
current with attacks changes of racks full of
hardware