{"componentChunkName":"component---src-templates-blog-js","path":"/blog/","result":{"pageContext":{"posts":[{"node":{"id":"0c76271d-d81b-505e-919f-e77031011194","slug":"to-buy-or-to-build-a-cyber-range-that-is-the-question","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/09/ryan-quintal-97odosRYZ7w-unsplash-scaled.jpg"},"date":"2020-09-03T20:18:50.000Z","content":"<p>Distance learning is likely here to stay yet today’s cyber educators still need to find ways to meaningfully connect with their students during these socially-distant times. Cyber educators can effectively enrich student remote learning with hands-on cyber ranges. To actualize these goals to create immersive, engaging learning environments, educators must decide whether to build or buy a cyber range—yet it can be a significant decision to weigh by yourself.</p>\n<p>Circadence’s Josh Selfe provided tips and much-needed context on cyber ranges in his <a href=\"https://marketing.circadence.com/acton/media/36273/circadence-with-virginia-cyber-edu-con-virtual-event\">presentation</a> at the virtual 2020 Virginia Cyber Education Conference to help answer the question…to buy or to build a cyber range? For teachers, curriculum developers and superintendents grappling with this decision, here are a few highlights from his presentation to help make your decision a little easier.</p>\n<p>First off, cyber ranges have many uses.</p>\n<ul>\n<li><strong>Testing</strong> –Test that critical production systems are not vulnerable in an isolated and safe way.</li>\n<li><strong>Research</strong> – Conduct research on various types of cyber threats such as malware</li>\n<li><strong>Evaluation</strong> – Take a hard look at various cyber security solutions and compare their performance</li>\n<li><strong>Learning</strong> – Support remote cyber learning and growth of cyber skills using active, hands-on exercises in ranges</li>\n</ul>\n<p>If you’re going to build a cyber range, you need to think about a few important components that are necessary.</p>\n<ul>\n<li><strong>Infrastructure:</strong> A data center or access to your organization&#8217;s public cloud tenant</li>\n</ul>\n<ul>\n<li><strong>A team to Manage Your Infrastructure:</strong> A mix of expertise in networking, data storage, security, virtualization, containerization, cloud architecture, resource capacity planning, logging &amp; analytics, etc.</li>\n</ul>\n<ul>\n<li><strong>Front-and-Back End Developers:</strong> Provide a seamless registration and log-in experience for your students to access learning securely and with ease. Also, you’ll need to integrate the range into your Learning Management Solution (LMS).</li>\n</ul>\n<ul>\n<li><strong>Support Desk:</strong> Bugs and defects happen. You will need a systematized process to capture defects, communicate resolutions, and maintenance downtimes.</li>\n</ul>\n<ul>\n<li><strong>Cyber Security Experts:</strong> They must know everything an IT or cloud architect knows + the vulnerabilities associated with the technologies. Additionally, experience in scenario design is a must to create net new learning activities for users.</li>\n</ul>\n<ul>\n<li><strong>Instructors for Feedback &amp; Grading:</strong> When students are executing tasks, they need guidance and the ability to receive immediate feedback.</li>\n</ul>\n<p>If building a cyber range isn’t the best solution for you, there are available cyber ranges to buy that have all these components listed above. Circadence’s Project Ares offers quality, scalability and flexibility with a hands-on, active cyber learning solution. With Project Ares, students can receive all the benefits of training on a cyber range immediately with:</p>\n<ul>\n<li>lesson plan topics built-in</li>\n<li>an active and engaging learning experience via gamification</li>\n<li>goal achievement with leaderboard tracking</li>\n<li>task completion</li>\n<li>increased learning retention</li>\n</ul>\n<p>Project Ares is designed under a subscription-based model and it addresses all stages of the kill-chain offensive and defensive practices that a real cyber practitioner would use in their day-to-day job duties. A student can participate in team play or individual learning through foundational or specialized scenarios and will be exposed to threat emulations such as phishing, botnets, ransomware, malware and more.</p>\n<p>Our scenarios learning outcomes are aligned to NICE/NIST work role framework, which ensures  we are providing industry-standard and best practices</p>\n<p><strong>It&#8217;s a big decision to make to build or buy a cyber range</strong> and we hope some of the info above will help determine your best course of action. If building a cyber range isn’t in the best route for you, but you want a robust cyber learning journey, Project Ares can deliver an easy solution that aligns to your existing cyber course curriculum by layering in a gamified, hands-on learning component that make the remote, hybrid, or in-classroom experience engaging and fun.</p>\n<h3>For more information <span style=\"color: #ff9900;\"><a style=\"color: #ff9900;\" href=\"https://www.circadence.com/products/project-ares/academic\">check out a demo</a></span>, or visit some of these <span style=\"color: #ff9900;\"><a style=\"color: #ff9900;\" href=\"https://marketing.circadence.com/acton/media/36273/circadence-with-virginia-cyber-edu-con-virtual-event\">videos</a> </span>with more information.<strong> </strong></h3>\n<p><strong>Josh Selfe Bio: </strong></p>\n<p>Joshua Selfe has more than 14 years of experience successfully tearing down barriers and challenging perceptual limitations in order to make end-users more productive and efficient. He joined Circadence in 2018 to champion the synthetization of knowledge to facilitate company and product vision, execution, culture, team performance and business growth.</p>\n<div class=\"Vffy3\">\n<div class=\"_3Hx4x\">\n<div class=\"_1Pp3a\">\n<div class=\"mof3x\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@ryanquintal?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Ryan Quintal</a> on <a href=\"https://unsplash.com/s/photos/legos?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n","title":"To Buy or to Build a Cyber Range? That is the Question!"}},{"node":{"id":"5a7d5b95-f573-5d8e-b8d0-6896128696dc","slug":"cybersecurity-education-7-tips-for-creating-a-successful-career-pathway","status":"publish","template":"","format":"standard","featured_media":null,"date":"2020-08-19T16:59:34.000Z","content":"<p>The reality is self-evident: exponential advances in technology, the escalating complexity of systems, society’s increasing reliance on digital devices to manage daily tasks, and the global rise of significant threats posed by malicious actors ensures cybersecurity is here to stay.</p>\n<p><strong>Government entities</strong> are struggling in their efforts to recruit and retain qualified personnel to staff critical cybersecurity positions. Organizations in the private sector are recruiting talented candidates from local, state, and federal agencies at such a quick pace it is leading to critical shortages in areas directly impacting our infrastructure and national security.</p>\n<p><strong>Corporations</strong> in the private sector are inundated with new regulatory and compliance requirements for data residing in diverse geographic locations they never knew existed. They are frantically drafting policies, reallocating scarce resources, and staffing for previously “unneeded” capabilities in the midst of a 24/7 media cycle reminding them daily that they may be the next potential target of a massive data breach the cable stations consider to be newsworthy.</p>\n<p><strong>Academic institutions</strong>, once immune from the pressures of the need for immediacy and a high operational tempo, are no longer enjoying that luxury. Administrators are working tirelessly to develop relevant curricula, hire qualified instructors, and provide high-quality programs of learning for a new wave of students seeking to pursue careers in the discipline of cybersecurity.</p>\n<p>Did you spot the one missing (and often forgotten) variable in the prologue? <strong>The STUDENT</strong>.</p>\n<blockquote><p>Whether discussing traditional students in colleges and universities, or non-traditional students changing careers, their questions and concerns tend to remain constant. <em>What is cybersecurity? How can I enter this emerging field? Where should I start? Most importantly, who can I ask and where can I find the people with the answers?</em></p></blockquote>\n<p>As a cybersecurity professional with one foot in the private sector and the other foot in academia, I will offer a few tips that may serve to assist and support efforts to create a successful cyber career pathway. These tips are not relegated solely to students; educators and administrators new to this discipline who find themselves responsible for creating cybersecurity programs can benefit from these seven tips as well.</p>\n<h2 style=\"text-align: center;\">Interested in hearing more?</h2>\n<h3 style=\"text-align: center;\"><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-7-steps-to-a-support-a-successful-cyber-career-pathway\">Join our webinar</a></h3>\n<h4 style=\"text-align: center;\">&#8220;7 Steps to Supporting a Successful Cyber Career Pathway&#8221;</h4>\n<h3></h3>\n<h3><strong>#1) Research the NICE Cybersecurity Workforce Framework.</strong></h3>\n<p>The NICE CWF consists of 7 Categories, 33 Specialty Areas, 52 Work Roles, and over 2,000 KSA’s (Knowledge, Skills, and Abilities) and Tasks clearly defining expectations for current and future cybersecurity needs. It was developed by the government, academia, and the private sector to create a common lexicon and understanding for all three verticals to facilitate mutual cooperation and establish programs in support of training and workforce development needs.</p>\n<h3><strong>#2) Build professional and technical cybersecurity skills.</strong></h3>\n<p>Innovation happens at the cross-section of disciplines, and technology is only one of those disciplines. Cybersecurity demands the synthesis of many skills including critical thinking, analysis, reporting, compliance, leadership, and many others. Cybersecurity touches every profession at every level. To consider it solely through a technology lens is both self-limiting and self-defeating.</p>\n<h3><strong>#3) Acquire industry certifications to assist in the job search process.</strong></h3>\n<p>Cybersecurity certifications are valuable insofar as they provide prospective employers with known metrics and expectations of the body of knowledge possessed by the recipient of the certification. It is not a perfect system – neither certifications nor recipients are all created equal – but it does assist in establishing standards and baselines for practical cybersecurity skills. That has the potential to open doors that would otherwise remain closed to candidates.</p>\n<h3><strong>#4) Consider enrollment in a formal education program.</strong></h3>\n<p>While the training afforded by industry certifications tends to be practical and intense, programs offered by academic institutions tend to provide a much broader and in-depth understanding of the foundational concepts and comprehensive knowledge required to be successful in the cybersecurity field. In an age in which people are learning more and more about less and less, a broader base of knowledge has the potential to lead to a wider range of opportunities and successful outcomes.</p>\n<h3><strong>#5) Gain real-world experience to support a theoretical understanding of the cyber discipline.</strong></h3>\n<p>It has been said that “those who cannot do, teach.” Although that may possess some element of truth in certain disciplines, it does not apply to cybersecurity. In the military, we employed a three-part teaching methodology: explanation, demonstration, and practical application. In addition to providing soldiers with requisite training, it also built confidence and trust in the instructors’ competency levels. If you find yourself with an instructor stating, “I have never personally done cyber, but I did sleep at a Holiday Inn Express last night,” you may want to consider enrolling in a different class.</p>\n<h3><strong>#6) Build a broad foundation of knowledge before specializing.</strong></h3>\n<p>Most people I encounter seeking to enter the cybersecurity field are doing so as a result of a specific interest such as forensics, ethical hacking, vulnerability assessment, and any number of other options. I love their passion and focus but still encourage them to experience (and understand) a wider variety of disciplines before choosing to specialize in one area. This can lead to the discovery of new passions and provide higher degrees of competitive advantage when initially entering the field.</p>\n<h3><strong>#7) Start small, seek incremental wins, and accept a few losses.</strong></h3>\n<p>One of the greatest risks associated with unbridled enthusiasm is starting too fast with too much. Begin with the basics and realize that any accomplishment – even ones that fall short of grand dreams and goals – are still incremental wins trending in the right direction. The fact that your first position is processing tickets on a technical help desk, and not the CISO position for which you applied, should not leave you discouraged and questioning your decision to enter the cybersecurity field.</p>\n<p>If you are a student, an instructor, or a curriculum developer thinking about entering the realm of cybersecurity – and if you possess the desire, enthusiasm, and determination to start at “ground zero” and learn continuously – your future looks bright and is virtually without limits.</p>\n<h3><strong>AUTHOR</strong></h3>\n<p>&nbsp;</p>\n<p>Michael I. Kaplan is the Director of Phase2 Advantage, a cybersecurity training and instructional design company based in Savannah, Georgia. He is also the Chairman of the Cyber Security Advisory Committee at Savannah Technical College. The publishing division of Phase2 Advantage creates cybersecurity textbooks and workbooks listed on Amazon, Ingram&#8217;s VitalSource platform, and all major booksellers.</p>\n<p>Michael&#8217;s technical areas of specialization are Incident Response, Business Continuity / Disaster Response Planning, Information Security Management, and Digital / Network Forensics.</p>\n<p>Contact Michael at <a href=\"mailto:michael.kaplan@phase2advantage.com\">michael.kaplan@phase2advantage.com</a>.</p>\n<p>Blog post originally appeared on: <a href=\"https://www.phase2advantage.com/cybersecurity/cybersecurity-education-7-tips-for-creating-a-successful-career-pathway/\">https://www.phase2advantage.com/cybersecurity/cybersecurity-education-7-tips-for-creating-a-successful-career-pathway/</a>.</p>\n","title":"Cybersecurity Education: 7 Tips for Creating a Successful Career Pathway"}},{"node":{"id":"3e3acdd2-8b21-5578-8511-3a370f973ebf","slug":"how-cyber-professionals-can-adapt-to-shifts-to-the-cloud","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/07/c-dustin-K-Iog-Bqf8E-unsplash-scaled.jpg"},"date":"2020-08-17T18:13:07.000Z","content":"<p>If your SOC team is gearing up for a shift to the cloud in any capacity, it’s going to require a new way to think about and deploy cyber security practices. Securing physical data takes on whole new meaning when transferred to the cloud and IT professionals need to understand what the cloud IS, how it is structured, and the impacts to day-to-day cyber security roles and responsibilities.</p>\n<p>VP of Content Development Karl Gossett shared these ideas and tips for cyber training with the <a href=\"http://www.motorcityissa.com/\">Motor City ISSA Michigan Chapter</a> membership recently.</p>\n<h3 style=\"text-align: center;\"><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-20q4-transitions-to-the-cloud-considerations-for-cyber-training-and-readiness\">WATCH ON-DEMAND NOW</a></h3>\n<p><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-20q4-transitions-to-the-cloud-considerations-for-cyber-training-and-readiness\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft wp-image-12675 size-full\" src=\"https://www.circadence.com/wp-content/uploads/2020/08/August-13-webinar-screenshot.png\" alt=\"cyber training webinar\" width=\"760\" height=\"452\" srcset=\"https://staging.circadence.com/wp-content/uploads/2020/08/August-13-webinar-screenshot.png 760w, https://staging.circadence.com/wp-content/uploads/2020/08/August-13-webinar-screenshot-300x178.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" /></a></p>\n<p>Karl asked several thought-provoking questions that might be the same questions you’ve wondered about as well. It’s important to work through what these questions are so that we can gain more clarity on the complexity and ambiguity of the cloud and how it can impact you and fellow IT professionals.</p>\n<ul>\n<li><em>How well do you know your cloud provider and what it has to offer? </em></li>\n<li><em>What challenges does the cloud bring forth? </em></li>\n<li><em>What new demands do IT professionals need now? </em></li>\n<li><em>How do we train and build cyber competencies to work better (and more efficiently) in the cloud? </em></li>\n</ul>\n<p>While the promise of the cloud is great, there are many nuances and details that impact IT professionals’ abilities to keep data safe in new environments like that.</p>\n<blockquote><p>“Transitioning to something new is always uncomfortable but I think it’s even more uncomfortable here because learning new technologies can be something that isn’t as enjoyable anymore since it’s in-demand by your company and you know that if you fail, that actually matters.”</p></blockquote>\n<p>Karl emphasized that if you can’t build components from scratch for the cloud, you’re likely going to be making a transition and it’ll be really challenging; not to mention complicated by an underlying architecture that you don’t control, with security that you don’t control, and in some cases don’t have visibility or understanding of how the architecture is protected. However, Karl concludes that while the cloud seems daunting, the grounding force of persistent cyber training is critical to keep information security professionals afloat during turbulent times.</p>\n<p>&nbsp;</p>\n","title":"How Cyber Professionals Can Adapt to Shifts to the Cloud"}},{"node":{"id":"ef3a8d3e-1053-5c3a-a2e0-0f194366d195","slug":"transforming-distance-learning-technology-and-tools-for-todays-educators","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/08/nesa-by-makers-BVr3XaBiWLU-unsplash-1-1-scaled.jpg"},"date":"2020-08-05T15:28:50.000Z","content":"<p>From pre-school to Ph.D. programs, education is undergoing a sea-change.  Due to the immediacy of pandemic defense, it was necessary to jump into online meeting apps in March 2020 for everything from storytime with the librarian to class lectures to dissertation defense. But the experiences of the last few months have shown us that ‘distance learning’ must continue to evolve to be more intuitive, more engaging, and more accessible for instructors and students across the education spectrum.</p>\n<p>Three trends are already clear:</p>\n<ol>\n<li>Hybrid and multi-modal learning are here to stay.</li>\n<li>Students are asking for customized learning experiences to include career building and community interactions</li>\n<li>Learning Management Systems for instructors must quickly expand to Learning Experience Systems that unite multi-modal learning for instructors AND students into digital hubs that deliver engagement and collaboration.</li>\n</ol>\n<p>Circadence and Microsoft shared insights about technology and distance learning solutions in a recent Circadence hosted webinar.  Experts talked about how Circadence’s Project Ares (specific to cyber security education) and Microsoft’s Teams for Education and Azure Labs (both applicable across learning disciplines) deliver solutions that address the three trends mentioned above.</p>\n<ul>\n<li><strong><em>Project Ares</em></strong> is an on-demand cyber range with integrated cyber scenarios that gives users hands-on experience as close to real work experience as possible short of doing an internship. This is a true career building tool.</li>\n<li><strong><em>Microsoft Teams for Education</em></strong> is a Learning Experience Platform for classrooms and course programs of all sizes. All sorts of tools and applications (course material and videos, calendars, assignments, assessments, and AI-driven analytics) can be snapped to the Teams hub for easy access by instructors and students.</li>\n<li>Students use computer labs at high schools and universities for everything from word processing to applied research, big data computing to robotics and artificial intelligence. While physical computer labs are closed, and even after they open again, <em><strong>Microsoft Azure Labs</strong></em> provides a way to offer all this compute capability online in a way that is 1-2-3 simple for instructors to set up and students to access.</li>\n</ul>\n<blockquote><p><em>“It’s more important than ever to sustain engagement.  Collaborative environments like Microsoft Teams and Circadence Project Ares are necessary to replace many things that we take for granted with ‘in person’ education. Using dashboards to see student progress and then reaching out for 1:1 communication in email or chat apps or video meetings helps to foster engagement beyond just the video lecture.</em> “  ~ Dr. Brad Hayes, University of Colorado &#8211; Boulder and Circadence.</p></blockquote>\n<p>Teaching online is not easy and it is <em>not </em>as simple as giving the same lecture in a meeting app as you would in a classroom.  Sustaining real and meaningful connection between instructors and students who are now all physically distant is the new normal.</p>\n<p>Educators are realizing that they will need to teach in remote or hybrid environments for a longer timeframe than they originally expected (and probably prefer). As a result, they are working with fellow colleagues and technology procurement decision-makers to understand how (if at all) technology can support their remote teaching pedagogy in a way that is unifying and collaborative, not divisive and barrier building. With these intentions in mind, we thought the below quote from C.S. Lewis captured the mindset for technology adoption in distance learning best.</p>\n<blockquote><p>“You never know what you can do until you try, and very few try unless they have to.” <em>–C.S. Lewis</em></p></blockquote>\n<p>We honor all the dedicated educators who find themselves in ‘have to’ mode and are working hard to learn new skills, new tools, new teaching techniques, and new communication methods to deliver the very best educational experience they can for their students in these changing times.  We send an enthusiastic ‘Thank you’ to all educators!</p>\n<h3><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-transform-distance-learning-through-creative-and-practical-technology-focus-on-cybersecurity-education\">Check out the webinar</a></h3>\n<p>to learn more about online tools that can keep your teaching on track AND help bridge the &#8216;engagement gap&#8217; with your students.</p>\n<h3></h3>\n","title":"Transforming Distance Learning: Technology and Tools for Today’s Educators"}},{"node":{"id":"aa12dc7a-16d6-5634-8e49-3b14f2ec4de9","slug":"starting-a-cyber-security-career-a-presentation-for-summer-discovery","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/07/photo-1579379424253-5aa0a5e1f110.jpg"},"date":"2020-07-28T21:34:09.000Z","content":"<p>Our <a href=\"https://www.circadence.com/company/leadership\">VP of Strategy Josh Selfe</a> recently presented to a cohort of students from the <a href=\"https://www.summerdiscovery.com/\">Summer Discovery</a> program online.  With more than 500,000+ cyber security job openings across the U.S. today (CyberSeek.org) and <a href=\"https://cybersecurityventures.com/only-3-percent-of-u-s-bachelors-degree-grads-have-cybersecurity-related-skills/\">only 3% of bachelor&#8217;s degree graduates</a> have cyber-related skills, there is a clear need to communicate the routes to starting a cyber security career path to today&#8217; students.</p>\n<p>Josh discussed several key points related to pursuing a career in cyber security. Namely:</p>\n<ul>\n<li>Myths and misconceptions behind the field of cyber security</li>\n<li>How interconnected our common devices are (and prone to cyber-attacks) &#8212; cyber is relevant to everyone in and outside the IT field</li>\n<li>Steps to exploring specific disciplines in the vast world of cyber security\n<ul>\n<li>Follow cyber and IT influencers online to learn vernacular and specialty areas</li>\n<li>Learn about specific subsets of cyber practices and tools</li>\n<li>Gain hands-on experience building skills in a gamified cyber range</li>\n</ul>\n</li>\n<li>Technical, professional and academic skills needed to thrive in the sector</li>\n</ul>\n<p>Watch the entire presentation below and let us know what steps you took to enter into a cyber career that the future workforce may find helpful.</p>\n<div style=\"width: 640px;\" class=\"wp-video\"><!--[if lt IE 9]><script>document.createElement('video');</script><![endif]-->\n<video class=\"wp-video-shortcode\" id=\"video-12631-1\" width=\"640\" height=\"427\" preload=\"metadata\" controls=\"controls\"><source type=\"video/mp4\" src=\"https://www.circadence.com/wp-content/uploads/2020/07/zoom_01.mp4?_=1\" /><a href=\"https://www.circadence.com/wp-content/uploads/2020/07/zoom_01.mp4\">https://www.circadence.com/wp-content/uploads/2020/07/zoom_01.mp4</a></video></div>\n<p>&nbsp;</p>\n<h3>Other resources</h3>\n<p><a href=\"https://www.circadence.com/blog/how-to-launch-a-cyber-security-career/\">How to launch a cyber career </a><br />\n<a href=\"https://www.circadence.com/blog/what-you-need-to-know-about-cyber-security-career\">What you need to know about a cyber career</a><br />\n<a href=\"https://marketing.circadence.com/acton/media/36273/webinar-kickstarting-a-cyber-career-2019-11\">Kickstarting a cyber career</a> (webinar)</p>\n","title":"Starting a Cyber Security Career: a Presentation for Summer Discovery"}},{"node":{"id":"00f06662-9357-5689-b15d-0ce3819ffe79","slug":"cyber-learning-during-the-pandemic-online-training-and-networking","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/07/yusuf-evli-Y82YTEmID68-unsplash-scaled.jpg"},"date":"2020-07-21T13:21:55.000Z","content":"<p><span data-contrast=\"auto\">We’re living and working in a virtual world these days since the pandemic halted the </span><span data-contrast=\"auto\">traditional and routine </span><span data-contrast=\"auto\">in-person activity. </span><span data-contrast=\"auto\">For </span><span data-contrast=\"auto\">c</span><span data-contrast=\"auto\">yber professional</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">you </span><span data-contrast=\"auto\">may feel </span><span data-contrast=\"auto\">challenged more than ever to work and learn remotely. Yet those challenges shouldn’t stall </span><span data-contrast=\"auto\">your</span><span data-contrast=\"auto\"> ability to learn. </span><i><span data-contrast=\"auto\">Learning can happen anywhere</span></i><span data-contrast=\"auto\">…</span><span data-contrast=\"auto\">and as we’ve all experienced, out of times of chaos and uncertainty, can emerge opportunity. </span><b><span data-contrast=\"auto\">There’s never been a more ideal time to </span></b><b><span data-contrast=\"auto\">advance</span></b><b><span data-contrast=\"auto\"> in the cyber security profession than now.</span></b><b><span data-contrast=\"auto\"> </span></b></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">You</span><span data-contrast=\"auto\"> have</span><span data-contrast=\"auto\"> to</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">keep company networks and systems </span><span data-contrast=\"auto\">hardened </span><span data-contrast=\"auto\">now that access and utiliz</span><span data-contrast=\"auto\">ation is occurring</span><span data-contrast=\"auto\"> remotely. </span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">You are having to monitor systems and devices closer since more adversary attacks are on the rise since the pandemic. </span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">You’re having to ensure all employees practice cyber safety.</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">And so much more! </span></li>\n</ul>\n<p><span data-contrast=\"auto\">So we’re taking this article to speak to all the c</span><span data-contrast=\"auto\">yber analysts, IT managers</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">network security administrators</span><span data-contrast=\"auto\">, and </span><span data-contrast=\"auto\">like-minded </span><span data-contrast=\"auto\">cyber </span><span data-contrast=\"auto\">professionals to say: </span><b><span data-contrast=\"auto\">you </span></b><b><span data-contrast=\"auto\">have </span></b><b><span data-contrast=\"auto\">great</span></b><b><span data-contrast=\"auto\"> opportunit</span></b><b><span data-contrast=\"auto\">y</span></b><b><span data-contrast=\"auto\"> to upskill and retool virtually – </span></b><b><span data-contrast=\"auto\">you </span></b><b><span data-contrast=\"auto\">just have to know </span></b><b><span data-contrast=\"auto\">where to look.</span></b><b><span data-contrast=\"auto\"> </span></b><b><span data-contrast=\"auto\"> </span></b><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">It’s possible to </span><span data-contrast=\"auto\">stay </span><span data-contrast=\"auto\">active</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">in</span><span data-contrast=\"auto\"> the industry and continue</span><span data-contrast=\"auto\"> to</span><span data-contrast=\"auto\"> advanc</span><span data-contrast=\"auto\">e</span><span data-contrast=\"auto\"> skills with professional IT/cyber groups, online trainings, </span><span data-contrast=\"auto\">engagement with </span><span data-contrast=\"auto\">cyber game</span><span data-contrast=\"auto\"> activities</span><span data-contrast=\"auto\"> and more. Here are a few </span><span data-contrast=\"auto\">opportunities </span><span data-contrast=\"auto\">you’ll benefit from</span><span data-contrast=\"auto\">: </span><span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Online Cyber Training </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p><span data-contrast=\"auto\">There’s an increase in cyber-attacks since the pandemic with more professionals working remotely (some on their own personal devices). N</span><span data-contrast=\"auto\">ew threats </span><span data-contrast=\"auto\">are becoming more prevalent </span><span data-contrast=\"auto\">and </span><span data-contrast=\"auto\">the need to </span><span data-contrast=\"auto\">protect company </span><span data-contrast=\"auto\">data has heightened</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">As a cyber professional, you </span><span data-contrast=\"auto\">need </span><span data-contrast=\"auto\">the flexibility and access to upskill on </span><span data-contrast=\"auto\">your </span><span data-contrast=\"auto\">terms, so </span><span data-contrast=\"auto\">you </span><span data-contrast=\"auto\">know </span><b><i><span data-contrast=\"auto\">how</span></i></b><i><span data-contrast=\"auto\"> </span></i><span data-contrast=\"auto\">to </span><span data-contrast=\"auto\">tackle the hottest problems in </span><span data-contrast=\"auto\">your </span><span data-contrast=\"auto\">company’s cyber security arena. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"none\">This means </span><span data-contrast=\"none\">you </span><span data-contrast=\"none\">need the ability to “break things” in virtual environments, test out new cyber defense tactics and learn new tools and procedures. </span><span data-contrast=\"none\">Right? </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"none\">Luckily, </span><span data-contrast=\"none\">online cyber </span><span data-contrast=\"none\">training platforms </span><span data-contrast=\"none\">make </span><span data-contrast=\"none\">it easy</span><span data-contrast=\"none\">, accessible</span><span data-contrast=\"none\"> and fun for cyber professionals to learn new skills from anywhere</span><span data-contrast=\"none\">,</span><span data-contrast=\"none\"> at a pace that works for them. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">Circadence’s </span><a href=\"https://www.circadence.com/products/project-ares\"><span data-contrast=\"none\">Project Ares </span><span data-contrast=\"none\">hands-on</span><span data-contrast=\"none\"> training platform</span></a><span data-contrast=\"auto\"> allows </span><span data-contrast=\"auto\">you </span><span data-contrast=\"auto\">to build skills via engaging</span><span data-contrast=\"auto\">, specialized scenario activities. </span><b><span data-contrast=\"auto\">G</span></b><b><span data-contrast=\"auto\">amification and intelligent tutoring</span></b><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">helps</span><span data-contrast=\"auto\"> attract and sustain </span><span data-contrast=\"auto\">your </span><span data-contrast=\"auto\">attention while </span><b><span data-contrast=\"auto\">real virtual machines and real content </span></b><span data-contrast=\"auto\">teach </span><span data-contrast=\"auto\">foundational and specialized </span><span data-contrast=\"auto\">cyber practices you’d experience in the workplace. It gives </span><span data-contrast=\"auto\">practitioners like you </span><span data-contrast=\"auto\">the ability to </span><span data-contrast=\"auto\">address real, current cyber threats across multiple industr</span><span data-contrast=\"auto\">y settings</span><span data-contrast=\"auto\">, providing a comprehensive level of knowledge and practical experience.</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<h4 style=\"text-align: center;\"><a href=\"https://www.circadence.com/products/project-ares\">Learn more about Project Ares subscription plans</a></h4>\n<p>Available for both Individual Learning (Academy &amp; Professional Subscriptions) &amp; for Organizations/Academic Classrooms (Academy Plus &amp; Enterprise Subscriptions)</p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Network with </span><span data-contrast=\"none\">InfoSec and C</span><span data-contrast=\"none\">yber Experts Online</span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p><span data-contrast=\"auto\">Cyber professionals are in high demand right now</span><span data-contrast=\"auto\">. A</span><span data-contrast=\"none\">ccording to </span><a href=\"https://www.isc2.org/-/media/ISC2/Research/2019-Cybersecurity-Workforce-Study/ISC2-Cybersecurity-Workforce-Study-2019.ashx?la=en&amp;hash=D087F6468B4991E0BEFFC017BC1ADF59CD5A2EF7\"><span data-contrast=\"none\">a report</span></a><span data-contrast=\"none\"> from cyber</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">security nonprofit (ISC)</span><span data-contrast=\"none\">2</span><span data-contrast=\"none\"> there are currently about 2.8 million cyber</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">security professionals around the world, but that workforce</span><span data-contrast=\"none\"> volume</span><span data-contrast=\"none\"> would need to </span><span data-contrast=\"none\">increase </span><span data-contrast=\"none\">by 145% to meet the global demand.</span><span data-contrast=\"auto\"> Since cyber careers are in high demand</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> it’s important </span><span data-contrast=\"auto\">for cyber professionals to network and put themselves out there</span><span data-contrast=\"auto\">…</span><i><span data-contrast=\"auto\">online</span></i><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> A few </span><span data-contrast=\"auto\">underrated </span><span data-contrast=\"auto\">ways professionals can use digital </span><span data-contrast=\"auto\">channels </span><span data-contrast=\"auto\">to </span><span data-contrast=\"auto\">learn</span><span data-contrast=\"auto\"> are: </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Wingdings\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Follow and engage with cyber </span><span data-contrast=\"auto\">influencers </span><span data-contrast=\"auto\">on social media (i.e.; Twitter, Linked</span><span data-contrast=\"auto\">I</span><span data-contrast=\"auto\">n, Facebook) </span><span data-ccp-props=\"{}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Wingdings\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Track topical hashtags like #cybertraining #cybersecurity #blackhat</span><span data-contrast=\"auto\"> #infosec #digitalforensics #hackathons </span><span data-ccp-props=\"{}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Wingdings\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Join cyber professional groups on LinkedIn </span><span data-contrast=\"auto\">or read articles on H</span><span data-contrast=\"auto\">ackernoon</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Wingdings\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Participate in virtual conferences or online meet-ups such as the </span><a href=\"https://www.meetup.com/DCCyberWarriors/\"><span data-contrast=\"none\">DC Cybersecurity Professionals</span></a><span data-contrast=\"auto\"> or </span><a href=\"https://www.meetup.com/Bay-Area-Cyber-Security-Meetup/\"><span data-contrast=\"none\">Bay Area Cybersecurity Meet-up</span></a><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></li>\n</ul>\n<h3><span data-ccp-props=\"{&quot;335559685&quot;:720}\"> </span><span data-contrast=\"none\">Keep Learning, Connecting, Growing, Protecting </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p><span data-contrast=\"auto\">Dramatic </span><span data-contrast=\"auto\">changes in cyber threat frequency, remote working, system access and online meetings are</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">impacting how and where cyber professionals like yourself train and upskill. </span><span data-contrast=\"auto\">It’s important for all of us to continue to take part in being cyber-safe personally and professionally, but also to do our part in keeping the companies we work for</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> and the broader economy</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> safe from the increasing prevalence of costly cyber-attacks.</span></p>\n<p>While you may be feeling<span data-contrast=\"auto\"> overwhelmed with existing workloads, ill-equipped to address new threats, or simply feeling shut off from the rest of the world, know there are options in our expansive virtual world to connect with c</span><span data-contrast=\"auto\">olleagues, build useful skills, advance in your career and help your company thrive during these uncertain and unprecedented times. You got this! </span></p>\n<p>&nbsp;</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x\">\n<div class=\"_1Pp3a\">\n<div class=\"mof3x\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@yusufevli?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Yusuf Evli</a> on <a href=\"https://unsplash.com/s/photos/learn?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n","title":"Cyber Learning During the Pandemic: Online Training and Networking "}},{"node":{"id":"2c003c3d-86f3-59f6-bfa2-45942f8e885d","slug":"real-world-cyber-security-experience-from-learning-to-earning","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/07/joshua-ness-bEZ_OfWu3Y-unsplash-scaled.jpg"},"date":"2020-07-06T14:49:32.000Z","content":"<p>Real world, experiential learning helps students develop knowledge, skills, and abilities that they can take directly from the classroom to the workplace.</p>\n<p>This direct connection from learning to earning is important to all students, but none more so than adult learners who have gone back to school, often while continuing to work full-time. Maybe their goal is to grow in their current job role or career. Maybe they are ramping up for a job or career change. Maybe they are exploring new interests. Regardless of motivation, after juggling the many demands of working while going to school, most adult learners expect to graduate with skills that they can immediately apply in the workforce or other direct activity.</p>\n<p>To say that the cyber security industry is seeking skilled job candidates is an understatement.  <a href=\"https://cybersecurityventures.com/jobs/\">Cybersecurity Ventures</a> predicts that there will be 3.5 million (that’s million) <em>unfilled </em>cybersecurity jobs globally by 2021.   The interactive <a href=\"https://www.cyberseek.org/heatmap.html\">Cyber Seek website</a> shows over 500,000 U.S. cybersecurity job openings as I write.  With gaps of this magnitude between open jobs and applicants, cyber security is a perfect discipline for educators to focus on and provide experiential learning that students can directly apply outside the classroom.</p>\n<p><span style=\"color: #000000;\"><strong>Capella University</strong></span>, an online university headquartered in Minneapolis, Minnesota, recently did just that by adding a hands-on lab component to the capstone course for its <em>BS in Information Technology, Information Assurance and Cybersecurity</em> program.  One of their over-arching design goals was to make the course as close as possible to the “real world” of cyber security work. We are proud that they chose <a href=\"https://www.circadence.com/products/project-ares\">Project Ares by Circadence</a> to deliver this critical element.</p>\n<p>In a <a href=\"https://marketing.circadence.com/acton/media/36273/webinar-how-capella-university-adopted-hands-on-learning-with-project-ares\">recent Circadence webinar</a>, Dr. James W. Barker, Adjunct Faculty in the School of Business and Technology spoke in detail about the process the team at Capella went through to integrate Project Ares into their capstone course.  Project Ares enabled them to address three objectives:</p>\n<ol>\n<li>Give students hands-on practice using their cyber skills against a variable adversary</li>\n<li>Provide authentic learning scenarios that students could report on to demonstrate their knowledge of the attack and recommendations for future prevention</li>\n<li>Create an opportunity for teamwork and collaborative problem solving, which are essential skill requirements for cyber teams and hiring managers</li>\n</ol>\n<blockquote><p>“By the end of the second week of the course,” said Dr. Barker, “almost to an individual, students stated that this is the most realistic, engaging, and challenging course that they have taken.  One group was so engaged and motivated by working on the Project Ares platform that they completed their final group mission two weeks early.”</p></blockquote>\n<p>From his faculty point of view, Dr. Barker is pleased that Capella has delivered the equivalent of a formal cyber security internship and cannot envision a better means of exposing their learners to “real world” security work.  And Capella isn’t stopping here; they are considering plans to incorporate Project Ares learning exercises into other courses at the undergraduate and graduate level.</p>\n<h4><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-how-capella-university-adopted-hands-on-learning-with-project-ares\">Check out the webinar</a> where Dr. Barker shares more about <strong><em>how he set up the course syllabus</em></strong> and learn more about the power of Project Ares as an on-demand and hands-on learning platform ​that uses cyber range-as-a-service technology to deliver Virtual Machine-based cyber security training exercises.</h4>\n<p>&nbsp;</p>\n<p class=\"_2himp _1eXFm\"><span style=\"font-size: 10pt;\">Photo Credit: Thanks to <a href=\"https://unsplash.com/@theexplorerdad\">Joshua Ness</a> for sharing their work on Unsplash.</span></p>\n","title":"Real World Cyber Security Experience: From Learning to Earning"}},{"node":{"id":"1b5e18cb-6e72-506d-a866-4d47a4fdcd10","slug":"3-ways-tech-companies-can-improve-the-talent-acquisition-process","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/06/christina-wocintechchat-com-vzfgh3RAPzM-unsplash-scaled.jpg"},"date":"2020-06-23T15:37:42.000Z","content":"<p>It’s reasonable to correlate the quality of the talent acquisition process to the quality of employees in the company– which is tied to the success of the company. Yet, there is currently a shortage of qualified experts in field of cyber security and there has been for quite some time. And while tech companies have pulled back the reins on hiring tech talent due to the economic consequences of the coronavirus outbreak, reports <a href=\"https://www.cnbc.com/2020/04/23/tech-companies-pull-back-on-hiring.html\" target=\"_blank\" rel=\"noopener noreferrer\">CBNC</a>, more emphasis is being placed on preserving team member jobs and revitalizing the hiring process as we all prepare to re-open and heal. <em>Out of the chaos of recent events comes opportunity</em> and <em>tech companies are showing more resilience than ever</em> as tech leaders identify pragmatic ways to staff up. We’ve got three foundational tips to help hiring managers and senior cyber security / IT leaders fill their cyber talent and candidate pools with qualified professionals who not only look good on paper, but can demonstrate their qualifications.</p>\n<p>But before we dig into those recommendations, let’s establish some context first.</p>\n<h2>State of the cyber security talent in the tech sector</h2>\n<p>The role of the cyber security professional continues to develop and gain more authority and responsibility as the security landscape and the integration of business and technology evolves.</p>\n<p>When we look at the current climate of cyber security jobs in the U.S., we see bleak yet in-demand overtones. Finding qualified cyber talent and candidates is very much like searching for a needle in a haystack for hiring managers and recruiters.</p>\n<ul>\n<li>It takes an average of 3-6 months to fill a cyber security job position (<a href=\"https://www.darkreading.com/cloud/it-takes-an-average-of-3-to-6-months-to-fill-a-cybersecurity-job/d/d-id/1334135\" target=\"_blank\" rel=\"noopener noreferrer\">Dark Reading</a>)</li>\n<li>In 2019, there were over 700,000 unfilled IT jobs in the U.S. (<a href=\"https://www.cnbc.com/2019/06/18/there-are-70000-open-tech-jobs-here-is-how-firms-are-hiring-for-them.html\" target=\"_blank\" rel=\"noopener noreferrer\">CNBC</a>)</li>\n<li>Employment of computer and information technology occupations is projected to grow 12 percent from 2018 to 2028 (<a href=\"https://www.bls.gov/ooh/computer-and-information-technology/home.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Bureau of Labor Statistics</a>)</li>\n</ul>\n<p>While all companies likely struggle to find qualified cyber talent, the technology sector has its own unique set of challenges that are important to discuss and be aware of. Emerging technology, disruptive tech, the sheer evolution and the fast-paced nature of the industry make it hard to find candidates who have <em>experience and knowledge</em> in <em>specialized areas</em> of technology­–many of which are just now becoming adopted into businesses.</p>\n<ul>\n<li>Systems and cyber security analysts are the leading tech occupation jobs in the U.S. today, sitting at over 740,000 (<a href=\"https://www.cyberstates.org/#interactiveMap?geoid=0__usa\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Bureau of Labor Statistics, EMSI, and CompTIA; estimates for 2019</a>).</li>\n<li>The skills gap for cyber professionals is most clear in the technology sector, reports <a href=\"https://www.forbes.com/sites/ryancraig/2019/11/26/closing-the-cybersecurity-skills-gap/#11094a2674a8\" target=\"_blank\" rel=\"noopener noreferrer\">Forbes</a>.</li>\n<li>IT employment dropped 5,300,000 jobs, the single largest month drop since March 2009 (<a href=\"https://www.techservealliance.org/files/May%202020%20Index.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TechServe Alliance</a>).</li>\n</ul>\n<p>IT, security managers, operators and human resource leaders realize that:</p>\n<ol style=\"list-style-type: lower-alpha;\">\n<li>they need to focus on filling positions with quality candidates who can demonstrate their skills in a skills-deprived landscape</li>\n<li>to achieve that objective, more can be done in the recruitment and hiring phase.</li>\n</ol>\n<p>Okay, let’s talk about those recommendations now. And if you have more suggestions based on what’s worked with your company, let us know!</p>\n<h2>Promote from within</h2>\n<p>The first logical step in filling a cyber position is to promote from within the company. It saves on time and cost to recruit. There may be IT generalists in your company who desire to take their career to a new level in cyber security and you’re just not aware of it (…and may have the aptitude and willingness to learn).</p>\n<p>If an IT generalist is interested in filling a needed cyber security position (e.g. information security engineer, network architect, systems analyst), consider giving them a project to test their skills and ambition and see how they do. More on this in a second.</p>\n<p>To promote from within, ensure you’ve communicated the requirements of the position clearly to the company across all departments. People in cyber security positions come from all walks of life: computer science, history, military, political science, yes, even fields like philosophy. Yet they all have one thing in common: They share a deep and abiding interest in how technology works, notes <a href=\"https://www.cyberdegrees.org/resources/transitioning-from-general-it/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Degrees</a>.</p>\n<p>So find those individuals who are looking to grow into a new position within the company and interview them. You may be surprised to learn there are passionate people willing to learn and grow, right in your own company ‘backyard.’</p>\n<h2>Test skills during the interview process</h2>\n<p>Allow candidates the opportunity to demonstrate what’s on their resumé. Online cyber training platforms like <a href=\"https://www.circadence.com/products/project-ares\" target=\"_blank\" rel=\"noopener noreferrer\">Project Ares</a> can help HR managers and decision makers ‘see’ how a prospect might tackle a realistic cyber security issue.</p>\n<p>·     Evaluate candidate skills in real-time against resumé credentials</p>\n<p>·     Assess cyber competencies against other candidates and co-workers</p>\n<p>·     Identify strengths in cyber technique, tactics, and procedures</p>\n<p>By completing a set of tasks or activities that put skills like digital forensics, Linux skills, ports and protocols, and regular expressions work, candidates can show employers what they know and how they work before they even move on to a second or third interview. It’s one thing to talk about your experience, it’s another to actually apply it in a realistic setting.</p>\n<h3>Use Project Ares to support internal hiring processes</h3>\n<p>Circadence’s Project Ares platform helps HR decision makers assess candidate skills and competencies in various aspect of cyber security. And the platform can work for both internal recruitment and external recruitment. If promoting from within and you identify interested candidates who may or may not have a rich cyber background, you can use the platform’s cyber learning games and foundational scenarios to learn aspects of cyber security and security operations in &#8216;safe&#8217; cyber range environments. If candidates demonstrate a willingness to learn in the platform, that is a good sign. If they are able to follow the guidance and instructions and apply critical thinking to complete the scenarios in the platform, even better. Hiring mangers can literally ‘see’ how an internal candidate responds to the act of learning and one can glean a lot about a candidate’s fit for the position simply through this effort of cyber aptitude testing.</p>\n<h3>Use Project Ares to support external hiring processes</h3>\n<p>The same applies for external hiring of cyber security professionals. Hiring managers and cyber security leaders can use Project Ares foundational and specialized scenarios to teach certain cyber skills they are looking for. If you’re looking to fill a position that aligns to a NIST/NICE work role, several exercises in the platform can address those specific skill sets. Further, the Assessment Reports can help HR professionals evaluate candidate strengths and compare those results against other candidates who have engaged in the platform to identify the best company cultural fit and skills fit.</p>\n<p>·     Nurture qualified candidates in the platform</p>\n<p>·     Retain top talent with professional skills development efforts in the platform</p>\n<p>A <a href=\"https://www.wsj.com/articles/technology-sector-shed-record-number-of-jobs-in-april-11588974127\" target=\"_blank\" rel=\"noopener noreferrer\">Wall Street Journal article</a>, sums up the ‘what’s next?’ to these challenges, succinctly:</p>\n<p><em>Tom Gimbel, CEO of LaSalle Network Inc., a technology staffing and recruiting firm, said that once the crisis fades he expects a rebound in tech hiring as businesses seek out technology tools to cut costs and eke out efficiencies during a prolonged economic recovery.</em></p>\n<blockquote><p><em>“While new product implementations will slow down, we will see strong hiring of corporate IT, infrastructure, development and security roles,” Mr. Gimbel said.</em></p></blockquote>\n<h2></h2>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x\">\n<div class=\"_1Pp3a\">\n<div class=\"mof3x\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@wocintechchat?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Christina @ wocintechchat.com</a> on <a href=\"https://unsplash.com/s/photos/hiring?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n","title":"3 Ways Tech Companies Can Improve the Talent Acquisition Process"}},{"node":{"id":"54ba01be-3163-5042-bfdc-c53b78d67b2b","slug":"how-person-centered-cyber-training-supports-threat-prevention-in-financial-companies","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/06/austin-distel-EMPZ7yRZoGw-unsplash-scaled.jpg"},"date":"2020-06-16T18:51:40.000Z","content":"<p>Cyber security threats and preventive measures go hand-in-hand. Yet cybercrime continues to impose threats on the financial industry. Financial services firms are 300 times as likely as other companies to be targeted by a cyberattack,” according to <a href=\"https://securityboulevard.com/2019/11/10-statistics-that-summarize-the-state-of-cybersecurity-in-financial-services/\">a report by the Boston Consulting Group</a>. These threats can arise at any time and occur through various sources (external sources such as hackers, and internal sources such as staff members and contracted employees). Some financial companies have developed action plans with steps to take if a cyber-attack strikes, but cyber security best practices also includes establishing and initiating threat prevention methods. One example of a threat prevention method is person-centered cyber training.</p>\n<p>Statistics show that cyber threat prevention is an immense pain point for many financial companies. <a href=\"https://www.prnewswire.com/news-releases/synopsys-and-ponemon-release-new-study-highlighting-software-security-practices-and-challenges-in-the-financial-services-industry-300894781.html\">In a survey</a> of 400 security professionals in financial services, it was observed that financial institutions are better at detecting and containing cyber-attacks and less efficient at preventing them. Almost 56% of financial institutions are useful in detection, and only 31% are good at prevention.</p>\n<h3><strong>Financial services institutions must understand how to prevent cyber threats, which may require a ground-up approach</strong>.</h3>\n<p>Financial institutions can take immediate measures to engage in threat prevention methods with person-centered training. This type of training allows an IT or cyber professional to practice and hone skills by learning specific cyber lessons pertinent to the financial sector and applicable to their job role. The more upskilled the professional, the more they will be able to protect the company and company assets. A current platform that offers specific job role training is Project Ares.</p>\n<h2>Person-Centered Training with Project Ares</h2>\n<p>Circadence’s Project Ares is a browser-based learning platform designed for teaching cyber security in an engaging and hands-on applied method. This platform offers gamification and AI to train employees on the latest cyber threats and attacks. Project Ares is made up of foundational and specialized scenarios in the form of battle rooms and missions that address current cyber threats in the financial sector. The lessons within Project Ares are developed with specific job roles in mind.</p>\n<p>For example, various scenarios are developed with the theme of a financial service, so the trainee can learn the skills needed to prepare for a cyber threat. In these specific financial missions, the trainee will learn how to <strong>disable botnets</strong>, <strong>identify and remove suspicious malware, </strong>and<strong> protect the financial institution. </strong></p>\n<ul>\n<li><strong>Mission 1 – Operation Goatherd “Disable Botnet” – </strong>Acting as a cyber mission force member, the trainee will access the command and control server of a group of hackers to disable a botnet network that is designed to execute a widespread financial scan triggering the collapse of a national bank.</li>\n<li><strong>Mission 4 – Operation Arctic Cobra “Stop Malicious Processes” – </strong>The cyber trainee will analyze network traffic and stop a malicious exfiltration process.</li>\n<li><strong>Mission 5 – Operation Wounded Bear “Protect Financial Institution” – </strong>The trainee identifies and removes malware responsible for identity theft and protects the financial network from further infections.</li>\n</ul>\n<p>This individual or team-based mission training delivers collaborative skill-building experiences aligned to NIST/NICE work roles, ensuring the trainee meets specific cyber competencies. This kind of immersive, hands-on training gives learners the ability to practice various forms of threat prevention, which will benefit the company’s overall security posture in the long run.</p>\n<p>The more trained cyber professionals are for their job roles, the more likely they will be able to safeguard against threats—and take proactive measures to better prevent cyber threats. If cyber professionals are prepared and well-informed with the right knowledge and skills in their toolbox, threat prevention will be more attainable and achievable for professionals on the frontlines of defense. Professionals will be able to spot a cyber threat, but also prevent cyber threats from breaking the bank.</p>\n<p>&nbsp;</p>\n<div id=\"app\" aria-hidden=\"true\">\n<div>\n<div class=\"_2vZEJ\">\n<div class=\"Vffy3\">\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x\">\n<div class=\"_1Pp3a\">\n<div class=\"mof3x\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@austindistel?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Austin Distel</a> on <a href=\"https://unsplash.com/s/photos/finance?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"How person-centered cyber training supports threat prevention in financial companies"}},{"node":{"id":"d4a00928-c652-5c2c-a18d-0f047d71f52f","slug":"living-our-mission-circadence-collaborates-with-academia-and-army-to-support-cyber-range-virtual-environment-replication-and-construction-with-n-craf","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/10/Its-Time-to-Consider-a-Career-in-Cybersecurity.jpg"},"date":"2020-06-12T15:30:52.000Z","content":"<p>Circadence announced in May 2020 the latest development of an automated network mapping tool for IT use, based on collaborative work with Mississippi State University engineers and researchers. Circadence has had a six-year partnership with the university and the Threat Systems Management Office of Redstone Arsenal (TSMO) and has worked on several projects over the years to solve challenges related to National Defense. We sat down with two of our Circadence personnel: Dwayne Cole, the JMN NOSC (Network Operation and Security Center) Operations Manager and Craig Greenwood, Project Manager with Opposition Force/Advanced Red Team Intrusion Capabilities to understand more about the tool and learn about the benefits it provides to the technology community at large.</p>\n<p>The <strong>Netmapper/Cyber Range Automation Framework (N/CRAF)</strong> project started as two separate projects, Netmapper and CRAF. The projects were recently combined to form a new tool integrating two previously independent efforts:</p>\n<ul>\n<li><strong>Netmapper</strong> &#8212; Commissioned by TSMO, developed by Circadence in collaboration with Mississippi State University (MSU) Center for Cyber Innovation (CCI). Netmapper is a graphical tool for the scanning and configuration collection of network infrastructure and integration with NOSC automation.</li>\n</ul>\n<p>&nbsp;</p>\n<ul>\n<li><strong>Cyber Range Automation Framework (CRAF)</strong> &#8212; Developed by NOSC engineers to meet mission requirements for rapid and repeatable deployment and configuration of virtual environments. CRAF uses Ansible and other open source tools to instantiate virtual environments.</li>\n</ul>\n<p><img class=\"alignleft wp-image-12355 \" src=\"https://www.circadence.com/wp-content/uploads/2020/06/NCRAF-logo-color-light-BG.png\" alt=\"ncraf logo\" width=\"405\" height=\"97\" srcset=\"https://staging.circadence.com/wp-content/uploads/2020/06/NCRAF-logo-color-light-BG.png 1920w, https://staging.circadence.com/wp-content/uploads/2020/06/NCRAF-logo-color-light-BG-300x72.png 300w, https://staging.circadence.com/wp-content/uploads/2020/06/NCRAF-logo-color-light-BG-1024x245.png 1024w, https://staging.circadence.com/wp-content/uploads/2020/06/NCRAF-logo-color-light-BG-768x184.png 768w, https://staging.circadence.com/wp-content/uploads/2020/06/NCRAF-logo-color-light-BG-1536x368.png 1536w\" sizes=\"(max-width: 405px) 100vw, 405px\" /></p>\n<h4>N/CRAF Netmapper/Cyber Range Automation Framework is the enabling mechanism for effecting physical resource provisioning and virtual environment instantiation in a rapid and repeatable fashion. It supports the full lifecycle of cyber range virtual environment events.</h4>\n<p>The Netmapper project was born out of the need to improve the accuracy of Cyber Range emulated network environments. Craig noted that before N/CRAF, range environments were built from a subject matter expert’s assumption/belief of what their network looked like but inevitably those assumptions were never 100% correct. The network mapping process previously required a network administrator or engineer to draw a picture/map of the network which became the basis of virtualize environment used in the exercise(s). One can understand how there was room for error in this manual process – at the least, a small level of concern as to whether a network drawing and virtualization of it was indeed as realistic and accurate as possible.</p>\n<p>As a result, Craig says, professionals training in the cyber range environments weren’t actually training on networks that were as ‘close to the real thing’ as possible. There was room to improve.</p>\n<p>When automation engineers have real-world scanned networks as a reference, they can more accurately emulate the customers environment. Simply put, as Craig notes, “we took the assumption out of network mapping” with N/CRAF. Now the training moves ever closer to real world environment.</p>\n<blockquote><p>“Imagine scanning a network to extract the DNA which can be used to clone and re-build it” Circadence’s Dwayne Cole describes.</p></blockquote>\n<p>Combining the two programs (Netmapper and CRAF) enabled an iterative approach to cyber range environment build out that also drastically improved the end product. The scanning technology helps the automation engineers verify what they have built; it adds a check for the automation framework. It also can be used by the customer to validate the environment. The customer can easily compare the original design or scan versus the final emulated environment hosted on the Cyber Range.</p>\n<p>With N/CRAF, it becomes easier for engineers to share their network models with one another and build out high fidelity networks to facilitate technologies assessments. N/CRAF saves everything to a single XML file to include all the configuration data.  The tool also supports merging and diff’ing the output files. The merge capability allows the engineer to take parts and pieces from other networks or events to add to the current event. This allows the engineers to build special purpose network sections, like synthetic internet or traffic generation, that can be reused/added to current event. N/CRAF is a force multiplier, it enables repeatable, tedious deployment and configuration tasks and improves the reuse of detailed environments for multiple users to train within.</p>\n<p>The tool is currently undergoing an accreditation process and is being demoed within defense departments with the goal to deploy it as a standardized tool across various agencies. The potential for the tool to be used in more commercial applications is promising as well.</p>\n<p>To read the project announcement issued by Mississippi State University, read the news release: <a href=\"https://www.msstate.edu/newsroom/article/2020/04/msu-circadence-partner-create-virtual-cyber-defense-tool\">https://www.msstate.edu/newsroom/article/2020/04/msu-circadence-partner-create-virtual-cyber-defense-tool</a>.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Living our Mission: Circadence Collaborates with Academia and Army to Support Cyber Range Virtual Environment Replication and Construction with N/CRAF"}},{"node":{"id":"5273e779-6599-5737-a79e-be4a8593bc9e","slug":"transform-fall-cyber-security-classes-with-hands-on-learning","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/07/circCorp_aboutUs_frame_02059-1.jpg"},"date":"2020-05-29T23:20:16.000Z","content":"<div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs vc_col-has-fill\">\n<div class=\"vc_column-inner vc_custom_1590619030357\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_bounceInLeft bounceInLeft vc_custom_1590619072639 wpb_start_animation animated\">\n<div class=\"wpb_wrapper\">\n<p>As educators blend classroom and online learning for safe fall course experiences, Project Ares helps get the balance right for teaching cyber security. Whether instructing cyber security courses remotely or in-person, Information Security and Cyber Security educators must make learning <em>engaging and relevant</em> to best prepare students for careers in the field.  Circadence can help educators transform existing cyber security curriculum to support teaching challenges with the Project Ares online learning tool.</p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"wpb_column vc_column_container vc_col-sm-6\"></div>\n","title":"Transform Fall Cyber Security Classes with Hands-On Learning"}},{"node":{"id":"82cde9f0-1f0d-58ea-8af7-6c4bba0df299","slug":"prioritizing-risk-mitigation-for-your-financial-services-company","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/05/buildings.jpg"},"date":"2020-05-29T14:50:55.000Z","content":"<p>Financial services companies and departments are experiencing increased cyber-attacks, leaving their data and personnel at high risk. Mitigate risk using Project Ares to train professionals persistently and hands-on manner to stop threats coming into the company purview.</p>\n","title":"Prioritizing risk mitigation for your financial services company"}},{"node":{"id":"0db47cd0-88fb-51b0-adc2-a0e61a08f834","slug":"an-educators-perspective-the-impacts-of-distance-learning-and-teaching-a-qa-with-dr-bradley-hayes","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/05/brooke-cagle-JBwcenOuRCg-unsplash-scaled.jpg"},"date":"2020-05-19T19:36:34.000Z","content":"<p>We are continuously reminded of the stark reality that higher education teaching and learning is indeed different today than it was a few months ago. Since Circadence is committed to cyber security education and training, we try to stay on top of the latest developments with distance learning so that we can think through how to keep supporting cyber and information security teachers during this unprecedented pandemic time. We often hear from higher education partners and customers how much of a challenge distance learning and teaching can be, so we sat down with our own Dr. Bradley Hayes to hear firsthand what his experience has been like. Brad is the Chief Technology Officer at Circadence, and Assistant Professor in the College of Engineering and Applied Science, Director of the Collaborative AI and Robotics Lab at the University of Colorado, Boulder. We also solicited the perspectives of several other higher education teachers who were willing to share their thoughts on the challenges and opportunities to adapt to this &#8216;new normal&#8217; of teaching and learning.</p>\n<p>We hope by sharing his story with you, our readers, it can help ignite conversation and ideas that make teaching cyber security better for both educator and student.</p>\n<h2>How has distance learning requirements impacted you as a professor? Your class? Your teaching style?</h2>\n<p>Distance learning has been a massive shift for many of us, and certainly requires a different approach: preparing for it and delivering lectures as if it were an in-person class does not work! For many professors, the lack of in-person social cues is the most noticeable change, especially if students aren&#8217;t sharing their video. Delivering a lecture to a computer monitor is difficult enough, and removing the implicit feedback mechanisms of in-person instruction can exacerbate issues that wouldn’t normally be problematic in lecture delivery.</p>\n<p>I teach a graduate class on the Algorithmic Foundations of Human-Robot Interaction in the Spring, which has been quite different now that there is greatly reduced human interaction (and no human-robot interaction!). I&#8217;ve certainly learned a lot, as I had to quickly transition to using robotics simulation environments (instead of having students use physical robotics platforms) and set student project teams up for effective remote collaboration on very short notice. <strong>Ultimately, I find that remote instruction is no substitute for in-person instruction, but it does encourage a more scalable mindset to assignments and mentoring that could have real benefit when we resume in-person classes.</strong></p>\n<p>Switching to remote lecturing has had substantial impacts on my teaching style as well. The following observations have risen to the top as key learnings:</p>\n<ol>\n<li>I tend to be very animated when teaching, which doesn&#8217;t particularly work as well over video and I feel has been detrimental to student engagement.</li>\n<li>I have found it takes extra effort to engage students with the material, particularly if they’re in an environment that isn’t conducive to focused learning.</li>\n<li><strong>Encouraging more hands-on exercises can go a long way toward bringing their focus and attention back to the material</strong>, but this takes more advance preparation work than if it were an in-class exercise.</li>\n</ol>\n<h2>How are your students responding to the remote learning shift?</h2>\n<p>It’s been difficult for them, but to their credit, they’ve done a great job adapting to it. Social distancing and quarantine guidelines in general have caused a lot of upheaval in their lives, adding stress and instability that may not be outwardly obvious to us as their professors, which has necessitated a recalibration of expectations regarding coursework. <strong>One of the most important changes to keep productivity high was the adoption of real-time collaboration tools to facilitate group-work </strong>and bring more course material-relevant conversations into a more visible medium for others to benefit from and participate in. Even though most students were able to continue attending class synchronously (i.e., joining the video conference at our normal time), most of the interaction that would’ve traditionally happened in the classroom shifted into our online collaboration tools.</p>\n<blockquote><p>To be an online learner, one needs to be independent, disciplined, organized and communicative with questions, responses and/or if issues exist.  What can be a little frustrating is reaching out to students with no response&#8230;not knowing how they are doing; being worried about them, hoping they are ok &#8211; it is a TEAM approach in all aspects.  The students are paying for their education, thus, the importance of high communication and engagement from both student and instructor is paramount. ~ <a href=\"https://www.linkedin.com/in/julie-a-shay-mba-hin-rhia-03948618/\">Julie A. Shay, MBA-HIN, RHIA, </a>Program Director for Health Information Technology Programs/Lead Faculty/Professor &#8211; Santa Fe College</p></blockquote>\n<h2>What was needed to make the transition to full remote teaching?</h2>\n<p><strong>A chat-based online collaboration tool was absolutely essential</strong>, as this became the new forum for conversations that would naturally occur at the conclusion of the lecture when students would typically walk up to the lectern with questions or ideas to discuss.</p>\n<p>These informal interactions can be approximated with post-class discussion through collaboration tools, though there’s an additional activation cost that requires priming from the instructor to kick things off. <strong>Another important consideration is the space from which you’ll be delivering your lecture: having a professional-looking environment with adequate lighting</strong> <strong>makes a big difference</strong> and can have a positive effect on student engagement.</p>\n<h2>What challenges came with transitioning to a remote classroom?</h2>\n<p>Since we go through a decent amount of complex mathematical derivations in my course, I had to weigh the advantages and difficulties of using a virtual whiteboard versus moving everything into slide format.</p>\n<ul>\n<li>Personally, I’ve found the move away from the whiteboard to be advantageous in terms of clarity for the students.\n<ul>\n<li>It forced me to explicitly describe each step of what we’re going through in a clear, permanent way on slides that can be easily distributed.</li>\n<li>Unfortunately, this makes it a lot more difficult to step through equations by letting students lead the process, as the smaller the ‘minimum revealing step’ in each equation is (e.g., do you reveal one character at a time, or one whole term at a time?) the more difficult and time-consuming it is to prepare in advance.</li>\n</ul>\n</li>\n</ul>\n<p><strong>The biggest challenge has been tracking student engagement and understanding of the material.</strong> In the absence of social cues, the feedback loop becomes much longer, as assignments or tangible work products from student projects become the only measurable signal. Learning to properly take advantage of remote collaboration tools has also been a difficult process, as many of us are adapting on-the-fly, leading to trial and error that puts additional hardship on the students.</p>\n<blockquote><p>Understand that teaching in a remote environment will require a different leadership style and, in my opinion, that style is Transformational Leadership. In essence, this leadership style will require [the professor] to <em>motivate and transform the mindset</em> of the student to perform at a higher academic level…yet, remotely! ~ <a href=\"https://www.linkedin.com/in/drerictoddhollis/\">Dr. Eric Todd Hollis</a></p></blockquote>\n<h2>What have you learned/observed throughout this distance learning process?</h2>\n<p>By far, the most important aspect of making distance learning work for students who are used to in-person instruction is to <strong>stay in communication with them, soliciting and listening to their feedback</strong>. Maintaining student engagement and keeping your students interested in the course material is more difficult from a distance learning perspective, and requires more effort than you may be used to! There is a common tendency to disengage entirely when feeling lost or demoralized by a class that is greatly exacerbated by the distance learning experience &#8212; it is critical to budget extra time and put in extra effort to connect with students who are at risk of disengaging.</p>\n<p>Since in-class group exercises may not be an option anymore (especially depending on how lectures are being delivered), additional resources, creativity, and preparation are necessary. <strong>Specifically, this past semester has really underscored the importance of providing ‘hands-on’ learning experiences to foster engagement in lecture and encourage retention of the material.</strong> <strong>The addition of a simulation environment that students could interact with was a game-changer</strong> <strong>not just in terms of making concepts ‘real’, but also in terms of giving students the tools they needed to really apply and experiment with what they were learning. </strong>Once there is an opportunity to explore the course material in an interactive environment, I’ve found that students are far more likely to bring up new ideas for discussion or implementation, reinforcing their interest in the course content and leading to better outcomes.</p>\n<h2>What is one thing you’d advise other educators who are struggling to sustain distance learning for foreseeable future?</h2>\n<p>Learn how to set up and use established online collaboration tools and learning environments! This will save you a lot of time and headache over cobbling together your own while also trying to develop an adapted curriculum. Establish a cooperative atmosphere by being transparent with your students when trying a new pedagogical approach, and regularly solicit their feedback to refine your strategy.</p>\n<h2>In conclusion…</h2>\n<p>We thank Dr. Hayes for taking the time to share his personal successes and challenges with us and the great higher education community of teachers. To hear Dr. Hayes in ‘virtual’ person, we’ve extended this topic of distance learning challenges and tools into a live webinar panel discussion in partnership with Microsoft. Join us June 9, as we dig into the state of distance learning today and introduce technologies that can help educator’s adapt to a blended classroom teaching experience as we head into the Fall semester season.</p>\n<p>REGISTER HERE: <a href=\"https://marketing.circadence.com/acton/media/36273/webinar-transform-distance-learning-through-creative-and-practical-technology-focus-on-cybersecurity-education\">https://marketing.circadence.com/acton/media/36273/webinar-transform-distance-learning-through-creative-and-practical-technology-focus-on-cybersecurity-education</a></p>\n<p>&nbsp;</p>\n<p>Photo by <a href=\"https://unsplash.com/@brookecagle?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Brooke Cagle</a> on <a href=\"https://unsplash.com/s/photos/teacher?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"An Educator&#8217;s Perspective: The Impacts of Distance Learning and Teaching, a Q&#038;A with Dr. Bradley Hayes"}},{"node":{"id":"125cf84c-196c-5970-89c5-7047b38c693d","slug":"distance-learning-and-teaching-for-cyber-security-programs","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/05/avel-chuklanov-DUmFLtMeAbQ-unsplash-scaled.jpg"},"date":"2020-05-11T10:45:05.000Z","content":"<h2><strong>Distance Learning Today</strong></h2>\n<p>Practically overnight distance learning has become the ‘new norm’ for academic institutions. Educators worldwide are figuring out what Emergency Remote Teaching (ERT) means for their specific courses and subject matter for summer term and likely fall term 2020. And while the immediate remote learning requirements for pandemic mitigation will eventually recede, there is a growing awareness that online and blended learning options in Higher Education curriculum will likely be a strategic part of the post-pandemic norm.</p>\n<p>“Every faculty member is going to be delivering education online. Every student is going to be receiving education online. And the resistance to online education is going to go away as a practical matter,” James N. Bradley, chief information officer at Texas Trinity University, wrote in a LinkedIn post.</p>\n<h2><strong>Job opportunities in the cyber security field</strong></h2>\n<p>Let’s take a specific look at higher education programs for Information Technology and the related cyber security discipline. For starters, they can’t graduate students fast enough to fill the existing job openings in the cyber security field. Even before the pandemic, there was a well-documented talent gap between the growing number of open cyber security jobs and skilled applicants to fill them. In November 2019, <a href=\"https://www.isc2.org/News-and-Events/Press-Room/Posts/2019/11/06/ISC2-Finds-the-Cybersecurity-Workforce-Needs-to-Grow--145\" target=\"_blank\" rel=\"noopener noreferrer\">ISC2</a> calculated that the cyber workforce would need to increase by more than <strong>145%</strong> to fill gaps in talent across the U.S.  <a href=\"https://www.cyberseek.org/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cyberseek.org</a> tracks this unique employment landscape and states that “the average cybersecurity role takes 20% longer to fill than other IT jobs in the U.S.” because employers struggle to find workers with cyber security-related skills.</p>\n<p>The dynamics of this gap have probably gotten worse. Today’s stay-at-home world has cyber security vulnerability written all over it. Online activities have exploded with remote work access, distance learning, telemedicine, video conferencing, online shopping, gaming, media streaming, and more all happening at once….and creating a world of opportunity for threats to identity, systems and data. And, in the post-pandemic world that we are looking forward to, many of the new and unexpectedly ‘proven’ activities like distance learning and telemedicine will likely stay with us to some extent as part of the ‘new norm’.</p>\n<p>The result is that behind the physical coronavirus crises is the shadow of a virtual cyber virus crisis. And it means that cyber security is quickly moving to the frontlines of mission-critical skillsets for healthcare, higher education, retail, and every employer that enabled work-from-home for the safety of their workforce. Now, more than ever, organizations and institutions need to stop thinking in terms of IF they are breached and start planning in terms of WHEN they are breached.</p>\n<p>Does that sound ominous? It is! But buried in the dramatic shortage of cyber skills, is opportunity. Opportunity for STEM/IT focused students (high school and collegiate) to specialize in cyber security and find jobs upon graduation. And opportunity for higher education institutions to ramp up their cyber security program enrollment.</p>\n<ul>\n<li>In March 2019, <a href=\"https://cybersecurityventures.com/only-3-percent-of-u-s-bachelors-degree-grads-have-cybersecurity-related-skills/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Crime Magazine</a> reported that only 3% of U.S. Bachelor’s Degree graduates had a skill set in cyber security.</li>\n<li>And in another 2019 report, <a href=\"https://www.burning-glass.com/wp-content/uploads/recruiting_watchers_cybersecurity_hiring.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Burning Tree Technologies</a> learned that while federal data showed the number of postsecondary programs in key cyber security areas had increased 33%, the ratio of currently employed cyber security workers to job openings, had hardly budged since 2015. In other words, the pool of available talent has remained proportionally the same.</li>\n</ul>\n<p>&nbsp;</p>\n<p>Developing the cyber security skills that employers are desperate for is a multi-faceted challenge. Employers want to bring in new hires who have both a strong foundation in <em>basic</em> security principles and concepts as well as <em>practical</em> job role specific skills like networking protocols, scripting, regular expressions, kill chain and network defense, etc. And maybe most importantly, employers categorize top talent as those applicants with power skills like strategic thinking, problem-solving, teamwork and collaboration.</p>\n<h2>Distance learning and the IT / cyber security discipline</h2>\n<p>At Circadence, we specialize in cyber security learning, specifically through an immersive learning platform that provides hands-on experience and strategic thinking activities for students working towards careers in the field of cyber security.</p>\n<p>Today’s educators are looking for engaging student activities that teach designated core curriculum topics to meet learning objectives. And, it is equally critical to assess student comprehension of learned material and measure progress to ensure the effectiveness of the curriculum and teaching approach. These challenges can be met head-on with Circadence’s Project Ares in the online classroom. Project Ares is a browser-based learning platform specifically designed for teaching cyber security in a hands-on, applied manner.</p>\n<p>It can help transform existing cyber security curriculum to support current distance learning challenges as well as integrate into future course design.</p>\n<p>For cyber security instructors:</p>\n<p>•     The built-in learning exercises can augment existing syllabi.</p>\n<p>•     Anytime access enables flexible asynchronous delivery to support current circumstances for instructors and students.</p>\n<p>•     Self-directed student learning opportunities are supported through hints, Q&amp;A chat bot, and session playback and review.</p>\n<p>•     Optional live observation or interaction within the exercises supports tutoring as well as assessment.</p>\n<p>•     Immersive, gamified environment sustains student engagement with scores and leaderboards to incent practice and improvement.</p>\n<p>•     Global chat enables peer-to-peer community and support for students.</p>\n<h2>Additional Distance Learning &amp; Teaching Resources</h2>\n<p>As higher education instructors shift to deliver, proctor and advise online, we anticipate teaching strategies continuing to adapt to use new and immersive tools that enable alternative online courses to positively impact student learning now and into the future. Circadence is excited to be a part of this shift in learning and proud to partner with today’s cyber security educators that prepares tomorrow’s much-needed workforce of cyber defenders.</p>\n<p>For more information, check out these resources:</p>\n<p>•     Microsoft technology helps enable remote classrooms <a href=\"https://www.microsoft.com/en-us/education/remote-learning?&amp;ef_id=EAIaIQobChMIjrP4qvSQ6QIVlxatBh347wMJEAAYASAAEgL-VvD_BwE:G:s&amp;OCID=AID2000043_SEM_6M11V6Kq&amp;utm_source=google&amp;gclid=EAIaIQobChMIjrP4qvSQ6QIVlxatBh347wMJEAAYASAAEgL-VvD_BwE\" target=\"_blank\" rel=\"noopener noreferrer\">https://www.microsoft.com/en-us/education/remote-learning?&amp;ef_id=EAIaIQobChMIjrP4qvSQ6QIVlxatBh347wMJEAAYASAAEgL-VvD_BwE:G:s&amp;OCID=AID2000043_SEM_6M11V6Kq&amp;utm_source=google&amp;gclid=EAIaIQobChMIjrP4qvSQ6QIVlxatBh347wMJEAAYASAAEgL-VvD_BwE</a></p>\n<p>•     Circadence White Paper <em>Teaching Cyber Security Remotely: Online Learning with Project</em> Ares <a href=\"https://marketing.circadence.com/acton/media/36273/whitepaper-rise-of-distance-e-learning-in-higher-education\" target=\"_blank\" rel=\"noopener noreferrer\">https://marketing.circadence.com/acton/media/36273/whitepaper-rise-of-distance-e-learning-in-higher-education</a></p>\n<p>•     Project Ares Curriculum Example. <em>Building an Immersive Cyber Curriculum with Project Ares: A use case from a public research institution in the Western U.S. <a href=\"https://marketing.circadence.com/acton/media/36273/immersive-cyber-curriculum-with-project-ares-use-case\">https://marketing.circadence.com/acton/media/36273/immersive-cyber-curriculum-with-project-ares-use-case </a> </em></p>\n<p>•     <a href=\"https://www.cyberdegrees.org/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyberdegrees.org</a> provides a comprehensive directory of colleges and universities offering cyber security degrees, as well as a wealth of information on career paths within the cyber security field, security clearances, the range of professional security certifications available.</p>\n<p>If there is one thing that this pandemic has taught us all, is that out of chaos arises opportunity: Opportunity to be better professionals, better neighbors, better defenders, and overall, better people. We hope each of you continues to stay safe and secure during this time.</p>\n<p>&nbsp;</p>\n<p>Photo by <a href=\"https://unsplash.com/@chuklanov?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Avel Chuklanov</a> on <a href=\"https://unsplash.com/s/photos/learning?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"Distance Learning and Teaching for Cyber Security Programs"}},{"node":{"id":"a9a31581-64d4-5ac1-a9a3-0ef28b6ca9c9","slug":"cyber-security-and-risk-mitigation-go-hand-in-hand","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/05/toa-heftiba-_UIVmIBB3JU-unsplash-scaled.jpg"},"date":"2020-05-04T07:00:27.000Z","content":"<p><em>Cyber Risk</em> means different things to different people in an organization. <a href=\"https://deloitte.wsj.com/cio/2020/02/21/quantifying-cyber-risk-across-the-c-suite/\">Deloitte distinguishes it well</a>: A CEO might worry about the expected financial loss related to cyber risk exposure; while the CFO is challenged to show the value of security while managing the associated costs. The CMO might worry about the impact to the brand if a breach to the company occurs; while the CISO is thinking about which key initiatives to prioritize to maximize risk buy down.  But one thing that savvy executives agree on is that cyber security is a <em>business risk</em> that should be included in corporate risk mitigation strategy and processes.</p>\n<h4><em>Cyber Risk Mitigation focuses on the inevitability of disasters </em><em>and applies actions and controls to reduce threats and impact to an acceptable level.</em></h4>\n<p>Lisa Lee, Chief Security Advisor for Financial Services in Microsoft’s Cybersecurity Solution Group,  partnered with Circadence in April 2020 to talk about this topic in a webinar.  Originally broadcast for a financial risk mitigation audience, the practical advice Lisa offers in 6 areas of cyber risk mitigation is broadly applicable.</p>\n<h3>Cyber Risk Insurance</h3>\n<p>Insurance can help to reduce the financial impact of an incident, but it does NOT mitigate the likelihood of a cyber breach happening – in the same way that having car insurance helps with the financial consequences of an accident but cannot in anyway prevent an accident from occurring.</p>\n<h3>Identity and Access Management</h3>\n<p>Microsoft recommends making “Identity” the security control plane. Employees use multiple devices (including personal devices), networks, and systems throughout their lifecycle with a company. The explosion of devices and apps and users makes security built around the physical device perimeter increasingly complex.  At the same time, access to on-premise systems and cloud systems are shifting to transform to meet business needs.  Partners, vendor/consultants, and customers might also all require varying degrees of access.  A strongly protected, single user identity at the center of business for each of these constituents can exponentially improve the efficiency and efficacy of the overall security posture of the company.</p>\n<h3>Configuration and Patch Management</h3>\n<p>This is IT or cyber security 101.  Everyone should be doing it on a consistent basis.  But  20% of all vulnerabilities from unpatched software are classified as High Risk or Critical. The <a href=\"https://www.cisecurity.org/\">Center for Internet Security </a> is an excellent resource for more information on best practices.</p>\n<h3>Asset Protection (devices, workload, data)</h3>\n<p>There is a massive amount and diversity of signal data coming in from the network and there are many tools on the market to help assist in the collection, management, and assessment.  Lisa advised not to spend too much time trying to evaluate and select the best of breed tool in each category.  Rather, find a suite that works well together so that you don’t have to spend time on integration. Beyond devices, also consider your security policies and practices to ensure visibility for workloads across on-prem, cloud, and hybrid cloud environments.  And finally, consider protecting the information directly so that wherever data elements go, even outside the company, they carry protection with them.  The key to this is encryption.</p>\n<h3>Monitoring and Management</h3>\n<p>These two concepts are seemingly more about  ‘risk management’ vs. ‘risk mitigation’.  But monitoring helps you to ‘know what you don’t know’ in order to adapt and improve mitigation strategies.  And today, many of the monitoring tools from Microsoft and other vendors have features that enable cyber analysts to take action, i.e analysts can use the same tool that helps identify a vulnerability to then resolve it.</p>\n<h3>Cyber Security Training</h3>\n<p>Security is an ever-changing situation because bad actors are always developing new attacks.  Therefore, training and education is an ongoing requirement for cyber professionals.  Circadence’s <a href=\"https://www.circadence.com/products/project-ares\">Project Ares</a> is a cloud-based learning platform specifically designed for continuous cyber security training and upskilling.   IT and cyber organizations that invest in on-going training for their people are making as strong an investment in mitigation as in the tool stack that the analysts use on-the-job.</p>\n<p style=\"text-align: center;\">With consideration in all 6 of these areas, you will be able to architect and compose a comprehensive cyber mitigation strategy.</p>\n<p style=\"text-align: center;\">Here’s a link to the full webinar.  It’s only 45 minutes long and Lisa provides more detail in each of these categories.</p>\n<h2 style=\"text-align: center;\"><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-20q3-fei-webinar\"><strong><em>Great Dance Partners: How Cybersecurity and Risk Mitigation Go Hand in Hand</em></strong></a></h2>\n<p>&nbsp;</p>\n<p>Photo by <a href=\"https://unsplash.com/@heftiba?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Toa Heftiba</a> on <a href=\"https://unsplash.com/s/photos/hand?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"Cyber Security and Risk Mitigation Go Hand in Hand"}},{"node":{"id":"d987692c-ded2-59d3-ba26-ace9d925953b","slug":"why-cyber-risk-mitigation-is-a-priority-for-finance-leaders","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/04/carlos-muza-hpjSkU2UYSU-unsplash.jpg"},"date":"2020-04-15T20:19:13.000Z","content":"<p>The role of the CFO is evolving. Whether at a bank or credit union, today’s finance leaders wear many hats. One of which is a cyber security &#8216;hat&#8217;. Constant breaches within financial institutions warrant such a ‘wardrobe’. Insider threats are growing, outside adversaries are multiplying at rapid pace, and attacks on financial departments and companies are ever-increasing. Unfortunately, classic security controls like firewalls and antivirus are easily compromised as attackers become more sophisticated.</p>\n<p>As threats increase, risks to businesses increase—and for CFOs and VPs of Finance, defining an adequate budget to account for those cyber risks and allocating proper resources is of the utmost importance to protect companies and its clients. Finance leaders are no longer siloed to reviewing financial statements and spreadsheets—their role extends far beyond the numbers to include cyber security.</p>\n<p>Some CFOs may not be comfortable with this change but the reality of cyber security today mandates involvement from the CFO/VP of Finance to develop a cyber readiness strategy. W<em>hy</em> are finance leaders critical to the cyber security conversation? Because many CFOs need to address and mitigate the business risk concerns of the C-suite , board , and investors (not to mention continuing to improve the ‘financial health’ of the company).</p>\n<h3><strong>Any sort of digital compromise to a financial services company, results in damaging monetary and reputational outcomes that directly impact the financial function of the organization.</strong></h3>\n<p>Hence <a href=\"https://www.circadence.com/industry/financial-services-cyber-training\">why cyber risk mitigation is and should continue to be a critical priority for CFOs today</a>. And for many, it already is: According to a 2019 study from Protiviti, 84% of global CFOs and VPs of Finance cited <strong>security and data privacy</strong> as a high priority<a href=\"https://www.semrush.com/swa/checker#_ftn1\">[1]</a> for them. Many CFOs are already taking the reins of the cyber security challenges to get ahead of looming risks and imminent vulnerabilities. How? By taking a more active role in defining cyber security strategy in a way that effectively hardens posture while ensuring company growth.</p>\n<p>As such, the typical CFO responsibilities listed below, are only a part of many to come:</p>\n<ol>\n<li>identifying and monitoring risks of critical assets to protect company/client data</li>\n<li>ensuring critical infrastructure operations meet regulatory requirements</li>\n<li>contributing to the optimization of digital asset access and utilization to safeguard against attackers</li>\n</ol>\n<p>That third responsibility may seem a tad ‘out of the norm’ for a CFO. Typically a CIO or CISO might be in charge of that objective. But as more financial services companies respond to digital transformation demands, data becomes a critical asset to protect. Much of that data “lives” on the devices that company employees use every day. CFOs should have a general awareness of who has access to what, where, and when and be aware of the policies in place that enforce security at all levels.</p>\n<p>Since data is a valuable company asset, the CFO’s responsibility to ensure the financial ‘health’ of the company becomes much more complex as cyber security asset and risk management becomes a top priority. <em>Security Boulevard</em> writes “A modern CFO will have an excellent grasp on how an organization manages cyber security and will be able to ask the right questions.”<a href=\"https://www.semrush.com/swa/checker#_ftn2\">[2]</a> We agree!</p>\n<p>For CFOs to make cyber security a priority, they are having to work across many lines of business within their organizations to contribute to the construction of a holistic cyber security program that has full buy-in from all employees (leadership/C-Suite included).</p>\n<blockquote><p>Learn how to <a href=\"https://www.circadence.com/industry/financial-services-cyber-training\">prioritize risk mitigation</a> in your financial services company.</p></blockquote>\n<p>Further, CFOs bring a unique perspective to the ‘building a culture of cyber security’ conversations as they are extremely committed to helping the company grow. While CFOs may not be cyber security experts, they do have a unique take on how and what solutions to invest in that will maximize the potential for company growth over time.</p>\n<p>By working hand-in-hand across departments like IT and legal, CFOs and finance leaders can develop a holistic cyber security plan that goes beyond merely ‘evaluating cyber insurance coverage’. A huge part of strategic cyber planning includes understanding what current companies are doing to mitigate cyber risk. Foundational elements need to be established first.</p>\n<p>While cyber insurance is a good start, other measures need to be taken to ensure that companies are not just reacting when threats occur, but instead, are taking proactive measures to get ahead of threats before they hit. A proactive approach should also include the adoption of a persistent cyber security training program to support frontline defenders who are doing the day-to-day defense against ambitious yet malicious adversaries.</p>\n<p>With the right cyber security training in place, teams can be assessed on their abilities to identify and mitigate risks before they happen, while supervisors (e.g. CISOs) can glean insight into how teams are responding and areas for improvement. <strong>This intel can translate upward to the CFO who will need to know the risks associated with gaps in cyber security response.</strong></p>\n<p>&nbsp;</p>\n<h3 style=\"text-align: center;\">Check out our webinar:<br />\n<a href=\"https://marketing.circadence.com/acton/media/36273/webinar-20q3-fei-webinar\">Great Dance Partners: How Cyber Security and Risk Mitigation Go Hand-in-Hand.</a></h3>\n<p><a href=\"https://www.semrush.com/swa/checker#_ftnref1\">[1]</a> <a href=\"https://www.cfodive.com/news/cybersecurity-is-latest-cfo-domain-study-finds/567056/\">https://www.cfodive.com/news/cybersecurity-is-latest-cfo-domain-study-finds/567056/</a></p>\n<p><a href=\"https://www.semrush.com/swa/checker#_ftnref2\">[2]</a> <a href=\"https://securityboulevard.com/2019/08/is-it-critical-for-cfos-to-understand-cybersecurity-2/\">https://securityboulevard.com/2019/08/is-it-critical-for-cfos-to-understand-cybersecurity-2/</a></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@kmuza?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Carlos Muza</a> on <a href=\"https://unsplash.com/s/photos/finance?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Why Cyber Risk Mitigation is a Priority for Finance Leaders"}},{"node":{"id":"416bd88a-2f31-5d1d-a897-03e58c1c66ae","slug":"cyber-ranges-101-and-how-they-improve-security-training","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/04/CyRaaS_06_wallpaper_1366x768.jpg"},"date":"2020-03-30T09:24:35.000Z","content":"<h2><strong>WHAT ARE CYBER RANGES?</strong></h2>\n<p><a href=\"https://www.circadence.com/solutions/topic/cyber-ranges/\"><strong>Cyber ranges</strong></a> <span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">were initially developed </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">by</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> government </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">agencies</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">looking to better train their </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">cyber operators</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> on </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">new </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">skills and techniques. </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">To do this, a physical range or ranges were installed on-premise.  </span></span><span class=\"TextRun MacChromeBold SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">Cyber range </span></span><span class=\"TextRun MacChromeBold SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"ContextualSpellingAndGrammarError SCXW237742505 BCX0\" data-wac-het=\"1\">providers</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"ContextualSpellingAndGrammarError SCXW237742505 BCX0\" data-wac-het=\"1\"> </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"ContextualSpellingAndGrammarError SCXW237742505 BCX0\" data-wac-het=\"1\">built</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">representations of actual networks, systems, and tools </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">that helped</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> cyber professionals safely train in virtual, secure environments without compromising the </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">agency’s </span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">operation</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\">al</span></span><span class=\"TextRun SCXW237742505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237742505 BCX0\" data-wac-het=\"1\"> network infrastructure.</span></span></p>\n<p><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">Today, cyber ranges are used in the </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">cyber security </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">sector</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> to effectively train </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">IT</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> professionals in all industries</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> and help improve </span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">defense</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">s</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> against cyber</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">&#8211;</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">attacks. As technology advance</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">d</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">, </span></span><span class=\"TextRun MacChromeBold SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">cyber range training</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> advanced</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\"> as well</span></span><span class=\"TextRun SCXW100932007 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100932007 BCX0\" data-wac-het=\"1\">, both in scope and potential. More on this later.</span></span><span class=\"EOP SCXW100932007 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p>To schedule a demo of Circadence’s <span style=\"color: #333333;\">cyber range platform</span>, <a href=\"https://calendly.com/circadence-sales/discovery-call?month=2020-08\">click here</a>.</p>\n<p><iframe src=\"//www.youtube.com/embed/YR2-XX4GrJA\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<p>The National Initiative for Cybersecurity Education reports that cyber ranges provide:</p>\n<ul>\n<li>An environment where new ideas can be tested safely and teams and work to solve complex cyber problems</li>\n<li>Performance-based learning and assessment</li>\n<li>A simulated environment where teams can work together to improve teamwork and team capabilities</li>\n<li>Real-time feedback</li>\n<li>Simulate on-the-job experience</li>\n</ul>\n<p><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">Most</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> cyber ranges come in </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">one of </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">two forms: </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">A network </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">environment without pre-programmed content; or </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">a network environment with </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">prescriptive content that may or may not be relevant to a user’s industry. Either cyber range type limits the learner’s ability to develop </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">enriched</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> skill sets</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> beyond </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">what their </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">specific</span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\"> work role </span></span><span class=\"TextRun SCXW54477183 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54477183 BCX0\" data-wac-het=\"1\">may dictate. </span></span><span class=\"EOP SCXW54477183 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<h2><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\">UNDERSTANDING</span></span><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\"> &amp; EVOLVING</span></span><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\"> </span></span><span class=\"TextRun MacChromeBold SCXW34806530 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34806530 BCX0\" data-ccp-parastyle=\"heading 2\" data-wac-het=\"1\">CYBER RANGES IN A BOX</span></span><span class=\"EOP SCXW34806530 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\" data-wac-het=\"1\"> </span></h2>\n<p><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">Typically,</span></span><span class=\"TextRun MacChromeBold BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> Cyber range in a box</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">has been </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">a collection of virtual machines hosted on an on-premise </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">system</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">. </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">However,</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> Circadence has taken the concept of a cyber range in a box and placed it the cloud to better scale cyber training. We lovingly call this </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"SpellingError BCX0 SCXW227397673\" data-wac-het=\"1\">CyRaaS</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">, or Cyber Range-as-a-Service, which is </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">integrated into</span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\"> </span></span><span class=\"TextRun BCX0 SCXW227397673\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXW227397673\" data-wac-het=\"1\">our Project Ares cyber learning platform.</span></span></p>\n<p><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">Instead of purchasing a physical set of machines to take up space in a room, virtual machines exist in the cloud and </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">can be </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">accessed by more professionals </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">from any</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> location </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">who want to train persistently and develop cyber skills. </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">The cloud is recognized as one of the most secure spaces to house network components (and physical infrastructure). To ensure cyber ranges </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">spin up environments</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> quickly</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">, deliver</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> the latest </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">training </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">content, and engage users in productive training activities</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">, </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">accessing </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">cyber </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">ranges in the</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> cloud is the latest and greatest approach for </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">professionals</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> training in </span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\">‘sandbox’</span></span><span class=\"TextRun SCXW9643356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9643356 BCX0\" data-wac-het=\"1\"> environments.</span></span><span class=\"EOP SCXW9643356 BCX0\" data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><img class=\"aligncenter wp-image-10935 size-full\" src=\"https://www.circadence.com/wp-content/uploads/2019/04/MissionRecon1-server-in-game-screenshot-1.jpg\" alt=\"in-game-screeenshot-of-network-map\" width=\"600\" height=\"338\" srcset=\"https://staging.circadence.com/wp-content/uploads/2019/04/MissionRecon1-server-in-game-screenshot-1.jpg 600w, https://staging.circadence.com/wp-content/uploads/2019/04/MissionRecon1-server-in-game-screenshot-1-300x169.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" /></p>\n<p><span data-contrast=\"none\">By offering </span><span data-contrast=\"none\">cloud based,</span><span data-contrast=\"none\"> cyber range in a box services to support cyber training in Project Ares, we are able to deliver</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">more relevant</span><span data-contrast=\"none\"> tools and technologies to help professionals </span><span data-contrast=\"none\">gain</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">the best cyber</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">security training </span><span data-contrast=\"none\">possible</span><span data-contrast=\"none\">. </span><span data-wac-het=\"2\"><br />\n</span><span data-wac-het=\"2\"><br />\n</span><span data-contrast=\"none\">The</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">service </span><span data-contrast=\"none\">allows Project Ares to </span><span data-contrast=\"none\">emulate</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">industry-relevant </span><span data-contrast=\"none\">network configurations with</span><span data-contrast=\"none\">in</span><span data-contrast=\"none\"> learning activities </span><span data-contrast=\"none\">that </span><span data-contrast=\"none\">help trainees practice </span><span data-contrast=\"none\">defensive tactics</span><span data-contrast=\"none\">. </span><span data-contrast=\"none\">Cloud-based </span><span data-contrast=\"none\">c</span><span data-contrast=\"none\">yber ranges</span><span data-contrast=\"none\"> also </span><span data-contrast=\"none\">offer </span>hands-on keyboard experience<span data-contrast=\"none\"> with </span><span data-contrast=\"none\">real world</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">tools</span><span data-contrast=\"none\"> and</span><span data-contrast=\"none\"> emulated network traffic to reflect the </span><span data-contrast=\"none\">authentic</span><span data-contrast=\"none\"> feeling of an actual cyber</span><span data-contrast=\"none\">&#8211;</span><span data-contrast=\"none\">attack. </span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><span data-contrast=\"none\">Advances in Artificial Intelligence and machine </span><span data-contrast=\"auto\">learning allow us to use cloud ranges to their full potential by tracking</span><span data-contrast=\"auto\"> patterns in </span><span data-contrast=\"auto\">training </span><span data-contrast=\"auto\">data </span><span data-contrast=\"auto\">to r</span><span data-contrast=\"auto\">eveal </span><span data-contrast=\"auto\">player learning progression </span><span data-contrast=\"auto\">with minimal human intervention</span><span data-contrast=\"auto\"> and oversight</span><span data-contrast=\"auto\">. Those patterns are</span><span data-contrast=\"auto\"> then</span><span data-contrast=\"auto\"> used to inform the recommendations of an in-game advisor</span><span data-contrast=\"auto\"> (Athena) that has</span><span data-contrast=\"auto\"> chat bot functionality so players can </span><span data-contrast=\"auto\">get </span><span data-contrast=\"auto\">help on </span>cyber range training<span data-contrast=\"auto\"> activities </span><span data-contrast=\"auto\">in the platform</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">Further, cloud-based cyber range training</span><span data-contrast=\"auto\"> gives security </span><span data-contrast=\"none\">professionals better predictive capabilities</span><span data-contrast=\"none\"> when defending and anticipating threats—</span><span data-contrast=\"none\">and</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">according to Microsoft, even  “</span><a href=\"https://cloudblogs.microsoft.com/microsoftsecure/2018/09/05/practical-application-of-artificial-intelligence-that-can-transform-cybersecurity/\"><span data-contrast=\"none\">improve the efficacy of cyber</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">security</span></a><span data-contrast=\"none\">, the detection of hackers, and prevent </span><span data-contrast=\"none\">attacks before they occur.”</span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<h2><strong>GAMIFIED CYBER RANGES </strong></h2>\n<p><span data-contrast=\"none\">Not only have we taken physical cyber ranges and placed them in the </span><span data-contrast=\"none\">cloud</span><span data-contrast=\"none\"> but we’ve added in elements of gamification to further drive the effectiveness of cyber training. </span><span data-wac-het=\"2\"><br />\n</span><span data-wac-het=\"2\"><br />\n</span><span data-contrast=\"none\">With many studies touting the </span><a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\"><span data-contrast=\"none\">benefits of gamification in learning</span></a><span data-contrast=\"none\">, it only makes sense that cyber ranges come equipped with </span><span data-contrast=\"none\">sets of </span><span data-contrast=\"none\">gamified element</span><span data-contrast=\"none\">s (e.g. leaderboards, scoring mechanisms, points, badges, levels, etc.)</span><span data-contrast=\"none\">. Project Ares has a series of </span>cyber learning games<span data-contrast=\"none\"> that teach foundational cyber concepts and terms</span><span data-contrast=\"none\">, </span>battle rooms<span data-contrast=\"none\"> that teach tools, tactics, and </span><span data-contrast=\"none\">procedures</span><span data-contrast=\"none\">, and </span><span data-contrast=\"none\">team-based </span>missions<span data-contrast=\"none\"> that </span><span data-contrast=\"none\">bring learning full circle when players are tasked with defending against a realistic cyber threat </span><span data-contrast=\"none\">scenario. </span><span data-contrast=\"none\"> This level of cyber learning is done in the cloud so professionals can work together from anywhere in the world to</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">collaborate and </span><span data-contrast=\"none\">defeat modern-day attacks. </span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><span data-contrast=\"none\">We hope this post helped you understand the true potential of cyber ranges</span><span data-contrast=\"none\"> in the cloud</span><span data-contrast=\"none\"> and how they are evolving today to automate and augment cyber workforce</span><span data-contrast=\"none\"> training and learning</span><span data-contrast=\"none\">.</span><span data-contrast=\"none\"> </span><span data-ccp-props=\"{&quot;335559739&quot;:300}\" data-wac-het=\"1\"> </span></p>\n<p><a style=\"border: 1px solid #333333; border-color: #FF9E1B; border-radius: 1px; border-width: 3px; color: #ff9e1b; display: inline-block; font-family: helvetica,arial,sans-serif; font-size: 14px; font-weight: 300; letter-spacing: 1px; line-height: 14px; padding: 12px 10px 12px 10px; text-align: center; text-decoration: none; width: 40%;\" href=\"https://calendly.com/circadence-sales/discovery-call?month=2020-08\" target=\"_blank\" rel=\"noopener noreferrer\">REQUEST A DEMO</a></p>\n","title":"Cyber Ranges and How They Improve Security Training"}},{"node":{"id":"8d588536-8b43-5aca-b724-86f316d3a75e","slug":"gamification-for-the-greater-good-why-we-need-more-diverse-learning-approaches-for-the-workforce","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/gamification_design_green_semifinal.jpg"},"date":"2020-02-18T22:13:51.000Z","content":"<p>“Gamification” is a term that has been popularized by the modern cultural and consumer demand of video games. It is the application of design elements (e.g. leaderboards, scoring, points) to an activity or set of activities, made popular by video games. Today, it has made its way into software programs as a way to increase engagement and productivity. Yet when we think about gamification today, we don’t generally think of its application in educational settings, let alone in the business world. After all, when was the last time Ubisoft had a press conference about how gamified Assassin’s Creed is? So what are we talking about? We’re talking about the challenge of engaging adults in professional training and development while being sensitive to their learning preferences. The reality is, it’s hard to get adult learners excited to go back to the classroom to learn something for their job. But there exists a potential for gamification to lower the barriers to learning for adults. Today’s professionals are a prime target for using gamification in a more meaningful way—to break through the “sheer fun and games” if you will, and leverage gamified elements for a greater, more significant purpose. Gamification is really all about education, and it’s alleviating the age-old struggle of how to teach effectively and remain relevant.</p>\n<p>Before breaking down the benefits of gamification in learning, let’s review more common learning approaches. Less thrilling “cousins” of gamification often used in teaching and tasked-based activities include displays like tutorials, lectures, slide shows, watch-only videos, and text-based material. These are used in educational settings and are part of what researchers define as “passive learning,” techniques—a method of teaching where students receive information from a source to internalize and regurgitate. Studies show this approach is highly ineffective at helping learners retain information (and even worse when it comes to applying learned information to an actual experience or task). Gamification can help overcome these challenges—especially when we leverage it within the context of business training and professional employee development. The types of training professionals might undergo include trainings on customer engagement and retention, sales processes, use of specific software applications, etc. If professionals can conduct those trainings in gamified settings, their propensity for completing (and enjoying!) training increases. We’ll discuss “how” this actually happens later. As a result, they might be better collaborators among colleagues, <a href=\"https://www.bunchball.com/gamification/game-mechanics\">drive more sales, or foster greater customer satisfaction.</a></p>\n<h3></h3>\n<h3><strong>Entertainment with a Social Benefit</strong></h3>\n<p>We’re constantly on the hunt for the “perfect” way to teach, one that resonates and is impactful. The difficulty here is that people are unique, each with their own motivations, modes of learning, and literally the way our brains are wired to absorb information. Gamification isn’t the first attempt at a perfect solution, television and radio had their time as well. Before we dive deeper into how gamification enables professional, adult learning, let’s understand how history has taught communities.</p>\n<p>Before video games entered the market in a big way, TV and radio held the spotlight as primary modes by which information was relayed and stories were told. What you might not know is that the channel’s reputation to deliver information to the masses (eventually ‘to entertain’ the masses) was actually grounded in socio-psychological theory. Miguel Sabido aptly named the “Sabido methodology” to define ways in which social attitudes and behaviors were positively changed due to information (aka: a stimulus) delivered from television and radio. Sabido pioneered the use of telenovelas to teach about social issues in the 1970s and 80s, when he was Vice President of Research at the Mexican television network Televisa.</p>\n<p>His complex narratives allowed audiences to relate to his characters who were often positioned as positive, negative, and neutral role models. The characters addressed relevant social issues of the times (e.g. women’s status, child slavery, environmental protection, HIV/AIDS) and audiences became emotionally attached to them as they made good or bad decisions within the storyline. Why? Because the topics covered and the character behaviors resonated with viewers.</p>\n<p>What Sabido uncovered in this narrative communication method (complete with relatable characters and compelling storyline) was a new way to teach people about important issues they otherwise might not care to educate themselves on. Over the next decade, Sabido produced six serial dramas that touched on issues of HIV/AIDS and safe sex practices—coincidentally (or not), Mexico experienced a 34% decline in population growth rate during that same time frame. Perhaps the way in which he addressed social issues that were important to his viewers, resonated after all.</p>\n<p>We can learn a lot from Sabido’s efforts here. According to <a href=\"https://www.populationmedia.org/2007/08/09/sex-soap-social-change-the-sabido-methodology/\">Population Media</a>, “The major tenet of the Sabido methodology is that education can be compelling and that entertainment can be educational. Sabido originally termed his approach ‘entertainment with proven social benefit,’ and since then, many communication professionals and scholars have applied the term ‘entertainment-education’ to the Sabido approach.” Sabido helped pioneer a new kind of learning that adults were attracted to and interestingly enough, we see similar “entertaining education” strides made today when teaching is done using gamification.</p>\n<h3>Learning Styles, Information Overload, and Misconceptions of Gamification</h3>\n<p>It’s not shocking that the interactive media and gaming industry has followed this “entertainment-education” pathway. As technology evolves, we naturally find new ways of putting it to work for us in a way that is not only useful and functional but appealing. Sabido’s use of serialized dramas and engaging characters have shown to be extremely effective in igniting social change and shifting social attitudes among viewers/consumers of information—and as professionals in business, we should learn from his work and mission. Consider gamification the latest teaching approach we have at our fingertips. It offers a new way of learning that hasn’t been employed to its fullest potential in other media/education models.</p>\n<p>There are three generally recognized learning styles: Visual, Auditory, and Kinesthetic. Kinesthetic learning (learning by doing), wasn’t really an option for Sabido (watching TV was passive information consumption, visual and auditory). However, gamification and interactive media is a reflection of that third learning category, kinesthetic. For the first time, we can take a student to Mars in a virtual environment, or have them interact with a neuron the size of a house leveraging Kinesthetic learning technology. The training and educational possibilities are endless (especially when we layer in elements of gamification) and we’re just scratching the surface.</p>\n<p>But learning is only as effective as the approach we deploy to learn. When it comes to assessing the effectiveness of gamification in an educational application, learners tend to evaluate it from two lenses, asking: “How do I learn” and “How do I play?” To answer these questions, we can review various game mechanics and features that make up each of the three learning styles. More on that later. However, we’re missing a large piece of the purpose of gamification if we don’t also ask “Why do I play?” This is equally the most challenging question to answer when it comes to using gamification to teach today’s professionals.</p>\n<p>If we are to truly leverage gamification as a learning mechanism for business in professional training and development, we first need to understand how adults process new information. Researchers note “&#8230;our problem as adults are that we want to take new knowledge and compare and contrast it to what we already have. Our brains natively know that they can only process so much at a time, so they try to analyze incoming input to identify key material that must be retained, and then immediately file that information alongside relevant contexts. That processing imposes a significant amount of overhead, and it’s why acquiring new knowledge and skills is so much harder for an adult.”</p>\n<p>Compare that learning style against the physical act of teaching a child, and we see stark differences. When teaching a child a concept, it is relatively straightforward: preach at them, and they’ll absorb it. For the most part, <a href=\"https://donjones.com/2015/03/11/why-learning-is-so-difficult-for-adults/\">author Don Jones notes</a>, “they’ll believe it because they tend to lack the context to dispute it.”</p>\n<p>Now apply how adults learn to their professional and personal environments. As adults, we’re constantly bombarded, now more than ever, with new information at every moment. Opening up your phone in the morning usually bears forth a host of notifications to sift through, between messages, news headlines, and advertisements. Our brains are constantly working to filter what we care about, and what we don’t. Adults do this natively and unintentionally, as much as we’d like to just absorb all the information we’re presented with… our brains just don’t function that way anymore. We’d be on overload!</p>\n<p>Should businesses adopt gamification as a learning strategy to enable professionals in their day-to-day jobs, we must first be cognizant of their perception of “playing a game,” (especially now that we understand how they learn and filter information). Imagine an adult that’s being asked to learn something new on the job by using a gamified platform where they have to play a “video game” to do it. That adult learner may very well bemoan the thought of “going back to school” or “playing a game” to learn something about their job. Unfortunately, video games aren’t something adults take seriously (because up until recently, they haven’t been really applied to support business-like functions and serve a greater good). There’s a perception that playing games is all fun and not meaningful&#8211;but gamification has to overcome these misconceptions. When teaching adults, we must remember to communicate the “why”…</p>\n<p>Jones also notes, “I often provide the ‘why do I care about this?’ answer upfront, in the form of a problem statement, where my key point becomes the solution. I then immediately illustrate or demonstrate how the key point solves the problem, providing reinforcement and confirmation to the students’ brains.”</p>\n<p>Leaders interested in deploying gamified learning in professional training programs need to communicate the “Why do I play?” to their trainees. The answer isn’t merely to ensure the learner understands the point of the lesson, it’s much more about understanding what drives and engages their brain to interact with a gamified environment in the first place. There are driving motivational factors in gamification that make it a powerful tool for professional training and learning. Given that we all are wired differently, we must understand how to make gamification work best for us, as individual learners.</p>\n<h3></h3>\n<h3>Making Gamification Work for All Learners</h3>\n<p><a href=\"https://yukaichou.com/\">Yu-kai Chou</a> created a framework for gamification and behavioral analysis that he calls “<a href=\"https://yukaichou.com/gamification-examples/octalysis-complete-gamification-framework/)\">The Octalysis Gamification Framework</a>.” Within he does a fantastic job breaking down driving factors and motivators for different types of gamers and learners—and we can use this model as a foundation to build out professional learning programs and activities in our own businesses. The Octalysis Framework is extremely deep, yet it’s easier to understand Chou’s eight Core Drivers in human behavior, in the circular graph.</p>\n<p>When we consider Chou’s driving factors, through the lens of “How we Learn” and “How we Play,” in-game mechanics—with the understanding of the three learning styles, it becomes easier to see the potential for gamification as a mechanism to complement other learning styles. By <a href=\"https://www.bunchball.com/gamification/game-mechanics\">examining the motivating factors</a> that contribute to whether or not something is considered “gamified,” those doing the teaching can clearly see where kinesthetic learning fits within the overall game mechanics structure in relation to auditory/visual representations found in the mechanics.</p>\n<p><img class=\"aligncenter wp-image-10628 size-full\" src=\"https://www.circadence.com/wp-content/uploads/2020/02/Gamification.jpg\" alt=\"\" width=\"1538\" height=\"1080\" srcset=\"https://staging.circadence.com/wp-content/uploads/2020/02/Gamification.jpg 1538w, https://staging.circadence.com/wp-content/uploads/2020/02/Gamification-300x211.jpg 300w, https://staging.circadence.com/wp-content/uploads/2020/02/Gamification-1024x719.jpg 1024w, https://staging.circadence.com/wp-content/uploads/2020/02/Gamification-768x539.jpg 768w, https://staging.circadence.com/wp-content/uploads/2020/02/Gamification-1536x1079.jpg 1536w\" sizes=\"(max-width: 1538px) 100vw, 1538px\" /></p>\n<p style=\"text-align: right;\"><img class=\"aligncenter wp-image-10631 size-large\" src=\"https://www.circadence.com/wp-content/uploads/2020/02/gamif-1024x150.jpg\" alt=\"\" width=\"640\" height=\"94\" srcset=\"https://staging.circadence.com/wp-content/uploads/2020/02/gamif-1024x150.jpg 1024w, https://staging.circadence.com/wp-content/uploads/2020/02/gamif-300x44.jpg 300w, https://staging.circadence.com/wp-content/uploads/2020/02/gamif-768x113.jpg 768w, https://staging.circadence.com/wp-content/uploads/2020/02/gamif.jpg 1138w\" sizes=\"(max-width: 640px) 100vw, 640px\" /><span style=\"font-size: 8pt;\"><em>Figure 2</em></span></p>\n<p>Notice in figure 2, game mechanics prioritize competitive drivers over collaborative efforts, community over exploration (as indicated by the quantity of learning style icons).</p>\n<p><strong>As much as we celebrate the experiential elements of kinesthetic learning in educational literature… there’s much work to be done in gamification to ensure hands-on learning styles are better represented on this model so that more inclusive learning can be had. </strong></p>\n<p>Further, game components like “Levels” and “Missions” are incredibly broad terms and they can be as varied as the subjects they attempt to illustrate, yet I would argue that these mechanics determine if a product truly feels like a game more than features like the ability to share accomplishments socially or obtaining a badge.</p>\n<p>The reality is, we’ve had a much longer history teaching to auditory and visual learning pillars, more so than teaching and training staff with gamification. If anything, this may illustrate that it’s easier to develop products and software that align with the visual and auditory-based learners versus developing products to meet the needs of those who want more hands-on experiences in a game-like setting. This is why we mostly hear about digital badging, leaderboards, and “leveling up” in the context of video games instead of in training programs for business professionals.</p>\n<p>While incorporating gamification elements into a professional development training program can be done, do we need to check off all these game mechanic boxes in order for a product to be considered “Gamified?” Arguably no. It’s all about your demographics and what will drive them to learn most effectively.</p>\n<p>We have reflected upon the history of “engaging educational learning” in the context of telenovela programming, deepened our understanding how we process and retain learned material in an overly interconnected culture, and sought new ways for learning to “stick,” one thing becomes clear: gamification is an untapped learning resource for today’s professionals. Dare I say, the diamond in the rough we’ve been searching for in business training and professional development. If your professional demographic is at all varied (I bet it is), then your teaching strategies will likely have to be as well. It’s time businesses think beyond the passive learning styles of yesteryear, and embrace a new gamified approach to adult training and development—something that better fosters driving factors like collaboration and exploration equally to that of competition, community, and achievement. Only then, will we really have a learning approach that meets everyone where they are.</p>\n","title":"Gamification for the Greater Good: Why We Need More Diverse Learning Approaches for the Workforce"}},{"node":{"id":"cfbe2fd5-761f-5018-898e-a9bb762bf8f5","slug":"top-tax-season-scams-and-how-to-avoid-them","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/02/rupixen-com-Q59HmzK38eQ-unsplash-scaled.jpg"},"date":"2020-02-18T21:26:29.000Z","content":"<p>Doing taxes can be stressful enough without worrying that your sensitive information may fall into the wrong hands. With more and more taxpayers doing their taxes online, having awareness of potential threats is the first step in practicing cyber safety this tax season. Here are 4 of the most popular tax scams used by hackers each year to be on the lookout for:</p>\n<p>&nbsp;</p>\n<ol>\n<li><strong>Tax Refund Fraud</strong> – This scam involves and filing false returns with them. They will typically claim a low income with high deductions and will file electronically. When a taxpayer goes to legitimately file their return, it is rejected by the IRS because someone else already filed under that identity. To prevent this, one can request an <a href=\"https://www.irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin\">Identity protection PIN</a> from the IRS before filing. This is a six-digit pin that must be used on a tax return in addition to an SSN in order to verify the identity of the taxpayer.</li>\n</ol>\n<p>&nbsp;</p>\n<ol start=\"2\">\n<li><strong>W-2 Email Phishing Scam</strong> – Some hackers choose to go straight to the source for private information: employers. Cyber criminals have been known to trick major companies into turning over copies of W-2 forms for their employees. This is actually a CEO imposter scam, where a criminal pretends to be a top company employee and asks payroll or human resources for sensitive information. This information is then used to file bogus returns or is sold online to other criminals.</li>\n</ol>\n<p>&nbsp;</p>\n<ol start=\"3\">\n<li><strong>IRS Phone Scam</strong> – Scammers make calls claiming they are with the IRS, acting as though a tax bill is owed that one must pay immediately or be arrested. They use common names to identify themselves and fake IRS badge numbers to appear legitimate, send fake emails to support their verbal phone claims, and they will usually call again claiming to be the police department or the DMV in an attempt to extort additional funds. Yikes! One thing to note: the IRS will NEVER call an individual. They send official notices in the mail, but if the IRS pops up on the caller ID, don’t answer.</li>\n</ol>\n<p><strong> </strong></p>\n<ol start=\"4\">\n<li><strong>Canceling Your SSN</strong> &#8211; Criminals are making calls and threatening to <a href=\"https://www.irs.gov/newsroom/taxpayers-should-be-on-the-lookout-for-new-version-of-ssn-scam\">suspend or cancel your Social Security number</a>until overdue taxes are paid. The scam may seem legitimate because the caller has personal information, including the last four digits of your SSN. If someone calls and threatens to cancel or suspend your social security number, hang up immediately. If they call back, don&#8217;t answer. Write down the number and then <a href=\"https://www.treasury.gov/tigta/contact_report_scam.shtml\">report the call on this site</a>, and send an email with the subject of &#8220;IRS Phone Scam&#8221; to phishing@irs.gov and include the phone number, as well as any other details that are relevant, in the body of the email.</li>\n</ol>\n<p>With more taxes processed online and scammers always thinking one step ahead, it’s important for every employee receiving their W-2s to have cyber awareness training. Understanding the risks that are out there help people to feel more empowered to thwart them when handling personal online transactions.</p>\n<h2>Combatting Tax Scams with inCyt</h2>\n<p>Circadence is here to help. Our newest product, inCyt, is a browser-based strategy game that invites players with limited cybersecurity knowledge to compete in cyber-themed battles. inCyt’s progressive, inventive cyber learning program teaches cybersecurity awareness through games and interactivity with colorful characters and friendly competition. Lessons are embedded in the gameplay, so players learn cybersecurity basics as soon as they engage with the program. Players start learning basic cybersecurity topics including email security and best practices for software updates before venturing to understand more nuanced concepts about social media, insider threats, ransomware and more. inCyt will be available in Spring 2020.</p>\n<p>Empower your employees with persistent, hands-on cyber training. To learn more visit: <a href=\"https://www.circadence.com/products/inCyt\">https://www.circadence.com/products/inCyt</a></p>\n","title":"Top Tax Season Scams and How to Avoid Them"}},{"node":{"id":"faa43703-86c7-5611-9d52-209a127fd3ba","slug":"things-to-do-at-rsa-2020","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/02/headway-F2KRf_QfCqw-unsplash-scaled.jpg"},"date":"2020-02-11T16:56:24.000Z","content":"<p><span data-contrast=\"auto\">This year’s </span><a href=\"https://marketing.circadence.com/acton/media/36273/rsa-conference-2020\"><span data-contrast=\"none\">RSA Conference</span></a><span data-contrast=\"auto\"> is sure to be chock</span><span data-contrast=\"auto\">&#8211;</span><span data-contrast=\"auto\">full of exciting innovations, new technology, and swag galore. As much as we love the excitement of being on the expo floor, it’s always a good idea to take time </span><span data-contrast=\"auto\">to</span><span data-contrast=\"auto\"> explore the conference, meet new people, and unwind with a </span><span data-contrast=\"auto\">few good colleagues or newfound friends</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">This</span><span data-contrast=\"auto\"> list of networking gatherings and affiliate events </span><span data-contrast=\"auto\">will help</span><span data-contrast=\"auto\"> you make the most out of your RSA experience!</span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> </span></p>\n<h2><span data-contrast=\"auto\">E</span><span data-contrast=\"auto\">vents through RSA:</span><span data-ccp-props=\"{}\"> </span></h2>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/25 6:00 pm to 8:00 pm</span></b><b><span data-contrast=\"auto\">: </span></b><a href=\"https://www.rsaconference.com/usa/agenda/cybeer-ops-2\"><b><span data-contrast=\"none\">CyBeer</span></b><b><span data-contrast=\"none\"> Ops Networking Reception</span></b></a><span data-contrast=\"auto\"> – Craft beer tasting event that doubles as a great networking opportunity.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/27 6:00 pm to 9:00 pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.rsaconference.com/usa/agenda/rsac-after-hours\"><b><span data-contrast=\"none\">RSAC After H</span></b><b><span data-contrast=\"none\">o</span></b><b><span data-contrast=\"none\">urs</span></b></a><span data-contrast=\"auto\"> – </span><span data-contrast=\"auto\">Enjoy food, drinks, and dancing to a live 80’s cover band.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/25 5:00 pm to 7:00 </span></b><b><span data-contrast=\"auto\">pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.rsaconference.com/usa/agenda/womens-networking-reception\"><b><span data-contrast=\"none\">RS</span></b><b><span data-contrast=\"none\">AC Women’s Net</span></b><b><span data-contrast=\"none\">w</span></b><b><span data-contrast=\"none\">orking Reception</span></b></a><span data-contrast=\"auto\"> – Relaxed networking event celebrating women’s contributions to science and technology.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/24 5:00 pm to 7:00 </span></b><b><span data-contrast=\"auto\">pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.rsaconference.com/usa/the-experience/networking/welcome-reception\"><b><span data-contrast=\"none\">Welco</span></b><b><span data-contrast=\"none\">m</span></b><b><span data-contrast=\"none\">e Reception</span></b></a><span data-contrast=\"auto\"> – Kick off the conference with drinks and apps while previewing cyber solutions from over 700 exhibito</span><span data-contrast=\"auto\">r</span><span data-contrast=\"auto\">s.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Multiple da</span></b><b><span data-contrast=\"auto\">tes</span></b><b><span data-contrast=\"auto\"> and times, registration required:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.rsaconference.com/usa/the-experience/special-programs/engagement-zone\"><b><span data-contrast=\"none\">RSAC Enga</span></b><b><span data-contrast=\"none\">g</span></b><b><span data-contrast=\"none\">ement Zone</span></b></a><span data-contrast=\"auto\"> – Engage, network, and make personal connections with others who share your interests through </span><span data-contrast=\"auto\">Braindate</span><span data-contrast=\"auto\">, Birds of a Feather, Cooperative Learning roundtables, and more.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Multiple dates and </span></b><b><span data-contrast=\"auto\">times:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.rsaconference.com/usa/the-experience/innovation-programs/sandbox\"><b><span data-contrast=\"none\">RS</span></b><b><span data-contrast=\"none\">AC Sandbo</span></b><b><span data-contrast=\"none\">x</span></b></a><span data-contrast=\"auto\"> – Show off your cyber skills through hands-on experiences a</span><span data-contrast=\"auto\">nd mingle with peers at this engaging event.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/26 4:30 pm to 6:00 </span></b><b><span data-contrast=\"auto\">pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.rsaconference.com/usa/agenda/pub-crawl-2\"><b><span data-contrast=\"none\">Ex</span></b><b><span data-contrast=\"none\">po</span></b><b><span data-contrast=\"none\"> </span></b><b><span data-contrast=\"none\">Pub Crawl</span></b></a><span data-contrast=\"auto\"> – Enjoy complimentary beer, wine, and non-alcoholic beverages while visiting sponsor’s booth</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\"> and learning about their latest innovations</span><span data-contrast=\"auto\"> to support your business</span><span data-contrast=\"auto\">.</span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n</ul>\n<p><span data-ccp-props=\"{}\"> </span></p>\n<h2><span data-contrast=\"auto\">Affiliate </span><span data-contrast=\"auto\">e</span><span data-contrast=\"auto\">vents:</span><span data-ccp-props=\"{}\"> </span></h2>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/24 </span></b><b><span data-contrast=\"auto\">7:00 pm to 10:00 </span></b><b><span data-contrast=\"auto\">pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.eventbrite.com/e/cybertacos-rsac-tickets-65837260017\"><b><span data-contrast=\"none\">CYBERTAC</span></b><b><span data-contrast=\"none\">OS at RSAC</span></b></a><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">– </span><span data-contrast=\"auto\">Talk over tacos with members of the local cybersecurity and broader IT community</span><span data-contrast=\"auto\">.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/24 7:00pm to 10:00 pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://go.flashpoint-intel.com/RSA-Conference-2020/IGNITE-promo\"><b><span data-contrast=\"none\">Ignite</span></b></a><b><span data-contrast=\"auto\"> – </span></b><span data-contrast=\"auto\">With live music, snacks, cocktails, and dancing, this is THE place to be Monday night.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/25 5:00 pm to 9:00 pm</span></b><span data-contrast=\"auto\">: </span><a href=\"https://go.optiv.com/RSA2020.html\"><b><span data-contrast=\"none\">Optiv After Party</span></b></a><b><span data-contrast=\"auto\"> – </span></b><span data-contrast=\"auto\">Thirsty Bear Organic Brewing Company will have great beer on tap while you network the night away.</span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/25 6:00 pm, registration required</span></b><span data-contrast=\"auto\">: </span><a href=\"https://www.carbonblack.com/company/events/rsa-conference-2020/\"><b><span data-contrast=\"none\">VMware Carbon Black Networking Reception</span></b></a><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">– This ex</span><span data-contrast=\"auto\">c</span><span data-contrast=\"auto\">lusive happy hour at the W San Francisco is sure to be the event you need to kick off your RSA experience just right. Register now as space is limited.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/25 6:00 pm to 9:00 </span></b><b><span data-contrast=\"auto\">pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://apwg.org/npol-rsa-conference-2020/\"><b><span data-contrast=\"none\">N</span></b><b><span data-contrast=\"none\">on-Profits on the Loose</span></b></a><b><span data-contrast=\"auto\"> – </span></b><span data-contrast=\"auto\">Meet and mingle with industry, policy, and government leaders in security and privacy at this soirée.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/26 11:30 am to 1:00 pm:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.ewf-usa.com/events/event_details.asp?legacy=1&amp;id=1295984\"><b><span data-contrast=\"none\">Meet &amp; Greet at RSA Conference 2020</span></b></a><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">–</span><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">Join the Executive Women’s Forum and meet the most amazing women at the RSA Conference.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/26 5:30 pm to 8:30 pm</span></b><span data-contrast=\"auto\">: </span><a href=\"https://www.eventbrite.com/e/intl-consortium-of-minority-cyber-prof-icmcp-rsa-conference-meetup-tickets-87705612849\"><b><span data-contrast=\"none\">ICMP Networking Social RSA 2020</span></b><b><span data-contrast=\"none\"> </span></b></a><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">&#8211; Network with members, friends, and guests of the International Consortium of Minority Cybersecurity Professionals.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/26 6:30 pm to 9:30 pm</span></b><span data-contrast=\"auto\">: </span><a href=\"https://www.eventbrite.com/e/drinks-are-on-us-happy-hour-with-arctic-wolf-mimecast-at-rsa-conference-tickets-88020406405?aff=rsaconferencesite\"><b><span data-contrast=\"none\">Arctic Wolf Happy Hour</span></b></a><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">– Sips and savors at TRES Tequila Lounge and Mexican Kitchen is the perfect mid-week way to unwind.</span><br />\n<span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">2/27 9:30 pm to 11:00 am:</span></b><span data-contrast=\"auto\"> </span><a href=\"https://www.eventbrite.com/e/coffee-conversation-automating-the-fairtm-cyber-risk-framework-tickets-88912508707\"><b><span data-contrast=\"none\">Coffee &amp; Conversation: Automating the FAIR Cyber Risk Framework</span></b></a><b><span data-contrast=\"auto\"> </span></b><span data-contrast=\"auto\">– </span><span data-contrast=\"auto\">A breakfast and panel discussion that will cover everything from measuring your organization’s cyber risks to briefing your corporate board on managing cyber safety.</span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n</ul>\n<p><span data-contrast=\"auto\">Stay up to date on any additional affiliate events as they get added by checking out </span><a href=\"https://www.rsaconference.com/about/affiliate-events\"><span data-contrast=\"none\">this</span></a><span data-contrast=\"auto\"> calendar provided by the conference, and be</span><span data-contrast=\"auto\"> sure to </span><b><span data-contrast=\"auto\">swing by our booth #6480 </span></b><span data-contrast=\"auto\">to see what we’ve been working on and </span><span data-contrast=\"auto\">add to your</span><span data-contrast=\"auto\"> swag</span><span data-contrast=\"auto\"> collection</span><span data-contrast=\"auto\">. </span></p>\n<p><span data-contrast=\"auto\">To get a sneak pe</span><span data-contrast=\"auto\">e</span><span data-contrast=\"auto\">k at our latest cyber training platform, inCyt</span><span data-contrast=\"auto\"> and </span><span data-contrast=\"auto\">be sure to </span><a href=\"https://marketing.circadence.com/acton/media/36273/incyt-inside-the-human-element-of-cyber\"><span data-contrast=\"none\">register for our webinar</span></a><span data-contrast=\"auto\">, inCyt: Inside the Human Element of Cyber.</span><span data-contrast=\"auto\"> We can’t wait to see you at the conference and have some fun!</span><span data-ccp-props=\"{}\"> </span></p>\n","title":"Things to do at RSA 2020 "}},{"node":{"id":"580d9694-c4ec-5c80-9d5b-daf74d313999","slug":"living-our-mission-blog-series-paul-ellis","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/01/alexandre-debieve-FO7JIlwjOtU-unsplash-scaled.jpg"},"date":"2020-01-28T16:43:48.000Z","content":"<p><b><i><span data-contrast=\"auto\">Early Aspirations</span></i></b><b><i><span data-contrast=\"auto\"> in Technology</span></i></b><b><i><span data-contrast=\"auto\"> Become </span></i></b><b><i><span data-contrast=\"auto\">a </span></i></b><b><i><span data-contrast=\"auto\">Reality for </span></i></b><b><i><span data-contrast=\"auto\">Circadence’s</span></i></b><b><i><span data-contrast=\"auto\"> Paul Ellis</span></i></b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">Paul Ellis, Senior Product Manager at Circadence</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> was always interested in technology, even at a young age. When Paul was 8-years old</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">he </span><span data-contrast=\"auto\">rode his bike to the closest RadioShack to buy a book written for adults</span><span data-contrast=\"auto\"> on the topic of </span><span data-contrast=\"auto\">electrical engineer</span><span data-contrast=\"auto\">ing no less</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">After </span><span data-contrast=\"auto\">saving enough </span><span data-contrast=\"auto\">allowance to purchase the book, h</span><span data-contrast=\"auto\">e dove into it as soon as he got home and that’s where his love for technology really </span><span data-contrast=\"auto\">began</span><span data-contrast=\"auto\">.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">But perhaps, too, Paul’s passion stemmed from his father, who </span><span data-contrast=\"auto\">worked for a company developing computer robots. </span><span data-contrast=\"auto\">Their bond over technology contributed to Paul’s interest in the field. In fact</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">Paul </span><span data-contrast=\"auto\">and his father built </span><span data-contrast=\"auto\">their </span><span data-contrast=\"auto\">first computer</span><span data-contrast=\"auto\"> together</span><span data-contrast=\"auto\"> &#8211; an 8Mhz Intel 8088 PC</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">when he was 10 years old. </span><span data-contrast=\"auto\">Paul read the entire </span><span data-contrast=\"auto\">instruction </span><span data-contrast=\"auto\">manual from front to back to learn what he could do with his new</span><span data-contrast=\"auto\">ly built</span><span data-contrast=\"auto\"> device. From that day </span><span data-contrast=\"auto\">on, he was always creating! He created electronic devices, computers, and even </span><span data-contrast=\"auto\">composed </span><span data-contrast=\"auto\">music.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">In high school </span><span data-contrast=\"auto\">Paul </span><span data-contrast=\"auto\">played many different instruments and began his college journey</span><span data-contrast=\"auto\"> with aspirations </span><span data-contrast=\"auto\">to become </span><span data-contrast=\"auto\">a sound engineer to satisfy his </span><span data-contrast=\"auto\">interest </span><span data-contrast=\"auto\">for both technology and music. He quickly realized that his interest in technology outweighed his musical career interest</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> and </span><span data-contrast=\"auto\">that</span><span data-contrast=\"auto\"> the lifestyle of a sound engineer wasn’t very appealing.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">He changed his major to </span><span data-contrast=\"auto\">Business and </span><span data-contrast=\"auto\">Marketing</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">and graduated with a </span><span data-contrast=\"auto\">Bachelor of Science</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">from California State University </span><span data-contrast=\"auto\">San Marcos </span><span data-contrast=\"auto\">in 200</span><span data-contrast=\"auto\">5</span><span data-contrast=\"auto\">. He</span><span data-contrast=\"auto\"> then </span><span data-contrast=\"auto\">continued</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">to Purdue University for an </span><span data-contrast=\"auto\">MBA </span><span data-contrast=\"auto\">in Technology </span><span data-contrast=\"auto\">C</span><span data-contrast=\"auto\">ommercialization</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">M</span><span data-contrast=\"auto\">arketing and </span><span data-contrast=\"auto\">F</span><span data-contrast=\"auto\">inance. </span><span data-contrast=\"auto\">Throughout his </span><span data-contrast=\"auto\">academic journey </span><span data-contrast=\"auto\">and in his free time </span><span data-contrast=\"auto\">he continued to create</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">and assemble </span><span data-contrast=\"auto\">tech devices. He was never afraid of technology; he was drawn to it and always knew there was a way to control it.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">Paul, a techie through and through, followed his cyber heart and became a </span><span data-contrast=\"auto\">S</span><span data-contrast=\"auto\">enior </span><span data-contrast=\"auto\">P</span><span data-contrast=\"auto\">roduct </span><span data-contrast=\"auto\">M</span><span data-contrast=\"auto\">anager for more than a decade for various leading tech firms. </span><span data-contrast=\"auto\">H</span><span data-contrast=\"auto\">e began to learn about identity risk and how our technological advancements were increas</span><span data-contrast=\"auto\">ing</span><span data-contrast=\"auto\"> threats</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> During </span><span data-contrast=\"auto\">his time at a previous </span><span data-contrast=\"auto\">employer</span><span data-contrast=\"auto\">, LifeLock, </span><span data-contrast=\"auto\">he learned </span><span data-contrast=\"auto\">about risk prevention, identity theft, how vulnerable consumers are in the real world</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">and how </span><span data-contrast=\"auto\">risk</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">would continue to escalate if companies and individuals weren’t taking precautions to protect themselves and their devices.</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">Upon joining</span><span data-contrast=\"auto\"> Circadence</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">Paul</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">began to navigate the </span><span data-contrast=\"auto\">world of cybersecurity</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">The company’s</span><span data-contrast=\"auto\"> cutting-edge ideas and technology </span><span data-contrast=\"auto\">designed</span><span data-contrast=\"auto\"> to protect businesses, government and consumers</span><span data-contrast=\"auto\"> were appealing to him given what he </span><span data-contrast=\"auto\">had </span><span data-contrast=\"auto\">observed </span><span data-contrast=\"auto\">in </span><span data-contrast=\"auto\">previous tech positions</span><span data-contrast=\"auto\">. He was interested in the innovative products that provided new ways for cybersecurity</span><span data-contrast=\"auto\"> beginners and professionals to learn, and he could envision how it would improve the cyber posture of enterprises</span><span data-contrast=\"auto\">.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">“I feel like I’m doing something positive for society,” Paul said. He’s been with Circadence for a year now as the Senior Product Manager and continues to be inspired by his team and the revolutionary products Circadence brings to market. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“There’s a huge threat out there, and a huge lack of skills in the industry, and being a part of the solution </span></i><i><span data-contrast=\"none\">i</span></i><i><span data-contrast=\"none\">s a big part of my intrinsic motivation.</span></i><i><span data-contrast=\"none\">” </span></i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p></blockquote>\n<p><span data-contrast=\"none\">Paul enjoys </span><span data-contrast=\"none\">partaking in all </span><span data-contrast=\"none\">the different facets of a product</span><span data-contrast=\"none\">’s lifecycle</span><span data-contrast=\"none\"> – how the product supports a need for the consumer or industry, how </span><span data-contrast=\"none\">it is</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">market</span><span data-contrast=\"none\">ed</span><span data-contrast=\"none\">, and </span><span data-contrast=\"none\">how to assess</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">its financial </span><span data-contrast=\"none\">viabi</span><span data-contrast=\"none\">lity</span><span data-contrast=\"none\">. </span><span data-contrast=\"none\">He also enjoys </span><span data-contrast=\"none\">talking to</span><span data-contrast=\"none\"> customer</span><span data-contrast=\"none\">s</span><span data-contrast=\"none\"> to learn about their experience with a product first-hand, because at the end of the day, a product</span><span data-contrast=\"none\">’s success </span><span data-contrast=\"none\">is dependent upon </span><span data-contrast=\"none\">a </span><span data-contrast=\"none\">customer</span><span data-contrast=\"none\">’s</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">experience with it</span><span data-contrast=\"none\">. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"none\">Managing the success of a product is how he gauges the success of his career &#8211; w</span><span data-contrast=\"none\">hat </span><span data-contrast=\"none\">did the </span><span data-contrast=\"none\">product </span><span data-contrast=\"none\">solve, and how did it benefit the customer and the industry? </span><span data-contrast=\"none\">“</span><span data-contrast=\"none\">The payoff is seeing the cumulative </span><span data-contrast=\"none\">effect </span><span data-contrast=\"none\">of the entire product</span><span data-contrast=\"none\">,” said Paul.</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">For example, </span><span data-contrast=\"none\">i</span><span data-contrast=\"none\">n </span><span data-contrast=\"none\">November 2019 he </span><span data-contrast=\"none\">worked long hours along-side his team to prepare for </span><span data-contrast=\"none\">one of our largest partner events</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">– </span><span data-contrast=\"none\">Microsoft Ignite. </span><span data-contrast=\"none\">They developed </span><span data-contrast=\"none\">specific gamified battle rooms in Project Ares </span><span data-contrast=\"none\">to teach user’s about</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">Microsoft’s</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">new </span><span data-contrast=\"none\">security tools </span><span data-contrast=\"none\">and how they can be utilized in realistic cyber scenarios</span><span data-contrast=\"none\">.</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">A</span><span data-contrast=\"none\">ttendees could get direct experience using </span><span data-contrast=\"none\">Microsoft’s security tools </span><span data-contrast=\"none\">within </span><span data-contrast=\"none\">Project Ares</span><span data-contrast=\"none\">, which runs on Microsoft Azure</span><span data-contrast=\"none\">. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“Ignite was one of the most meaningful </span></i><i><span data-contrast=\"none\">moments</span></i><i><span data-contrast=\"none\"> in my career and I’m fortunate I had the opportunity to work with my team to pull it off! There was so much teamwork, collaboration and problem solving from planning, </span></i><i><span data-contrast=\"none\">developing, to </span></i><i><span data-contrast=\"none\">deployment at the event. It’s only in bringing people together, that </span></i><i><span data-contrast=\"none\">my </span></i><i><span data-contrast=\"none\">work succeeds.” </span></i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p></blockquote>\n<p><span data-contrast=\"none\">Paul not only enjoys doing something that keeps consumers and businesses safer, but he truly respects and values </span><span data-contrast=\"none\">his</span><span data-contrast=\"none\"> team at Circadence. There’s a true sense of trust between everyone </span><span data-contrast=\"none\">on </span><span data-contrast=\"none\">his team and he feels fortunate to have this experience in the workplace. </span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"none\">“</span><span data-contrast=\"none\">The need for improved cybersecurity is everywhere</span><span data-contrast=\"none\">,” said Paul.</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">The</span><span data-contrast=\"none\"> cyber</span><span data-contrast=\"none\"> learning products </span><span data-contrast=\"none\">Circadence </span><span data-contrast=\"none\">provide</span><span data-contrast=\"none\">s</span><span data-contrast=\"none\"> today will help teach the future cyber workforce and help protect us from the countless risks and threats that are out there. He</span><span data-contrast=\"none\"> continues to </span><span data-contrast=\"none\">fulfill</span><span data-contrast=\"none\"> his passion for technology by bringing </span><span data-contrast=\"none\">Circadence cyber learning </span><span data-contrast=\"none\">products </span><span data-contrast=\"none\">to </span><span data-contrast=\"none\">market</span><span data-contrast=\"none\">. </span><span data-contrast=\"none\">He appreciates Circadence </span><span data-contrast=\"none\">products because </span><span data-contrast=\"none\">they </span><span data-contrast=\"none\">actually </span><span data-contrast=\"none\">provide</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">trainees </span><span data-contrast=\"none\">what they need to know</span><span data-contrast=\"none\">, </span><span data-contrast=\"none\">and what they will be doing on a day-to-day basis. It’s not just about reading a white paper or watching a video</span><span data-contrast=\"none\"> – g</span><span data-contrast=\"none\">amified platforms like Project Ares provide </span><span data-contrast=\"none\">hands-on experience to master the craft of cybersecurity</span><span data-contrast=\"none\">.</span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>Photo by <a href=\"https://unsplash.com/@alexkixa?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Alexandre Debiève</a> on <a href=\"https://unsplash.com/s/photos/technology?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n<p>Photo by <a href=\"https://unsplash.com/@marvelous?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Marvin Meyer</a> on <a href=\"https://unsplash.com/s/photos/technology?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"Living Our Mission Blog Series:Early Aspirations in Technology Become a Reality for Circadence’s Paul Ellis"}},{"node":{"id":"082dc463-4f08-566b-85bf-ba6142ef94b6","slug":"living-our-mission-building-a-roadmap-to-bring-product-vision-to-reality-with-circadences-raj-kutty","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/01/bogdan-karlenko-36b7JBzhfF4-unsplash-scaled.jpg"},"date":"2020-01-20T08:45:24.000Z","content":"<p><em>This installment of the &#8220;Living our Mission&#8221; blog series features Circadence’s <span class=\"js-first-name\">Rajani</span> “<span class=\"js-nickname\">Raj</span>” <span class=\"js-last-name\">Kutty, Senior Product Manager.</span>  </em></p>\n<p>Raj is fascinated by technology’s evolution in the marketplace and that interest has informed her career path toward success. She achieved her masters degree in computer science from University of Pennsylvania in 2003. From there, she spent 15-16 years in the tech industry and has always been interested in the everchanging advancements in technology. Her tech background consists of Java programming, business analysis and product management. In the beginning of her career, she worked on mobile app designs, web app development, and programming for various industries including finance, insurance, retail, and more. For the last 10 years, she’s moved into the direction of product management. Her shift into this area began because she enjoys building a roadmap for product development and seeing it through the various stages from identifying a problem in the market, and creating a product that solves pain points for customers. Her experience working with many different industries provides an advantage to Circadence since she has a first-hand understanding of why these businesses can benefit from additional cyber security training to protect company assets.</p>\n<p>Raj started at Circadence about 7 months ago and was immediately captivated by the concept of cyber readiness and the security industry as a whole. Throughout her profession, she noticed a growing issue many companies faced: a lack of cyber security awareness and training. Over the years, she heard a lot about the cyber workforce shortage and knew the first step to creating a solution for this problem was to get the user engaged with the right type of training. In her mind, if the user is engaged in training, then it would result in better cyber defense for the organization. Her previous work experience, thoughts about cyber security readiness and ideas around engaged training were validated when she heard what Circadence was doing to help companies be “cyber ready” using gamified learning platforms. In the past, training would consist of a video, classroom lecture or reading textbooks- something dry and boring, she said. Raj felt Circadence offered a unique solution to get people interested in cyber security, which could lead to more strategic cyber defense performance and possibly minimize the cyber workforce gap.</p>\n<blockquote>\n<p style=\"text-align: left;\">“Training has to be fun and interesting to the user, while still being effective. I feel like Circadence is offering this to the cyber workforce in a game-play mode, which is more engaging for the user.”</p>\n</blockquote>\n<p style=\"text-align: left;\">Day to day, Raj works with different departments and team members at Circadence developing product strategy and bringing a product roadmap to life. Her knowledge across many industries helps ensure our products meet the needs of different organizations, while still maintaining in-depth cyber training and ease-of-use for the customer. Much like planning a road trip, which requires knowledge of route to destination, Raj leads her team every day by investigating and communicating strategy and plans to determine where they need to go next to bring the product to market.</p>\n<p>Her main focus over the last couple months has been a new portal Circadence is developing called CyberBridge. CyberBridge is the entry point at which users can access all Circadence cyber learning platforms including <a href=\"https://www.circadence.com/products/project-ares\">Project Ares®</a>, <a href=\"https://www.circadence.com/products/inCyt\">inCyt®</a>, <a href=\"https://www.circadence.com/products/orion/\">Orion®</a> and more. It’s a global SaaS platform that offers different types of cyber training content for different markets.</p>\n<blockquote><p>“I love that I get to help design a product that addresses the cyber challenges across different industries and the ability to provide a readiness solution pertinent to each sector’s security pain points.”</p></blockquote>\n<p>The products Raj helps map to market fulfills her goal of bringing much-needed cyber awareness and training solutions to everyone and every business. Her perspective: With every tech integration, Bluetooth connection, and device-to-device communication we implement to make our working lives easier, we inherently increase our cyber risk as our attack surface widens. There are no signs of a slowing tech usage, hence why the importance of cyber awareness continues to grow each day. When we talk about how businesses need to protect themselves, we’re really talking about the people of a business, since people are what make up a company. In today’s world of escalating cyber threats, it’s everyone’s responsibly to gain cyber awareness to protect a company.</p>\n<blockquote><p>“Cybersecurity is like community immunity, when everyone gets vaccinated, we are improving and protecting our greater community, and cyber security works the same way.”</p></blockquote>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">\n<p><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@lockwood?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">John Lockwood</a> on <a href=\"https://unsplash.com/s/photos/road?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@bogdan_karlenko?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Bogdan Karlenko</a> on <a href=\"https://unsplash.com/s/photos/plan?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Living Our Mission: Building a Roadmap to Bring Product Vision to Reality with Circadence’s Raj Kutty"}},{"node":{"id":"977e9d27-9531-5336-920d-6af7c0d0b560","slug":"microsoft-security-blog-rethinking-cyber-scenarios-learning-and-training-as-you-defend","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/10/krzysztof-kowalik-KiH2-tdGQRY-unsplash.jpg"},"date":"2020-01-14T18:33:53.000Z","content":"<p>In this third and final post in the series, Microsoft&#8217;s Mark McIntyre addresses more advanced SecOps scenarios that an experienced cyber practitioner would be concerned with understanding.</p>\n","title":"Microsoft Security Blog: Rethinking cyber scenarios—learning (and training) as you defend"}},{"node":{"id":"8738b7ea-9ec8-54fe-b3b3-67b301d65b3c","slug":"new-year-new-threats-top-cyber-threats-anticipated-to-hit-big-in-2020-for-enterprise-companies","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/01/bud-helisson-kqguzgvYrtM-unsplash-scaled.jpg"},"date":"2020-01-13T08:45:27.000Z","content":"<p>As we enter the New Year, one thing is certain: cyber attacks aren’t going anywhere. Enterprise companies have been tasked with defending their networks from unyielding cyber crooks who want a piece of the pie for themselves. What’s on the horizon for enterprise security threats in 2020? We’ve got a few predictions.</p>\n<ul>\n<li>\n<h3><strong>DeepFakes</strong></h3>\n<p><a href=\"https://www.circadence.com/blog/deepfake-the-deeply-disturbing-implications-behind-this-new-technology/\">Deep Fake technology</a> can create fake but incredibly realistic images, text, and videos. Computers can rapidly process numerous facial biometrics, and mathematically build or classify human features, to mimic a person or group of individuals for public manipulation. Bloomberg reports the tech is becoming so sophisticated, detecting a DeepFake video from a real one, is getting harder and harder to differentiate for viewers.</p>\n<p>While the technical benefits are impressive, underlying flaws inherent in all types of Deep Fake models represent a rapidly growing security weakness, which cyber criminals will exploit. It will be critical for businesses to understand the security risks presented by facial recognition and other biometric systems and educate themselves on the risks as well as hardening systems that require/use facial recognition.</li>\n<li>\n<h3><strong>API and Cloud vulnerabilities </strong></h3>\n<p>An application programming interface (API) is an interface or communication protocol between different parts of a computer program intended to simplify the implementation and maintenance of software. APIs are an essential tool in cloud environments, acting as a service gateway to enable direct and indirect cloud software and infrastructure services to cloud users.</p>\n<p><a href=\"https://www.slideshare.net/Imperva/api-security-survey?qid=aab26aae-da6c-40b0-8c28-0ea3a0f526a8&amp;v=&amp;b=&amp;from_search=4\">A recent study </a>showed more than three in four organizations treat API security differently than web app security, indicating API security readiness lags behind other aspects of application security. The study also reported that more than two-thirds of organizations expose APIs to the public to enable partners and external developers to tap into their software platforms and app ecosystems. Threat actors are following the growing number of organizations using API-enabled apps because APIs continue to be an easy – and vulnerable – means to access a treasure trove of sensitive data. Despite the fallout of large-scale breaches and ongoing threats, APIs often still reside outside of the application security infrastructure and are ignored by security processes and teams.</li>\n<li>\n<h3><strong>5G Threats</strong></h3>\n<p>With the rollout of 5G continuing in 2020, we will see an increase in the volume and speed of data theft. <a href=\"https://cybersecurity.att.com/blogs/security-essentials/att-cybersecurity-insights-report-security-at-the-speed-of-5g\">The AT&amp;T Cybersecurity Insights Report: Security at the Speed of 5G</a>, shows that larger enterprises are not prepared for the security implications of 5G. The top cyber security concerns that came back in this report were:</li>\n<li>Larger attack surface due to the massive increase in connectivity</li>\n<li>Greater number of devices accessing the network</li>\n<li>The extension of security policies</li>\n<li>Authentication of a larger number and wider variety of devices.</li>\n</ul>\n<p>As more 5G devices enter the network, organizations must prepare for the onslaught of added security threats.</p>\n<ul>\n<li>\n<h3><strong>Ransomwar</strong><strong>e attacks evolve</strong></h3>\n<p>Ah, <a href=\"https://www.circadence.com/blog/ransomware-the-attack-du-jour/\">ransomware</a>, seemingly every hacker’s favorite extortion tool. According to <a href=\"https://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-labs-2020-threats-predictions-report/\">McAfee Labs 2020 Threat Prediction Report</a>, the increase of targeted ransomware has created a growing demand for compromised company networks. This demand is met by criminals who specialize in penetrating company networks and sell complete network access in one go.</li>\n</ul>\n<blockquote><p>“I expect that the ransomware used will continue to become more advanced. I am concerned that some threats have just become more stealthy, or are working toward that, and that readily available ransomware will enable even novice criminals to maintain stealth. Organizations are spending more resources to defend against ransomware, which might drive out a few of the lesser players, but any organization with resources will still see ransomware attacks happen as a fast and easy way for financial gain, so hackers will continue to pursue advancements.” ~ Karl Gosset, VP of Content Development at Circadence</p></blockquote>\n<p>It’s clear that the threat landscape will continue to grow and become more sophisticated in the coming year, which means it’s time for businesses to step up their security game.</p>\n<p>Circadence believes that the best way to do this is through cyber learning games themselves! Our flagship product, <a href=\"https://www.circadence.com/products/project-ares\">Project Ares</a>, delivers real-world attack scenarios in a safe, online range environment and allows users to practice and hone their cyber skills through the use of games. With missions specific to enterprise threats, such as Operation Crimson Wolf and Operation Desert Whale, Project Ares will ready your organization for any looming threats like these. By using a gamified cyber learning platform like this for your security teams in 2020, you can readily pop some champagne and dance the night away, knowing your enterprise is better protected in the new year.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">\n<p>Photo by <a href=\"https://unsplash.com/@robynnexy?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Robynne Hu</a> on <a href=\"https://unsplash.com/s/photos/future?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@budhelisson?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Bud Helisson</a> on <a href=\"https://unsplash.com/s/photos/future?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"New Year, New Threats: Top Cyber Threats Anticipated to Hit Big in 2020 for Enterprise Companies"}},{"node":{"id":"a74ab6c5-69d2-5f47-9697-c156f53ef318","slug":"the-future-of-finance-cyber-security-in-2020","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2020/01/ryan-born-x8i6FfaZAbs-unsplash-scaled.jpg"},"date":"2020-01-06T07:45:18.000Z","content":"<p>Cyber attacks seem to grow more sophisticated and menacing with each passing year. No industry understands this better than finance, as their enormous stores of cash and sensitive data make them a prime target for hackers year-round. Let’s look ahead at four trends that are likely to play a role in 2020’s biggest banking hacks and share how we can help harden financial services firm’s security posture to prevent attacks.</p>\n<h2><strong>Ransomware attacks will evolve</strong></h2>\n<p><a href=\"https://www.webroot.com/blog/2019/02/28/the-ransomware-threat-isnt-over-its-evolving/\">Ransomware attacks</a> are believed to cost victims billions of dollars every year, as hackers deploy technologies that enable them to literally kidnap an individual or organization’s databases and hold all of the information for a ransom. As companies continue to focus on building stronger defenses to guard against ransomware breaches, <a href=\"https://www.comparitech.com/antivirus/ransomware-statistics/\">some experts believe</a> hackers will increasingly target other potentially profitable ransomware victims such as high-net-worth individuals.</p>\n<h2><strong>Biometric security leaks and anti-fraud system bypass </strong></h2>\n<p>A new report from cyber security company <a href=\"https://securelist.com/financial-predictions-2020/95388/\">Kaspersky</a> states that cybercriminals have created a huge underground market called Genesis, which sells digital fingerprints of online banking users from all over the world. There have also been several biometric database security leaks in the last year, the most notorious of which was the <a href=\"https://www.securityinfowatch.com/access-identity/biometrics/news/21093873/report-biometric-data-exposed-in-suprema-biostar-2-breach\">Biostar 2 database</a>, which included the exploitation of biometric data of over 28 million people. With biometric leaks on the rise, this will make it easier for hackers to bypass anti-fraud systems to gain access to online bank records.</p>\n<h2><strong>Increased third party risks</strong></h2>\n<p>Banks have not been impervious to the decentralization of IT that has affected most enterprise businesses. As organizations become increasingly reliant on third-party vendors for their day-to-day operations, financial services firms must be continuously monitored for cyber security vulnerabilities. Lack of awareness of how third-party security services operate could cost banks millions in 2020 and beyond. Ensure your cyber team is not only monitoring its own vulnerabilities but that of its outsourced security as well.</p>\n<h2><strong>Cryptocurrency hacks</strong></h2>\n<p>Big banks are starting to dip their toes in the crypto waters, with <a href=\"https://www.cnbc.com/2018/04/24/20-percent-of-financial-firms-are-looking-to-trade-crypto-in-2018-survey.html\">one in five financial </a>firms saying they might start trading <a href=\"https://www.sciencedirect.com/science/article/abs/pii/S1361372319300636\">cryptocurrencies</a>. However, crypto exchange has had many hacks of its own, including the <a href=\"https://www.fool.com/investing/2018/05/09/the-biggest-cryptocurrency-hacks-in-history.aspx\">largest in history</a>, which happened earlier this year. Japanese crypto exchange, Coincheck, was drained of coins worth a total of roughly $534 million. In the first half of 2019 alone, hackers have stolen approximately <a href=\"https://www.forbes.com/sites/jeanbaptiste/2019/08/15/hackers-stole-over-4-billion-from-crypto-crimes-in-2019-so-far-up-from-1-7-billion-in-all-of-2018/#3e52a7e255f5\">$4.26 billion worth of crypto currency</a>. It’s possible that the involvement of major financial institutions will shore up the security of the crypto industry — but if the past is any indicator, extreme measures will have to be taken to ensure the security of these digital currencies.</p>\n<p>So, how can financial institutions continue to grow and adapt to new technologies while keeping their stores of information and constituent’s wealth safe from adversaries?</p>\n<p>Circadence has a solution: our gamified cyber learning platform, <a href=\"https://www.circadence.com/products/project-ares\">Project Ares.</a> Project Ares can be used by everyone at your institution from the Chief Financial Officer to IT teams. With persistent, hands-on learning in a safe, browser-based environment, financial services security teams can stay up to date on the latest threats and feel prepared to keep them at bay. With finance specific missions such as <strong>Operation Wounded Bear and Operation Crimson Wolf</strong>, your team can practice combatting hackers anytime, anywhere. Don’t let your finance company be the next one making headlines for a data breach, see what Project Ares can do for you.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@erol?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Erol Ahmed</a> on <a href=\"https://unsplash.com/s/photos/banking?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"The Future of Finance Cyber Security in 2020"}},{"node":{"id":"9ad1a025-7fd0-5fa6-8311-3b7f3d78aac8","slug":"living-our-mission-project-ares-takes-full-flight-with-cloud-native-architecture","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/12/projAres_office_03_wallpaper_1920x1080.jpg"},"date":"2019-12-19T16:28:08.000Z","content":"<p>According to CIO magazine, about <a href=\"https://www.cio.com/article/3267571/it-governance-critical-as-cloud-adoption-soars-to-96-percent-in-2018.html\">96% of organizations use cloud services</a> in one way or another. In partnership with Microsoft, we are proud to announce that Circadence has redesigned its Project Ares cyber learning platform to fully leverage a cloud-native design on Microsoft Azure.  This new, flexible architecture improves cyber training to be even more customized, scalable, accessible, and relevant for today’s professionals.</p>\n<p>This transition to cloud infrastructure will yield immediate impacts to our current customers.</p>\n<ul>\n<li>Increased speeds to launch cyber learning battle rooms and missions</li>\n<li>Greater ability to onboard more trainees to the system from virtually any location</li>\n<li>More access to cyber training content that suits their security needs and professional development interests</li>\n</ul>\n<h2>Proven success at Microsoft Ignite</h2>\n<p>At the recent Microsoft Ignite conference (November 2019), more than 500 security professionals had the opportunity to use the enhanced platform.  Conference participants set up CyberBridge accounts and then played customized battle rooms in Project Ares. Microsoft cloud-based Azure security solutions were integrated into the cloud-based cyber range to provide an immersive “cloud-in-cloud” sandboxed learning experience that realistically aligned to phases of a ransomware attack.  The new version of Project Ares sustained weeklong intensive usage while delivering on performance.<em>  </em></p>\n<p>So what’s new in the new and improved Project Ares?</p>\n<h2>Curriculum Access Controls for Tailored Cyber Learning</h2>\n<p>One of the biggest enhancements for Project Ares clients is that they can now control permissions for  training exercises and solution access at the user level. Customer Administrators will use the new CyberBridge management portal to tailor access to Circadence training exercises for individual users or groups of users.</p>\n<p>Single-sign-on through CyberBridge enables the alignment of training exercises to individuals based on their unique learning requirements including:</p>\n<ul>\n<li>Cyber skill-building exercises and complex missions within Project Ares for cyber professionals</li>\n<li>Cyber foundation learning with Cyber Essentials tools for the IT team</li>\n<li>Security awareness training with inCyt for general staff</li>\n</ul>\n<p>Cyber Essential learning tools and the inCyt game for security awareness will be added to CyberBridge over the next several months. With the capability to pre-select training activities reflective of a company’s overall security strategy, enterprise security managers can call the shots<strong>. </strong></p>\n<blockquote><p>“As the administrator, you now choose what curriculum content your team should have. “This provides more flexibility in cyber training for our customers in terms of what they can expose to their teams.” ~ Rajani Kutty, Senior Product Manager for CyberBridge at Circadence.</p></blockquote>\n<h2>Greater Scalability and Performance in Cyber Training</h2>\n<p>With a cloud-native architecture design, Project Ares can support more simultaneous users on the platform than ever before. Project Ares can now handle over 1,000 concurrent users, a significant improvement over historical capacity of 200-250 concurrent users on the platform.  The combination of  content access control at the group or individual level and the increased scalability of Project Ares creates a solution that effectively spins up cyber ranges with built-in learning exercises for teams and enterprises of any size.  Additionally, this means that no matter where a cyber learner is geographically, they can log on to Project Ares and access training quickly. We see this as similar to the scalability and accessibility of any large global content provider (e.g. Netflix)—in that users who have accounts can log in virtually anywhere in the world at multiple times and access their accounts.</p>\n<p>Now that Project Ares can support a greater volume of users on the platform, activities like hosting cyber competitions and events for experts and aspiring security professionals can be done on-demand and at scale.</p>\n<blockquote><p>“We can train more people in cyber than ever before and that is so impactful when we remember the industry’s challenges in workforce gaps and skills deficiencies.” ~ Paul Ellis, Project Ares Senior Product Manager at Circadence</p></blockquote>\n<p>The previous design of Project Ares required placing users in “enclaves” or groups when they signed on to the system to ensure the content within could be loaded quickly without delay. Now, everyone can sign in at any time and have access to learning without loading delays. It doesn’t even matter if multiple people are accessing the same mission or battle room at the same time. Their individual experience loading and playing the exercise won’t be compromised because of increased user activity.</p>\n<p>Other performance improvements made to this version of Project Ares include:</p>\n<ul>\n<li>Quicker download speeds of cyber exercises</li>\n<li>Use of less memory on user’s computers, and resulting longer battery life for users, thanks to lower CPU utilization.</li>\n<li>These behind-the-scenes improvements mean that training can happen quicker and learning, faster.</li>\n</ul>\n<h2>New Cyber Training Content</h2>\n<p>One new Mission and three new Battle Rooms will be deployed throughout the next few months on this new version of Project Ares.</p>\n<ul>\n<li>Mission 15, Operation Raging Mammoth, showcases how to protect against an Election attack</li>\n<li>Battle Rooms 19 and 20 feature Splunk Enterprise installation, configuration, and fundamentals</li>\n<li>Battle Room 21 teaches Powershell cmdlet (pronounced command-lets) basics</li>\n</ul>\n<p>Mission 15 has been developed from many discussions about 2020 election security given past reports of Russian hacktivist groups interfering with the 2016 U.S. election.  In Operation Raging Mammoth, users are tasked to monitor voting-related systems. In order to identify anomalies, players must first establish a baseline of normal activity and configurations. Any changes to administrator access or attempt to modify voter registration information must be quickly detected and reported to authorities. Like all Project Ares Missions, the exercise aligns with NIST/NICE work roles, specifically Cyber Defense Analyst, Cyber Defense Incident Responder, Threat/Warning analyst.</p>\n<p>Battle Rooms 19 and 20 focuses on using Splunk software to assist IT and security teams to get the most out of their security tools by enabling log aggregation of event data from across an environment into a single repository of critical security insights. Teaching cyber pros how to configure and use this tool helps them identify issues faster so they can resolve them more efficiently to stop threats and attacks.</p>\n<p>Battle Room 21 teaches cmdlet lightweight commands used in PowerShell.  PowerShell is a command-line (CLI) scripting language developed by Microsoft to simplify automation and configuration management, consisting of a command-line shell and associated scripting language. With PowerShell, network analysts can obtain all the information they need to solve problems they detect in an environment. Microsoft notes that PowerShell also makes learning other <a href=\"https://docs.microsoft.com/en-us/powershell/scripting/learn/understanding-important-powershell-concepts?view=powershell-6\">programming languages like C# easier</a>.</p>\n<h2>Embracing Cloud Capabilities for Continual Cyber Training</h2>\n<p>Circadence embraces all the capabilities the cloud provides and is pleased to launch the latest version of Project Ares that furthers our vision to provide sustainable, scalable, adaptable cyber training and learning opportunities to professionals so they can combat evolving threats in their workplace and in their personal lives.</p>\n<p>As this upward trend in cloud utilization becomes ever-more prevalent, security teams of all sizes need to adapt their strategies to acknowledge the adoption of the cloud and train persistently in Project Ares. You can bet that as more people convene in the cloud, malicious hackers are not far behind them, looking for ways to exploit it. By continually innovating in Project Ares, we hope professionals all over the globe can better manage their networks in the cloud and protect them from attackers.</p>\n","title":"Living our Mission: Project Ares Takes Full Flight with Cloud-Native Architecture"}},{"node":{"id":"8b766adf-3b8c-5741-b4ac-2883a429e02f","slug":"holiday-hacks-in-the-financial-sector-what-you-need-to-know-to-stop-grinches-during-the-holiday-season","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/12/m-b-m-ZzOa5G8hSPI-unsplash.jpg"},"date":"2019-12-18T21:30:51.000Z","content":"<p>Not everyone gets into the holiday spirit, but whether or not your stockings are hung by the chimney with care, there are real world cyber grinches out there looking to steal holiday joy and sensitive data. The Financial Sector in particular is a high-profile target for hackers in the cyber industry year-round but the holiday season has historically attracted a larger quantity of cyber criminals who conduct attacks designed to steal money, social security numbers, addresses, and other sensitive information. The volume of e-commerce and e-banking transactions that occur during the holiday season provide ample opportunities for hostile actors to exploit financial institution networks. Specifically, “attacks on <a href=\"https://www.swift.com/about-us\">SWIFT</a>—the leading global network for money and security transfers—alone cost $1.8 billion year-to-date” Forbes reports. To understand just how vulnerable banking and financial organizations are, let’s review the attacks that financial cyber teams should look out for and then discuss systemic solutions to safeguard finance networks, companies, and their stakeholders.</p>\n<h2>Financial institutions are susceptible to any of the following cyber attack types:</h2>\n<ul>\n<li><strong>Distributed Denial-of-Service Attacks (DDoS)</strong> &#8211; DDoS attacks are a weapon that has historically been leveraged against the financial sector. These attacks occur when multiple systems flood the resources of a single targeted system. One of the most historic DDoS attacks occurred back in 2012 when a <a href=\"https://www.cio.com/article/2389721/ddos-attacks-against-us-banks-peaked-at-60-gbps.html\">whopping 6 banks in the US</a> including Bank of America, JP Morgan Chase, U.S. Bancorp, Citigroup, and PNC Bank, were hit by a string of DDoS attacks. Each bank was hit with an unusually high volume of internet traffic, resulting in customers experiencing difficulty when logging into mobile banking apps. This form of malicious vandalism disrupted service and, like many DDoS attacks, acted as a political statement where the hackers sought to shed light on their perceptions of banking organizations. Past evidence has suggested that DDoS attacks actually increase as the holiday season approaches, as consumers are spending more and utilizing mobile banking more frequently. In fact, security firms report a <a href=\"https://azure.microsoft.com/en-us/blog/holiday-season-is-ddos-season/\">150% increase in DDos attacks</a> between the summer months and the end of the year.</li>\n<li><strong>Ransomware</strong> &#8211; Ransomware can be delivered through various online channels, including through phishing tactics and Remote Desktop Protocol (RDP). RDP allows computers to connect to each other across a network, so that remote users can gain access to various applications on virtual desktops. Cyber criminals may take advantage of financial institutions by deploying ransomware over the holiday season, at a time when stakeholders (aka consumers) may need increased access to funds for purchases. According to a <a href=\"https://www.techradar.com/news/ransomware-to-dominate-cybercrime-in-2020\">report by TechTarget</a>, most ransomware attacks typically occur during the holidays when network admins and other IT staff are spread thin.</li>\n<li><strong>Web-Application Attacks</strong> – The expansion of online and digital services, including mobile apps, has increased the surface for web application attacks. A web application attack is just that – a hacker gains access to an app through a system vulnerability and is able to access sensitive information. For financial institutions, this relates to online banking, banking apps, and web applications that banks use such as SWIFT mentioned above. According to a <a href=\"https://blogs.akamai.com/2019/01/2018-peak-holiday-web-traffic-analysis-advice-for-2019---part-two.html\">report by Akamai</a>, “Looking at the assorted web application attacks, the number of attacks on Christmas Day were comparable to Cyber Monday…this is likely due to the fact retailers want to track their Christmas sales more than any other day of the year, and web application developers end up including a lot more third-party scripts/content on their sites, and attackers take advantage of that.”</li>\n<li><strong>Banking Trojans</strong> &#8211; Due to their popularity and high success rate, banking Trojans remain a weapon of choice for conducting malicious cyber attacks. These kinds of attacks involve redirecting traffic from a genuine app to a network the hacker has access to so that they can easily take sensitive information. Tactics used by hostile cyber actors to deliver banking Trojans continue to evolve, adapting to and implementing any technique that can effectively take advantage of a user. In 2017, the <a href=\"https://threatvector.cylance.com/en_us/home/threat-spotlight-panda-banker-trojan-targets-the-us-canada-and-japan.html\">Panda Banking Trojan</a> was observed focusing on non-banking targets using an extensive list of injects clearly designed to capitalize on holiday shopping and activities. Similarly, in 2017, the <a href=\"https://www.rsa.com/en-us/blog/2019-09/ramnit-malware-makes-a-return-with-new-tricks\">Ramnit Banking Trojan</a> was extremely active during the holiday season, targeting some of the largest banks and retail e-commerce sites in the world. Both of these trojans continue to reappear each year, targeting financial institutions and their customers.</li>\n</ul>\n<h2></h2>\n<h2>Systemic Cyber Readiness Solutions for Financial Services</h2>\n<ul>\n<li><strong>Expand your view of cyber risk</strong> – A cyber attack doesn’t just mean data is compromised the implications are much deeper than that. You may need to shut down systems during recovery, you might lose existing customers, get a bad reputation, or see a decline in new customer acquisition. A deeper understanding of how a cybersecurity event could impact your financial institution will help you better understand what’s at stake and in turn, take action to better protect your company.</li>\n<li><strong>Proactive cyber learning and training </strong>– Hackers are doing their research and implementing attacks using new technologies and strategies every day. Practicing proactive cyber learning to understand the latest cyber threats safeguard your business.</li>\n<li><strong>Calculate capital</strong> – According to the <a href=\"https://www2.deloitte.com/content/dam/insights/us/articles/4222_Global-risk-management-survey/DI_global-risk-management-survey.pdf\">Deloitte Insights Global Risk Management Survey</a>, most financial institutions calculate economic capital for their financial risks, but only 16% calculate how much capital will be needed to support a cyber security incident. An accurate calculation of how much you may need to recover, both in real and unrecognized revenue, will help you better prepare for looming threats.</li>\n</ul>\n<p>Don’t let your financial institution fall victim to a holiday hack. Utilize persistent, hands-on, gamified cyber training to put your cyber teams on the front lines of defense. Circadence’s flagship product, <a href=\"https://www.circadence.com/products/project-ares\">Project Ares</a>, ensures higher user engagement and learning retention through the use of cyber ranges. Project Ares utilizes a library of mission scenarios with specific skill-based learning to accurately measure skills and performance, such as:</p>\n<ul>\n<li><strong>Operation Wounded Bear</strong> – This mission is specifically designed to teach users how to protect a financial institution by identifying and removing malware responsible for identity theft and protecting the network from further infections. Users learn intrusion detection, basic malware analysis, and infection containment and eradication.</li>\n<li><strong>Operation Crimson Wolf</strong> – Crimson Wolf teaches users to stop a ransomware attack from spreading and infecting other boxes in the network. They learn computer network defense, incident response management, data forensics and handling, and so much more.</li>\n<li><strong>Operation Bold Hermit</strong> – As a cyber operator, users defend against web attacks by identifying reconnaissance activity and beacons inside a network and locate the attack vector. Users build skills including network management, infrastructure design, and hacking methodologies.</li>\n</ul>\n<p>These missions and more cyber learning activities in Project Ares allow users to gain insight into real-world attack scenarios pertinent to their industry in a safe learning environment. These specific mission scenarios can help to keep financial institutions at the front lines of cyber defense over the holidays and year-round. Just like the grinch’s heart, you can grow your cyber defense to stay happy year-round! To learn more about what Project Ares can do for you, visit  <a href=\"https://www.circadence.com/\">www.circadence.com</a>.</p>\n<p>&nbsp;</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@helloquence?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Helloquence</a> on <a href=\"https://unsplash.com/s/photos/finance?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@m_b_m?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">M. B. M.</a> on <a href=\"https://unsplash.com/s/photos/finance?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Holiday Hacks in the Financial Sector: What You Need to Know to Stop “Grinches” during the Holiday Season  "}},{"node":{"id":"15b453aa-a42b-57eb-a42b-d6b0b6e6a7c1","slug":"living-our-mission-blog-series-cyber-security-teaching-the-perfect-match-for-developing-cyber-curriculum-in-project-ares-for-circadences-megan-daudelin","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/12/joshua-sortino-LqKhnDzSF-8-unsplash.jpg"},"date":"2019-12-16T16:34:34.000Z","content":"<p><span data-contrast=\"auto\">Ever wondered about the people behind Project Ares’ development? How does Circadence identify and develop learning curriculum material to benefit today’s cyber professionals? The crux of the strategy stems from the talents within our own Circadence family and is the driving force behind </span><span data-contrast=\"auto\">this “</span><span data-contrast=\"auto\">Living our Mission” article. We are sharing the unique talents of </span><b><span data-contrast=\"auto\">Megan </span></b><b><span data-contrast=\"auto\">Daudelin</span></b><b><span data-contrast=\"auto\">, Team Lead of Curriculum Development</span></b><span data-contrast=\"auto\"> for our flagship gamified learning platform</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> Project Ares. While one </span><span data-contrast=\"auto\">might</span><span data-contrast=\"auto\"> expect </span><span data-contrast=\"auto\">that </span><span data-contrast=\"auto\">a cyber background is critical to any tech-focused role</span><span data-contrast=\"auto\"> in a security compan</span><span data-contrast=\"auto\">y</span><span data-contrast=\"auto\">, Megan </span><span data-contrast=\"auto\">would </span><span data-contrast=\"auto\">argue that having a strong understanding of learning theories, experience teaching cyber subjects, and placing oneself in the customer’s shoes equally weigh in importance to successfully build</span><span data-contrast=\"auto\"> rich cyber</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">curriculum</span><span data-contrast=\"auto\"> into our products. </span><span data-ccp-props=\"{}\"> </span></p>\n<h2><span data-ccp-props=\"{}\"> </span><span data-contrast=\"none\">Blending Forensics, Hospital Security, and Cyber Education  </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">Megan has a rich history in </span><span data-contrast=\"auto\">the </span><span data-contrast=\"auto\">cyber security</span><span data-contrast=\"auto\"> industry</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">which started after </span><span data-contrast=\"auto\">she </span><span data-contrast=\"auto\">graduat</span><span data-contrast=\"auto\">ed</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">w</span><span data-contrast=\"auto\">ith her bachelor’s </span><span data-contrast=\"auto\">degree, </span><span data-contrast=\"auto\">and continued as she worked full time while completing her Master’s </span><span data-contrast=\"auto\">in Digital Forensics Management </span><span data-contrast=\"auto\">from Champlain College</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">Prior to Circadence, she</span><span data-contrast=\"auto\"> served as a Digital Forensic Analyst at ManTech </span><span data-contrast=\"auto\">and Information Security Content Analyst at Tenable Network Security.</span><span data-contrast=\"auto\"> She </span><span data-contrast=\"auto\">also</span><span data-contrast=\"auto\"> worked as a Network Security Analyst at New London Hospital</span><span data-contrast=\"auto\"> between her stints at ManTech and Tenable</span><span data-contrast=\"auto\">, monitoring networks and medical devices in accordance with HIPPA</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> Those experiences helped her learn the importance of understanding an end-user’s behavior to identify and investigate digital evidence. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">Her career as a digital forensic analyst revolved around gathering and </span><span data-contrast=\"auto\">interpreting </span><span data-contrast=\"auto\">data. She recalls </span><span data-contrast=\"auto\">a previous job</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">where she was responsible for writing up a narrative around a customer by referencing only the information available in a customer’s device. She would get a sense of the day-to-day digital life </span><span data-contrast=\"auto\">the </span><span data-contrast=\"auto\">user</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">le</span><span data-contrast=\"auto\">d to understand who</span><span data-contrast=\"auto\"> and how</span><span data-contrast=\"auto\"> that person was using the technology. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“That’s the part I liked, taking a vast amount of information and drawing the lines</span></i><i><span data-contrast=\"none\"> t</span></i><i><span data-contrast=\"none\">hrough the ‘dust cloud’ of data</span></i><i><span data-contrast=\"none\"> to </span></i><i><span data-contrast=\"none\">figure out the connections between everything and turn the ‘cloud’ into a digestible amount of information.</span></i><i><span data-contrast=\"none\">”</span></i><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">As Megan</span><span data-contrast=\"auto\"> embraced </span><span data-contrast=\"auto\">new skill</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">acquisition</span><span data-contrast=\"auto\"> on the job, she</span><span data-contrast=\"auto\"> grew to appreciate how problem-solving played a critical role in managing threats</span><span data-contrast=\"auto\"> for her employers and their customers.</span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">It was her passion for identify</span><span data-contrast=\"auto\">ing</span><span data-contrast=\"auto\"> the tools and techniques t</span><span data-contrast=\"auto\">hat best helped </span><span data-contrast=\"auto\">harden </span><span data-contrast=\"auto\">security </span><span data-contrast=\"auto\">posture </span><span data-contrast=\"auto\">that</span><span data-contrast=\"auto\"> led her back to the classroom</span><span data-contrast=\"auto\"> as an Adjunct Professor at her a</span><span data-contrast=\"auto\">lma mater</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">Champlain College, to help groom </span><span data-contrast=\"auto\">the next generation of cyber professionals</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">Her professional experience </span><span data-contrast=\"auto\">across </span><span data-contrast=\"auto\">multiple disciplines in cyber</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> from digital forensics to network security to ethical hacking and incident response</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> allow</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\"> her to teach courses on </span><span data-contrast=\"auto\">a variety of cybersecurity disciplines</span><span data-contrast=\"auto\">—a job she still does today. </span><span data-ccp-props=\"{}\"> </span></p>\n<h2><span data-ccp-props=\"{}\"> </span><span data-contrast=\"none\">Using Teaching to Inform Cyber Learning in Project Ares</span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">Over the last two years, Megan has taken her love for teaching and applied it directly to the innovation within Project Ares. She </span><span data-contrast=\"auto\">is able to</span><span data-contrast=\"auto\"> see how her students learn best</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">whether through direct</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">hands-on</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">experiences </span><span data-contrast=\"auto\">or</span><span data-contrast=\"auto\"> learning from peers</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">and she applies those observations </span><span data-contrast=\"auto\">within a customer’s experience in the platform. All of this comes with the understanding that she must remember not to get “too deep” into one thought pattern, to maintain the “</span><span data-contrast=\"auto\">10,000 foot</span><span data-contrast=\"auto\"> view” as she puts it, so that she can build cyber learning curriculum that is cross-disciplinary and cross-functional. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">Megan put her cyber and teaching skills to the ultimate test at the </span><a href=\"https://vimeo.com/370416459\"><span data-contrast=\"none\">Microsoft Ignite “Into the Breach”</span></a><span data-contrast=\"auto\"> cyber defense experience in November 2019. </span><span data-contrast=\"auto\">She helped design </span><span data-contrast=\"auto\">six </span><span data-contrast=\"auto\">custom-built Battle Rooms in Project Ares </span><span data-contrast=\"auto\">that </span><span data-contrast=\"auto\">were </span><span data-contrast=\"auto\">used</span><span data-contrast=\"auto\"> in a competition-style </span><span data-contrast=\"auto\">activity </span><span data-contrast=\"auto\">among event registrants</span><span data-contrast=\"auto\">.  The battle rooms provided a </span><span data-contrast=\"auto\">gamified learning </span><span data-contrast=\"auto\">approach to</span><span data-contrast=\"auto\"> teach cyber professionals about Microsoft Security Tools.</span><span data-contrast=\"auto\"> Megan </span><span data-contrast=\"auto\">used </span><span data-contrast=\"auto\">the </span><span data-contrast=\"auto\">Project Ares </span><span data-contrast=\"auto\">virtual environments to </span><span data-contrast=\"auto\">create </span><span data-contrast=\"auto\">a </span><span data-contrast=\"auto\">hands-on, </span><span data-contrast=\"auto\">experiential</span><span data-contrast=\"auto\"> learning </span><span data-contrast=\"auto\">activity</span><span data-contrast=\"auto\"> that focused on problem-solving using Microsoft tools. </span><span data-contrast=\"auto\">By </span><span data-contrast=\"auto\">adopting the end-user’s perspective</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">she </span><span data-contrast=\"auto\">was able to </span><span data-contrast=\"auto\">help</span><span data-contrast=\"auto\"> the player</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\"> through the maze from the home page of the Project Ares interface down to the data they were looking for</span><span data-contrast=\"auto\"> to </span><span data-contrast=\"auto\">find the answers they needed.</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“It was quite the adventure learning all these </span></i><i><span data-contrast=\"none\">new security solutions </span></i><i><span data-contrast=\"none\">and </span></i><i><span data-contrast=\"none\">organizing them into </span></i><i><span data-contrast=\"none\">a cohesive storyline</span></i><i><span data-contrast=\"none\">. </span></i><i><span data-contrast=\"none\">We weren’t</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">asking </span></i><i><span data-contrast=\"none\">independent </span></i><i><span data-contrast=\"none\">questions</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">to teach TTPs in a silo</span></i><i><span data-contrast=\"none\">. I</span></i><i><span data-contrast=\"none\">nstead, we were walking </span></i><i><span data-contrast=\"none\">the players</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">through a single attack pattern. The narrative</span></i><i><span data-contrast=\"none\"> was knit together </span></i><i><span data-contrast=\"none\">so that they </span></i><i><span data-contrast=\"none\">could </span></i><i><span data-contrast=\"none\">underst</span></i><i><span data-contrast=\"none\">an</span></i><i><span data-contrast=\"none\">d </span></i><i><span data-contrast=\"none\">that </span></i><i><span data-contrast=\"none\">the tasks</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">in the Battle Rooms were </span></i><i><span data-contrast=\"none\">related to </span></i><i><span data-contrast=\"none\">the progressive arc of a </span></i><i><span data-contrast=\"none\">full-scope </span></i><i><span data-contrast=\"none\">attack and there were different points</span></i><i><span data-contrast=\"none\"> along the kill chain where the Microsoft tools could help to identify, </span></i><i><span data-contrast=\"none\">analyze, and respond</span></i><i><span data-contrast=\"none\">.” </span></i></p></blockquote>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Looking ahead… </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">As </span><span data-contrast=\"auto\">Megan </span><span data-contrast=\"auto\">works hard </span><span data-contrast=\"auto\">to build learning</span><span data-contrast=\"auto\"> curriculum</span><span data-contrast=\"auto\"> into Project Ares, she can’t help but think about what lies ahead for the cyber security industry. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><span data-ccp-props=\"{}\"> </span><i><span data-contrast=\"none\">“I hope the prioritization of training and education continues to increase; I hope the prioritization of security as a pillar of someone’s organization continues to get recognition. I think we’re coming out of a phase where organizations felt that </span></i><i><span data-contrast=\"none\">they</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">could just ignore the elephant that’s stomping around their data center. </span></i><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><i><span data-contrast=\"none\">I’m hopeful we’re moving into </span></i><i><span data-contrast=\"none\">a</span></i><i><span data-contrast=\"none\"> time </span></i><i><span data-contrast=\"none\">that people are b</span></i><i><span data-contrast=\"none\">ecoming</span></i><i><span data-contrast=\"none\"> more aware of their</span></i><i><span data-contrast=\"none\"> organization’s </span></i><i><span data-contrast=\"none\">digital activity online</span></i><i><span data-contrast=\"none\">….</span></i><i><span data-contrast=\"none\"> not just</span></i><i><span data-contrast=\"none\"> in a check-the-box </span></i><i><span data-contrast=\"none\">periodic program kind of way</span></i><i><span data-contrast=\"none\">, but </span></i><i><span data-contrast=\"none\">in the sense </span></i><i><span data-contrast=\"none\">that cyber security readiness and training</span></i><i><span data-contrast=\"none\"> has ongoing </span></i><i><span data-contrast=\"none\">funding and </span></i><i><span data-contrast=\"none\">cross-function </span></i><i><span data-contrast=\"none\">collaboration</span></i><i><span data-contrast=\"none\">. </span></i><i><span data-contrast=\"none\">The industry is moving toward recognition that this is where priorities lie.” </span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">It is t</span><span data-contrast=\"auto\">his kind </span><span data-contrast=\"auto\">of</span><span data-contrast=\"auto\"> forward</span><span data-contrast=\"auto\">-thinking </span><span data-contrast=\"auto\">mindset </span><span data-contrast=\"auto\">in employees </span><span data-contrast=\"auto\">that helps Circadence deliver state-of-the-art products and we are incredibly proud to have Megan within the Circadence family! </span><span data-ccp-props=\"{}\"> </span></p>\n","title":"Living Our Mission Blog Series: Cyber Security + Teaching = the Perfect Match for Developing Cyber Curriculum in Project Ares for Circadence’s Megan Daudelin "}},{"node":{"id":"7ae63ac1-f9cd-522e-8ce0-4dc4833de9a4","slug":"living-our-mission-blog-series-connecting-the-dots-academic-virtual-labs-microsoft-ignite-and-battle-room-design-from-circadences-matt-surprenant","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/12/helloquence-5fNmWej4tAA-unsplash.jpg"},"date":"2019-12-11T16:34:01.000Z","content":"<p><span data-contrast=\"auto\">After serving in the Coast Guard and learning IT, Matt Surprenant applied his technical abilities to the academic community, building out cyber ranges for students to practice their tradecraft in virtual environments. Managing virtual labs for 250-500 students wasn’t an easy job by any means</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> but it certainly gave him invaluable insight into how learning occurs to best train today’s cyber enthusiasts (tomorrow’s frontline defenders).  </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“</span></i><i><span data-contrast=\"none\">At Champlain I grew from a student at the Helpdesk, to deploying software in physical labs, to managing virtual labs. After spending a decade at Champlain College, enjoying the collegiate atmosphere working and learning, I transitioned from creating virtual computing environments at Champlain to virtual ranges at Circadence.</span></i><i><span data-contrast=\"none\">”</span></i><i><span data-contrast=\"none\"> </span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">For more than 11 years at Champlain, Matt performed many cyber roles (help desk technician, imaging applications analyst, and academic service administrator) that informed his understanding of </span><span data-contrast=\"auto\">opportunities for innovation, and </span><span data-contrast=\"auto\">what is needed to train the next generation of </span><span data-contrast=\"auto\">cyber </span><span data-contrast=\"auto\">professionals. He was able to take that experience and apply it at Circadence for enterprises looking to embrace modern ways to train their own cyber teams and harden security strategies.</span><br />\n<span data-contrast=\"auto\"> </span></p>\n<h2><span style=\"font-size: 24pt;\"><span style=\"font-size: 18pt;\">Creating Space for Productive Cyber Learning</span>  </span></h2>\n<p><span data-contrast=\"auto\">For the past three years, Matt has been responsible for constructing Battle Rooms within Project Ares. Battle Rooms are the training simulation environments where users learn the tools, tactics, and procedures of cybersecurity before entering the next “level” of activities in Project Ares called Missions.  Battle Rooms allow users to train and hone their skills before entering a simulated scenario environment with multiple components, narrative backstory, and where deeper application of skill comes into play. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">Currently, Matt manages the logistics for Battle Room development, guiding his team on project priorities week-by-week and acting as a liaison for the Content / Cyber Curriculum Team. </span><span data-contrast=\"auto\">Alongside</span><span data-contrast=\"auto\"> the Curriculum team</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> he works to determine what the training outcomes are in each of the Battle Rooms. On the technical side of Project Ares, Matt ensures that the automation of environments and the logistics are working correctly. He enjoys developing content that guides a player along a cyber learning pathway, so they </span><span data-contrast=\"auto\">learn</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">multiple skills from </span><span data-contrast=\"auto\">perform</span><span data-contrast=\"auto\">ing</span><span data-contrast=\"auto\"> reconnaissance to enumerat</span><span data-contrast=\"auto\">ing</span><span data-contrast=\"auto\"> network</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\">. The Battle Rooms are particularly fun for him to build out because he sees them as “small spaces that teach specific concepts” and help inform a cyber work role a player might want to learn more about. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">Since Project Ares’ debut, customers have greatly informed the kinds of Battle Rooms Circadence develops. After all, it is about the customer having the ability to train according to their specific cyber needs, so this strategy works out well for team members like Matt. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><span data-ccp-props=\"{}\"> </span><i><span data-contrast=\"none\">“I’ve really enjoyed developing the CTF (Capture the Flag) content for our customer</span></i><i><span data-contrast=\"none\">s</span></i><i><span data-contrast=\"none\">. The customer gave us a walkthrough of their expectations, showed us some pre-made content, and shared ideas of how to configure the different pieces of technology. We [the BR team] worked up a functional configuration and validated playthrough based on our understanding of the customer’s expectations. It was incredible to see how successful </span></i><i><span data-contrast=\"none\">the team </span></i><i><span data-contrast=\"none\">could be playing to each other’s strengths in order to meet a customer’s request. The icing on the cake was that the content was very well received by the customer.”</span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<h2 aria-level=\"2\"><span style=\"font-size: 18pt;\">Observations from Microsoft Ignite </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">Matt</span><span data-contrast=\"auto\"> was able to </span><span data-contrast=\"auto\">lend</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">his</span><span data-contrast=\"auto\"> cyber</span><span data-contrast=\"auto\"> expertise</span><span data-contrast=\"auto\"> at the </span><a href=\"https://vimeo.com/370416459\"><span data-contrast=\"none\">Microsoft Ignite “Into the Breach”</span></a><span data-contrast=\"auto\"> cyber defense experience in November 2019. </span><span data-contrast=\"auto\">Five</span><span data-contrast=\"auto\"> custom-built Battle Rooms in Project Ares </span><span data-contrast=\"auto\">were used</span><span data-contrast=\"auto\"> in a competition-style activity among event registrants. The battle rooms provided a gamified learning approach to teach cyber professionals about Microsoft Security Tools.</span><br />\n<span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“I was really excited to see how well the content in the Battle Rooms blended into the background as the purpose of the event was really to introduce registrants to Microsoft Security tools using a gamified environment.” </span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">Matt noticed registrants were curious to </span><span data-contrast=\"auto\">understand</span><span data-contrast=\"auto\"> how to use these cyber tools in their own profession</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">The</span><span data-contrast=\"auto\"> capability for Project Ares</span><span data-contrast=\"auto\"> to deliver this educational experience to end-users</span><span data-contrast=\"auto\">, Matt reflects, was a huge benefit to see how learning unfolded. </span><span data-ccp-props=\"{}\"> </span></p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Advice for the Next Generation of Cyber Professionals </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></p>\n<p><span data-contrast=\"auto\">“Trust but verify.” Those are the simple words Matt says he would tell any aspiring young professional interested in entering the field of cybersecurity. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“</span></i><i><span data-contrast=\"none\">It seems like a simple statement</span></i><i><span data-contrast=\"none\">,</span></i><i><span data-contrast=\"none\"> but I’ve found many security professionals don’t necessarily practice what they preach. Develop personal habits that help you professionally. A simple one is to constantly validate or fact-find when you’re told something. Ask questions! Does that update process </span></i><i><span data-contrast=\"none\">actually work</span></i><i><span data-contrast=\"none\"> as you think it should? Should that application </span></i><i><span data-contrast=\"none\">actually make</span></i><i><span data-contrast=\"none\"> web requests? Develop an inquisitive nature that will allow you to bolster claims with factual findings.</span></i><i><span data-contrast=\"none\">”</span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">For Matt, that inquisitive mindset occurred in high school when he </span><span data-contrast=\"auto\">found</span><span data-contrast=\"auto\"> system administration was an interesting discipline. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“</span></i><i><span data-contrast=\"none\">I started a high school club where one day a week we would “re-image” a writing computer lab with images that had games pre-installed and have a “LAN (local area network) party”. Club members (mostly my friends) would get together and play video games on the freshly reconfigured computers for a couple of hours. At the end of the event, we would reset the lab back to a writing lab. Sometimes there were minor hiccups that users (other students) would run into afterward. I enjoyed helping those users fix the issue, but I also enjoyed identifying how we could make it better next time we re-imaged the lab. That’s kind of what information/cybersecurity is for me &#8211; identifying weaknesses in configuration, policy, or procedure and making a change to mitigate that weakness.</span></i><i><span data-contrast=\"none\">”</span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">It is that </span><span data-contrast=\"auto\">kind of curious approach to building cyber learning into our products</span><span data-contrast=\"auto\"> that helps Circadence deliver state-of-the-art </span><span data-contrast=\"auto\">learning tools today. </span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">W</span><span data-contrast=\"auto\">e are incredibly proud to have </span><span data-contrast=\"auto\">Matt</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">as part of</span><span data-contrast=\"auto\"> the Circadence family!  </span><span data-ccp-props=\"{}\"> </span></p>\n","title":"Living our Mission Blog Series: Connecting the Dots &#8211; Academic Virtual Labs, Microsoft Ignite, and Battle Room Design from Circadence’s Matt Surprenant"}},{"node":{"id":"7ec8a7c3-fa93-5f6b-9a99-a8b4dcf751ca","slug":"predictions-for-cyber-security-in-2020","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/11/ramon-salinero-vEE00Hx5d0Q-unsplash.jpg"},"date":"2019-12-03T07:25:37.000Z","content":"<p>The dynamic world of cyber security is prompting a new shift in focus for security execs and frontline defenders as we head into a new year in 2020. Given the rapid pace by which enterprises have adopted Cloud computing services to improve operations, the frequency of threats and attack methods, and the widening skills gap facing many industries, we expect 2020 will finally be the <strong>Year of Preparedness &amp; Cyber Proactivity</strong>—from the CISO, to the Director of Risk Management, to the Network Analyst professional—and we’ll tell you why.</p>\n<p>A recent report from ICS2 noted that the cyber security industry now faces an estimated shortfall of 4.07 million cyber professionals. In the U.S. alone, the industry is expected to have more than 490,000 unfilled cyber positions in the coming years. While the great debate continues as to whether we <em>really</em> have a “skills gap” problem or if we need to loosen the reins on job requirements and lower candidate qualification expectations, one thing is for sure—today’s (and tomorrow’s) cyber professionals will need help in combatting imminent threats to harden cyber security in 2020. To facilitate their preparedness strategy, we envision proactive tools and resources will become more mainstream to help professionals do their jobs with greater efficiency leveraging automation, to support expanding security provisions, compliance requirements, and minimize the widening attack surfaces.</p>\n<h2>Automation will become the preferred way to support security operations</h2>\n<p>Whether a security manager has 1,000 defenders on their cyber team or one, automating certain administrative tasks for these individuals will be a goal focus in 2020. Directors, managers and cyber team leads understand that threats are getting so sophisticated that network defenders and security analysts need as much help as possible.</p>\n<p>Our own Battle Room Design Team Lead Matt Suprenant anticipates enterprises will be finding ways to “automate responses to detections” observing at the Microsoft Ignite event in Nov. 2019 that Microsoft toolsets on display were designed with automation in mind.</p>\n<blockquote><p>“As we think about the future of cyber, we will see a combination of things start working together as we learn more about AI, SOAR, and other mechanisms by which we can augment today’s workforce.” ~ Battle Room Design Team Lead, Matt Suprenant</p></blockquote>\n<h2>Cloud adoption will be growing across all security sectors</h2>\n<p>In 2019, we predicted <a href=\"https://www.circadence.com/2019-cybersecurity-predictions/\" target=\"_blank\" rel=\"noopener noreferrer\">more enterprises would shift to the cloud</a> for a more seamless and elastic security experience. Reports indicate that about <a href=\"https://hostingtribunal.com/blog/cloud-computing-statistics/#gref\" target=\"_blank\" rel=\"noopener noreferrer\">90% of businesses today are using the cloud</a> to conduct operations from simple file storage to sales transactions in the cloud. So what’s next? Security divisions will be leveraging the cloud to train their professionals on the latest cyber threats and attacks in 2020. Cyber training in the cloud will likely become one of the new ways Cloud computing will be leveraged in 2020 since teams need persistent and always-on access to training (moving away from the one-and-done on-site classroom-based training offerings of today). The future of cyber training will occur in the cloud.</p>\n<h3>Don’t believe us? <a href=\"https://marketing.circadence.com/acton/media/36273/webinar-future-of-cyber-learning-cloud-based-training-2019-12\" target=\"_blank\" rel=\"noopener noreferrer\">Hear the benefits of training in the Cloud in our webinar.</a></h3>\n<h2>Renewed focus on security awareness training for all employees</h2>\n<p>Human resource managers and risk and compliance managers will work more closely together to design their own security training programs to nurture incoming talent and existing staff. Another cyber security prediction in 2020 will indeed be around this topic, as HR managers and Risk and Compliance managers identify new ways to educate all employees (not just the IT staff) on cyber risks, attack methods, and how to spot suspicious emails (phishing attacks), links, website, and other digital assets related to endpoint security.</p>\n<blockquote><p>“I hope the prioritization of training and education continues to increase; I hope the prioritization of security as a pillar of someone’s organization continues to get recognition. I think we’re coming out of a phase where organization’s felt that could just ignore the elephant that’s stomping around their data center. I’m hopeful we’re moving into this position that people are being more generally aware [of their digital activity online], not just on paper, but that [cyber security readiness and training] needs funding and collaboration…The industry is moving toward recognition that this is where priorities lie.” ~ Megan Daudelin, Team Lead, Curriculum Development</p></blockquote>\n<h2>Election Security will dominate discussions</h2>\n<p>Years ago, ballot fidelity was the issue to solve but now, <a href=\"https://www.circadence.com/blog/3-ways-prevent-cyber-security-election-interference/\" target=\"_blank\" rel=\"noopener noreferrer\">election security</a> is the hot ticket item to address in cyber security in 2020. The breadth and diversity of counties means election security isn’t managed the same way, putting all elections at greater risk of interference. Russian cyber criminals have been able to gain access to voting systems around the country, most notably in the 2016 election. As we head into an election year, election security pros will be understanding <a href=\"https://www.npr.org/2019/08/31/754412132/what-you-need-to-know-about-u-s-election-security-and-voting-machines\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerabilities in voting machines</a> and (ideally) replacing such machines using congressional funds, which granted <a href=\"https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/04/05/the-cybersecurity-202-states-spent-just-a-fraction-of-380-million-in-election-security-money-before-midterms/5ca697b81b326b0f7f38f32b/\" target=\"_blank\" rel=\"noopener noreferrer\">$380 million</a> to upgrade old voting systems.</p>\n<p>We also anticipate both election volunteers and frontline election security tally monitors and processors will desire more cyber training and education to ensure they’re doing their part to stay vigilant against any suspicious activity that comes in their purview.</p>\n<h2>Increased Attacks on IT/OT automated systems, state local governments</h2>\n<p><a href=\"https://www.circadence.com/2019-cybersecurity-predictions/\" target=\"_blank\" rel=\"noopener noreferrer\">Municipal ransomware attacks</a> on cities was a big occurrence in 2019 and we don’t envision it’s going to stop in 2020. A <em>CNN</em> news article reported that <a href=\"https://www.cnn.com/2019/10/08/business/ransomware-attacks-trnd/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">over 140 local governments, police stations and hospitals were held hostage by ransomware attacks</a> in 2019. As more entities run by and are funded/informed by state and local government organizations, automated operations of network security will be more prevalent to streamline workforces and workloads, thus, increasing the chances of cyber attacks occurring on those systems. To prevent data breaches and make cyber readiness a top priority, live fire cyber exercises will be leveraged to bring together cyber security experts across departments and teams, divisions and functional areas of critical infrastructure and government operations.</p>\n<blockquote><p>We will continue to see a rise in targeted ransomware attacks, especially against small to medium size public entities like utilities, governments, and hospitals. Too many are just paying the ransom because it is far cheaper to do that than fix it, even if you have backups. ~ Paul Ellis, Senior Product Manager</p></blockquote>\n<h2>What do we do to harden cyber security in 2020?</h2>\n<p><strong>Educate, educate, educate. Train. Train. Train. </strong></p>\n<p>That is our recommendation for security leaders, managers, and frontline defenders who are heading into 2020 trying their best to anticipate the next threat vector or patch a vulnerability.</p>\n<p>The more companies can educate their non-technical staff about cyber issues and suspicious activity while IT teams and security divisions regularly train/upskill their defenders the better off enterprises will be.</p>\n<p>It’s important to remember that cyber security in 2020 and beyond is not a “do this thing and you’re secure” effort. Cyber security and hardening posture is a JOURNEY, not to be taken lightly or without concern.</p>\n<p><strong>For enterprise security teams</strong> who want to understand more about how Project Ares can support cyber learning in mission scenarios that address election security, ICS/SCADA systems, and experience learning against automated adversaries in the Cloud, <a href=\"https://www.circadence.com/request-a-demo/\" target=\"_blank\" rel=\"noopener noreferrer\">schedule a demonstration of Project Ares today.</a></p>\n<p><strong>For HR managers and Risk and Compliance directors</strong> seeking ways to implement a company-wide security awareness training program using gamification, <a href=\"https://www.circadence.com/products/inCyt\" target=\"_blank\" rel=\"noopener noreferrer\">check out our inCyt platform</a> (Available soon).</p>\n<p>&nbsp;</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@donramxn?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Ramón Salinero</a> on <a href=\"https://unsplash.com/s/photos/future?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n<div>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@hishahadat?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Shahadat Rahman</a> on <a href=\"https://unsplash.com/s/photos/cyber?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Predictions for Cyber Security in 2020"}},{"node":{"id":"a9a73f22-352a-5546-aa9d-b170758a00c7","slug":"rethinking-cyber-learning-consider-gamification","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/mimi-thian-ZKBzlifgkgw-unsplash.jpg"},"date":"2019-11-26T14:59:56.000Z","content":"<p><em>This post originally appeared on<a href=\"https://www.microsoft.com/security/blog/2019/11/25/rethinking-cyber-learning-consider-gamification/?fbclid=IwAR3Pvm3_6LTyM4pT6eyT7g1a-FflMdngtrtDn9l_YajS5J5n6InstGuMvnM#.XdwsX-V1Rfs.facebook\"> Microsoft&#8217;s Security Blog</a>, authored by Mark McIntyre, Executive Security Advisor, Enterprise Cybersecurity Group</em></p>\n","title":"Rethinking cyber learning—consider gamification"}},{"node":{"id":"b7c414ee-b265-550d-9fa1-650616d87a4e","slug":"cyber-monday-and-black-friday-cyber-security-safety-tips-to-prevent-holiday-hacks","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/11/catherine-zaidova-fPfvv3u5PHY-unsplash.jpg"},"date":"2019-11-25T07:25:47.000Z","content":"<p>If you’re anything like me, you get really excited when the holidays roll around. The music is cheerful (the Hallmark Channel is on 24/7&#8211;high five!), the fireplace is roaring, and I can curl up with my blanket and mobile phone to SHOP ONLINE (of course). Ah, the spirit of the holidays&#8230;But the bah humbug part about the scene I’ve just set, is <strong>I’m not the only one feeling “festive.” </strong>Cybercriminals LOVE when surges in online shopping occur because people are looking for the best deals on gifts, bargain hunting, and planning for the biggest online shopping days of the year: Black Friday and Cyber Monday. This means adversaries can more easily manipulate our holiday spirits with cyberattack methods like phishing and social engineering, credit card fraud, and more.</p>\n<p>So while you prepare your winter festivities and “add to cart,” consider these 12 tips to keep your “digital dwelling” safe and warm during Cyber Monday and Black Friday, especially.</p>\n<h2><strong>Shop from websites you know and trust.  </strong></h2>\n<p>Don’t click on those flashy “hot deals” that are likely too good to be true. Scammers deliver ads based on your interests, offering sweet discounts or great deals to get the click. Now is NOT the time to experiment with new retail websites and apps.</p>\n<h2><strong>Don’t go “public.”  </strong></h2>\n<p>Avoid public Wi-Fi when using the Internet, especially when accessing sensitive data like your bank account balance or emails. Your personal information isn&#8217;t a &#8220;gift&#8221; you want to give a hacker this holiday season.</p>\n<h2><strong>Update your operating systems.  </strong></h2>\n<p>With a little more downtime during the holidays, take a merry minute to keep your operating systems as current as possible. This also goes for apps on your phone.</p>\n<h2><strong>Refresh your passwords. </strong></h2>\n<p>Enter into the New Year with stronger, more secure passwords—something that will keep a criminal out of your personal property and prevent identity theft. Things like symbols and numbers to replace letters add a layer of complexity that make passwords harder to crack. Consider using a password manager to store all your different passwords so you don’t forget them!</p>\n<blockquote><p><strong>To ensure you are protected from any precocious cyber predator, check our security awareness game </strong><a href=\"https://www.circadence.com/products/inCyt\"><strong>inCyt</strong></a><strong>, a fun way to learn cyber concepts and attack methods while cozying up on your couch with a hot toddy. You can practice proactive cyber readiness during the holidays—and year-round with this sweet resource.  </strong></p></blockquote>\n<h2><strong>Don’t click on suspicious links.  </strong></h2>\n<p>Scammers, like the Grinch, will impersonate real online retailers and stores to get you to open an email and click on links while you are holiday shopping. Don’t! This phishing email tactic opens the door for them to install malware on your computer and before you know it, your data is stolen and compromised.</p>\n<h2><strong>Look for the lock.  </strong></h2>\n<p>Secure websites will often have a lock icon in the browser address bar to indicate it is a secure connection.</p>\n<h2><strong>Get creative with security questions.  </strong></h2>\n<p>Your mother’s maiden name or favorite food can most likely be found online somewhere, so try getting creative with your security questions to access your accounts. Choose a motto you live by perhaps or choose an answer to a question that is completely opposite of what you would select.</p>\n<h2><strong>Watch your bank and card activity. </strong></h2>\n<p>Hackers can see your financial activity when you’re sleeping and when you’re awake if you’re not careful. Diligently monitor your bank account, online transactions, and card activity and notify your financial services provider if you observe any suspicious activity.</p>\n<h2><strong>Disable auto-connect. </strong></h2>\n<p>Some devices will auto-connect to available wireless networks. Ensure you are only connected to wireless and Bluetooth networks when devices are in use or about to be used. Unknowingly being connected is the opportune time for hackers to cause damage right under your nose.</p>\n<h2><strong>Store devices when away.  </strong></h2>\n<p>If you’re a busy traveler, criminals seek out meal times to check hotel rooms for unattended laptops and mobile devices. Be especially wary when attending conferences or trade shows as guest networks tend to be more vulnerable to attacks (and allows hackers to access lots of data from lots of people, who are all in one convenient location).</p>\n<h2><strong>Activate double authentication.  </strong></h2>\n<p>If you haven’t done so already, ensure all your apps have a double authentication factor so every time someone tries to log in to your online account, they need a code or key that is texted to your phone or sent to your email to gain access. That makes unintended access to things like social media accounts more difficult for cybercriminals.</p>\n<h2><strong>Practice persistent protection. </strong></h2>\n<p>Hackers aren’t just looking to exploit individual data, they also target businesses knowing many take extra time off this time of year to spend with loved ones. Ensure your company has a strong cybersecurity response plan in place and key members of your threat intelligence, analysis, and fraud teams are consistently practicing responding to threat scenarios. Our <a href=\"https://www.circadence.com/products/project-ares/?utm_expid=.fUxMXG-wQ16Fu-UTMgqyNA.0&amp;utm_referrer=https%3A%2F%2Fwww.circadence.com%2Fproducts%2Fproject-ares%2F\">Project Ares</a> platform runs on Microsoft Azure, so professionals can practice cyber offense and defense from anywhere, at any time on a gamified cyber range.</p>\n<p>It’s important to practice safe online behavior all year-round but the holidays bring about an extra level of digital activity hackers love to exploit. Make sure you are taking proactive measures to ensure you are having the most wonderful online shopping day of the year—and cybercriminals aren’t.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Cyber Monday and Black Friday Cyber Security Safety Tips to Prevent Holiday Hacks  "}},{"node":{"id":"0ff75ec5-56fa-5b3c-afd5-5e39e4afde33","slug":"living-our-mission-blog-series-how-tony-hammerling-curriculum-developer-orchestrates-a-symphony-of-cyber-learning-at-circadence","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/11/marius-masalar-rPOmLGwai2w-unsplash.jpg"},"date":"2019-11-19T07:25:12.000Z","content":"<p>Circadence’s Curriculum Developer Tony Hammerling wasn’t always interested in a career in cyber—but he was certainly made for it. In fact, he initially wanted to be a musician! While his musical talents didn’t pan out for him early in his career, he quickly learned how to create unique harmonies using computers instead of instruments…After joining the Navy in 1995 as a Cryptologist and Morse Code operator, he transitioned to a Cryptologic Technician Networks professional where he performed network analysis and social network/persona analysis. It was there he learned more offensive and defensive strategies pertinent to cyber security and was introduced to network types and communication patterns. He moved to Maryland to do offensive analysis and then retired in Pensacola, Florida. The world of cyber grew on Tony and he enjoyed the digital accompaniment of the work it offered.</p>\n<p>For the last few years, now settled in Pensacola, Florida, Tony is a critical part of Circadence’s Curriculum Team, working alongside colleagues to develop learning objectives and routes for players using platforms like <a href=\"https://www.circadence.com/products/inCyt\">inCyt</a>, <a href=\"https://www.circadence.com/products/project-ares/?utm_expid=.fUxMXG-wQ16Fu-UTMgqyNA.0&amp;utm_referrer=https%3A%2F%2Fwww.circadence.com%2Fproducts%2FinCyt\">Project Ares</a>, and other cyber games like <a href=\"https://www.youtube.com/watch?v=h6GlBtcUru0\">NexAgent</a>, Circadence’s immersive network exploration game. Currently, Tony and his team are focused on building out learning of network essentials in NexAgent, and “&#8230;are bridging the gap between what new IT professional’s learn in NexAgent and getting them onto more advanced learning pathways in Project Ares,” says Tony.</p>\n<blockquote><p><em>“We’re starting to introduce new content for [Project Ares] battle rooms so users coming out of NexAgent can have an understanding of the tools and techniques needed for more advanced learning of cyber defense—and actually apply those tools and techniques in realistic scenarios.”</em></p></blockquote>\n<p>As the technical subject matter expert for cyber curriculum, Tony digs into the details with his work—and that’s where he shines. Tony and his team ensure that user learning is reflective of today’s cyber attacks and vulnerabilities. In the next iteration of NexAgent, users will be able to focus on network segmentation using election security as the theme for game-play. From separating election polling servers to working with registration databases to designing networks to prevent election fraud, learning becomes much more interesting for the end-user.</p>\n<p>The most exciting part about Tony’s job is the diversity of material he gets to work on every day. One day he could be helping end-users of Project Ares identify fraudulent IP addresses in a battle room and another day he could be working on a full-scale technical design of a SCADA system modeled after a cyber incident at a Ukrainian power plant.</p>\n<p>By understanding corporate demands for new content, Tony and his team have more direction to build out cyber learning curriculum that aligns to customer’s needs. He believes the technical training he’s able to support with learning material in Circadence’s platforms complements traditional cyber learning paths like obtaining certifications and attending off-site classes. The variety of learning options for users of all cyber ability levels (both technical and non-technical), gives professionals the opportunity to be more thoughtful in their day-to-day lives, more critical and discerning of vulnerabilities and systems, and more creative in how they address threats.</p>\n<blockquote><p><em>“Knowing that people are able to come into a Circadence product and learn something that they didn’t know before or refine specific knowledge into an application/skill-based path is exciting. I don’t think too much of the greater impact my work provides—but perhaps 10 years down the line when we can say ‘we were the first to gamify and scale cyber training,’ it will mean so much more.” </em></p></blockquote>\n<p>We are grateful for the unique talents Tony brings to the Circadence family of products and how he’s able to craft learning “chords” that when orchestrated, provide a symphonic concerto of cyber learning activity—empowering cyber professionals across the globe with relevant, persistent, and scalable cyber training options to suit their security needs.</p>\n<p><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@marius?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Marius Masalar</a> on <a href=\"https://unsplash.com/s/photos/music?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\n</span></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@duck58cth?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Alphacolor</a> on <a href=\"https://unsplash.com/s/photos/music?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"K8oc9 _13vXb\"></div>\n<p><span style=\"font-size: 10pt;\"> </span></p>\n","title":"Living our Mission Blog Series: How Tony Hammerling, Curriculum Developer, Orchestrates a Symphony of Cyber Learning at Circadence"}},{"node":{"id":"13877865-bf74-5bc7-90ce-81839b7dbdac","slug":"8-tips-to-keep-your-small-business-cyber-safe-this-holiday-season","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/11/aryan-dhiman-iGLLtLINSkw-unsplash.jpg"},"date":"2019-11-14T07:25:05.000Z","content":"<p>The holiday season is a time of giving, however, for hackers it can be a time of swindling. We are all susceptible to cyberattacks, but small businesses can hurt the most from the fall out. With limited staff numbers, small IT departments (if any at all), and no money allocated toward remediation, it is of the utmost importance to protect your small business, especially over the holidays. So, what can you do to protect yourself?</p>\n<ol>\n<li><strong>Understand your vulnerability by industry</strong> – While every industry can be targeted by scammers, there are some more at risk than others. Specifically, retail, automotive, manufacturing, and financial. Not only do these industries process a lot of sensitive data and large quantities of money, but they also use automated process and many interconnected devices which are vulnerable to cyber attacks. Assessing your risk is the first step in preventing it.</li>\n<li><strong>Adopt a cyber security policy</strong> – Whether you’re a sole proprietor or a company with 5,000 employees, cyber criminals are targeting your business. Smaller businesses may not have controls, processes, or policies in place for cyber security defense and offense. There are several options for securing a comprehensive cyber security plan such as a <a href=\"https://searchitchannel.techtarget.com/definition/managed-service-provider\">managed service provider</a> (MSP), a <a href=\"https://searchitchannel.techtarget.com/definition/systems-integrator\">systems integrator</a> or security system provider, or a <a href=\"https://www.careerexplorer.com/careers/it-security-consultant/\">cyber security consultant</a>. Take the time to put together a comprehensive policy for your employees to learn and reference.</li>\n<li><strong>Educate employees on cyber risks and prevention</strong> – It won’t do you any good to adopt a cyber policy if you don’t train your employees on risk awareness and staying safe online while working. Ensure you utilize persistent, hands-on learning, <a href=\"https://www.circadence.com/blog/cyber-ranges-101-and-how-they-improve-security-training/\">such as a cyber range</a>, to keep employees abreast of the latest threats while building confidence in their abilities to recognize threats and suspicious activity.</li>\n<li><strong>Beware of popular scam tactics used against small businesses</strong> – From overpayment scams to phishing emails, hackers will try just about anything to get to your money and sensitive information. Be wary of anything that looks or sounds suspicious such as calls from unknown persons, pop-ups, and unfamiliar websites, only open emails from trusted sources, and NEVER give your credit card or personal information to anyone you don’t know whether over the phone, by email, or in person.</li>\n<li><strong>Secure WiFi Networks</strong> – These days all businesses require WiFi to operate, so you need to ensure your network is safe. Hide your network, which you can do by googling instructions or working with your internet provider, so that your router does not broadcast the network name (or SSID) and ensure that a password is required for access. Be sure you change the administrative password that was on the device when first purchased as well to a complex password only you will remember. Setting up a private network for employees and offering a guest network to customers is a great way to keep customers happy while ensuring your cyber safety.</li>\n<li><strong>Make backup copies of important information</strong> – Regularly back up data on every computer used in your business including documents, spreadsheets, financial and personnel files, and more. You can do this through many channels from uploading files to an external hardrive, USB, the cloud, or using a paid data storage site.</li>\n<li><strong>Install and update antivirus software</strong> – Every device you use for your business needs to be protected with antivirus, antispyware, and antimalware software. You will need to purchase this software either online or from a retail store and will need to assess your specific needs based on a variety of factors, such as the type of operating system you use (mac or PC) and your budget. <a href=\"https://www.digitalcitizen.life/how-choose-great-security-product-thats-right-you\">Here</a> is a handy guide for things to consider before purchasing antivirus software. Be sure you install and update antivirus software regularly to ensure the newest and best iteration is at work protecting your sensitive information.</li>\n<li><strong>Install a VPN</strong> – A virtual private network (VPN) is a software that enables a mobile device to connect to another secure network via the internet and send and receive data safely. If you regularly use your smartphone to access secure information for your small business, it can be technology that is well worth investing in. Setting up a VPN is a simple task but depends on what operating system you use. Check out <a href=\"https://www.theverge.com/2019/3/1/18222182/vpn-how-to-set-up-virtual-private-network-wi-fi-security-privacy\">this</a> great article that guides you through VPN set up for various systems.</li>\n</ol>\n<p>By following these tips and tricks, you can ensure that your business stays protected and profitable. Cyber security is an ever-changing field, and businesses must continually adapt to new attack methods and be able to defend themselves. Keep the latest in cyber training at your fingertips with Circadence’s<a href=\"https://www.circadence.com/products/inCyt\"> inCyt</a> security awareness game of strategy and if you have a small security team/IT professional, consider our flagship immersive, gamified cyber learning platform, <a href=\"https://www.circadence.com/products/project-ares-b/?utm_expid=.fUxMXG-wQ16Fu-UTMgqyNA.1&amp;utm_referrer=https%3A%2F%2Fwww.circadence.com%2Fproducts%2FinCyt\">Project Ares</a> for advanced cyber training. We wish you a safe and happy holiday season!</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@its_lensation?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Aryan Dhiman</a> on <a href=\"https://unsplash.com/s/photos/keyboards?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\n</span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@youxventures?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">You X Ventures</a> on <a href=\"https://unsplash.com/s/photos/small-business?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"K8oc9 _13vXb\"></div>\n<p>&nbsp;</p>\n","title":"8 Tips to Keep Your Small Business Cyber Safe this Holiday Season"}},{"node":{"id":"bd021454-0eda-5215-adcc-17596d2eb4d3","slug":"operation-gratitude-5-reasons-to-give-thanks-for-cyber-security","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/11/pro-church-media-p2OQW69vXP4-unsplash.jpg"},"date":"2019-11-12T08:25:42.000Z","content":"<p>With daily breaches impacting business operations and security, it’s easy to forget about the good ways that cyber security keeps us safe behind the scenes. This holiday season, we’re giving thanks to cyber security and all that it does to make our lives easier and more secure with what we’re calling Operation Gratitude (inspired by our Project Ares missions, uniquely titled “Operation Goatherd” or “Operation Desert Whale”). #OperationGratitude is a rally cry for security professionals and business leaders to remember the positive aspects of cyber security and share those positive thoughts with each other. Too often we live in fear from cyber attacks and persistent threats, and while, there is always cause for concern, we must remember how advances in the field have equally made aspects of our digital life easier. We’re thankful for these advances in cyber security:</p>\n<ol>\n<li><strong>Two-factor authentication </strong>– This tool helps to keep you secure by requiring two different credentials before allowing you to gain access to sensitive information online. One example of this would be when you log in to check your bank statements and it prompts you to not only enter your username and password, but also to check your phone and enter a verification code that was texted to you. You will normally see this security precaution used when logging into an account from a new device. The great part about it is, it’s widely known and used by everyone from CISOs to high school kids.</li>\n<li><strong>HTTP(S)</strong> – You’ve likely seen this appear when visiting a URL online, usually showing up just before the “www” and website name. Http means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web, which defines how messages are formatted and transmitted, and what actions web servers and browsers should take in response to various commands. The “S” is for security, and this little letter means that all communication between your browser and your website is encrypted for your protection. This means that sites utilizing https are prioritizing your safety while performing sensitive transactions online!</li>\n<li><strong>Personal digital responsibility</strong> – These days the average consumer is more connected than ever. With our lives relying on smartphones, computers, tablets, and a multitude of IoT devices, we are entrenched in cyber every single day. This reliance requires us to practice personal digital responsibility, or often called digital citizenship—that is, the ability to participate safely, intelligently, productively, and responsibly in the digital world. Just because we are more connected does not necessarily mean that we are more aware of cyber risks, however, initiatives such as <a href=\"https://www.dhs.gov/national-cyber-security-awareness-month\">Cyber Security Awareness Month</a> (in October) are helping to increase awareness by promoting cyber citizenship and education. Circadence is proud to contribute to the security awareness and digital responsibility effort with the soon-to-be-available <a href=\"https://www.circadence.com/products/inCyt\">inCyt</a>, a security awareness game of strategy that helps bring cyber safe practices into the workplace and cultivates good cyber hygiene for all (and you don’t have to be a technical expert to use it).</li>\n<li><strong>Corporate security awareness trainings</strong> – Given that <a href=\"https://www.alvareztg.com/is-human-error-the-leading-cause-of-data-breaches-in-the-u-s/\">25% of all data breaches in the U.S in 2018 were due to carelessness or user error</a>, it is critical for companies of all sizes to engage their employees in persistent cyber training. Thank goodness there is an increase in organizations such as the <a href=\"https://staysafeonline.org/\">National Cyber Security Alliance (NCSA)</a> that provide risk assessments and security training to organizations across the U.S.</li>\n<li><strong>Increased security collaboration</strong> – With <a href=\"https://hostingtribunal.com/blog/cybersecurity-statistics/\">more than 4,000 ransomware attacks alone occurring daily</a>, no one business can mitigate the increasing amount of cyber risks present in today’s threatscape. It is more important than ever for businesses to share knowledge from breaches they have experienced and stand together to fight cyber crime, which is exactly what they’re doing! Nowadays these partnerships are being formed not only to share information, but to conduct <a href=\"https://www.circadence.com/recapping-jack-voltaic-2-0-cyber-research-project/\">live fire cyber readiness exercises</a>. One such initiative is DHS’s <a href=\"http://www.dhs.gov/national-cybersecurity-and-communications-integration-center\">National Cybersecurity and Communications Integration Center</a>(NCCIC) – a 24/7 cyber situational awareness, management and response center serving as a national nexus of cyber and communications integration for the federal government, intelligence community, and law enforcement. The NCCIC also shares information among public and private sector partners to build awareness of vulnerabilities, incidents, and mitigations.</li>\n</ol>\n<p>So, as you prepare your Thanksgiving meal from recipes pulled up on your tablet, with holiday music playing from your smart phone, and timers set by Alexa to ensure the juiciest turkey and tastiest pies, remember to give thanks for cyber security. We certainly are!</p>\n<p>&nbsp;</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@simonmaage?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Simon Maage</a> on <a href=\"https://unsplash.com/s/photos/thanksgiving?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n<div></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@prochurchmedia?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Pro Church Media</a> on <a href=\"https://unsplash.com/s/photos/gratitude?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Operation Gratitude: 5 Reasons to Give Thanks for Cyber Security"}},{"node":{"id":"4abffb86-09e3-5508-8bb0-289777e8f5f9","slug":"28-bits-and-bytes-about-cybersecurity-careers-you-probably-didnt-know","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/10/danial-ricaros-FCHlYvR5gJI-unsplash.jpg"},"date":"2019-11-05T07:45:45.000Z","content":"<p><span style=\"font-weight: 400;\">Getting a job in cyber security doesn’t have to be an intimidating process. If you haven’t been taught the basics and/or are looking to change careers for something different, </span><a href=\"https://www.circadence.com/blog/how-to-launch-a-cyber-security-career/\"><span style=\"font-weight: 400;\">launching a cyber security career</span></a><span style=\"font-weight: 400;\"> can start with basic learnings that lead to more formal training, certifications, and skills development. And there are </span><a href=\"https://www.circadence.com/blog/kickstarting-your-cyber-security-career-path/\"><span style=\"font-weight: 400;\">several online resources</span></a><span style=\"font-weight: 400;\"> for developing security competencies that are free or at a minimal cost. These resources can be complemented with </span><a href=\"https://www.circadence.com/solutions/topic/cyber-ranges/\"><span style=\"font-weight: 400;\">cyber range training</span></a><span style=\"font-weight: 400;\"> to expedite learning to land the cyber security job you want.” </span></p>\n<p>To bring cyber security to the surface as a strong and lucrative career option for young professionals, we’ve taken the liberty to share some fast facts and fun things about the industry.</p>\n<h2><strong>Fast Facts About the Cybersecurity Industry </strong></h2>\n<ul>\n<li>The market is expected to grow to over $300 billion by 2024 according to <a href=\"https://www.gminsights.com/pressrelease/cyber-security-market\" target=\"_blank\" rel=\"noopener noreferrer\">a report from Global Market Insights</a></li>\n<li>The demand to fill cyber jobs is great – over <a href=\"https://www.cyberseek.org/heatmap.html\" target=\"_blank\" rel=\"noopener noreferrer\">504,000 cyber positions are available</a> in the U.S alone</li>\n<li>There are <a href=\"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">33 distinct areas of cyber security work</a> according to NIST/NICE</li>\n<li>The national average career salary is $94,000-119,000 (on the low end) for security-related positions in the U.S. according to the <a href=\"https://www.roberthalf.com/sites/default/files/documents_not_indexed/2020_Salary_Guide_Technology_NA.pdf?utm_campaign=RH-NA-Salary_Guide-Autoresponder-Email-10-24-2019&amp;utm_medium=Email&amp;utm_source=autoresponder&amp;utm_content=Download+the+2020+Technology+Salary+Guide&amp;sfi=\" target=\"_blank\" rel=\"noopener noreferrer\">Robert Half Technology’s 2020 Salary Guide</a></li>\n<li>Earning cyber certifications like <a href=\"https://www.comptia.org/certifications/security\" target=\"_blank\" rel=\"noopener noreferrer\">CompTIA Security + Certification and Certified Information System Security Professional</a> is highly regarded and respected amongst prospective employers (impress the hiring manager and prove your value)</li>\n<li>Information security jobs are expected to increase by 32% through 2028 <a href=\"https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">according to the Bureau of Labor Statistics </a></li>\n</ul>\n<h2><strong>Technical Abilities and Knowledge Needed for the Cyber Security Industry</strong></h2>\n<ul>\n<li>IT fundamentals like system and web application administration</li>\n<li>Coding skills (C, C++, Java, Python, Ruby, Perl, PHP)</li>\n<li>Understanding network architecture, administration and operating system functionality, policies, performance, and features</li>\n<li>Database knowledge from permissions access to structure to storage security</li>\n<li>Understanding of how attackers operate and function</li>\n<li>Foundational understandings of things like risk management, networking basics, toolkit maintenance and situational awareness of what’s happening in the industry today</li>\n</ul>\n<h2><strong>Professional Skills Needed for the Cyber Security Industry </strong></h2>\n<ul>\n<li><strong>Leadership</strong> – Call the shots alongside a team of cyber pros to build decision-making skills</li>\n<li><strong>Communication</strong> – Articulate what and how threats need to be mitigated to teams</li>\n<li><strong>Analytical thinking</strong> – Reflect and continuously learn the hacker mindset to grow your understanding of why and how attacks happen</li>\n<li><strong>Passion for learning and developing skills</strong> – Learning never stops as long as technology keeps advancing. You’ll find new ways to secure assets and data with every keystroke and software update</li>\n<li><strong>Determination</strong> – You’ll want to protect critical assets just as your own PII is at stake (imagine having your own bank account hacked and wanting to do something proactive about it)</li>\n<li><strong>Collaborative</strong> – You’ll likely work alongside a crew of cyber enthusiasts, and will need to work in harmony in order to keep security posture hardened</li>\n<li><strong>Writing</strong> – Developing reports to roll up to your security and business supervisor will require stellar writing skills so they can understand the technical jargon in laymen’s terms</li>\n</ul>\n<h2><strong>The Benefits of a Cyber Security Career </strong></h2>\n<ul>\n<li>You’re never bored—there’s always an attacker to stop or a vulnerability to assess</li>\n<li>You get to learn about and use cutting-edge technology</li>\n<li>There’s always a new challenge to tackle (and if you’re a problem-solver, this is fun!)</li>\n<li>You’ve likely got job security as positions like information security analysts and penetration testers are in demand in every industry</li>\n<li>You can advance in your expertise as a professional (there’s no limits to moving up the ladder or laterally across it to grow in knowledge and abilities)</li>\n<li>Remote work in cyber security is prevalent as cloud-based services and VPNs are expected parts of how companies operate today—you can live and work anywhere</li>\n<li>A cyber career straddles both public and private sectors, so you can have the benefits either division brings based on your professional preference</li>\n<li>Increasing your value in cyber is easy with persistent training platforms like Project Ares that can complement degree programs and virtual, online courses</li>\n<li>Recruiters will look for candidates on LinkedIn so if you think you’ll have a sweet gig out of college or your school training, just wait. Google might call. No, seriously.</li>\n</ul>\n<p>To prepare yourself for a fruitful career in cyber security, consider training and building your skills in <a href=\"https://www.circadence.com/products/project-ares\">Project Ares</a>. Project Ares is the premier gamified, hands-on learning tool that can support novice and aspiring cyber security and IT professionals in acquiring and maturing cyber security skills and competencies needed for on-the-job placement.</p>\n<ul>\n<li>Learn specific tools, tactics, and procedures in our foundational scenario exercises we call Battle Rooms and brush up on foundational cyber concepts and terms wit Cyber Learning Games (inspired by arcade-style games like Solitaire!).</li>\n<li>You also have the opportunity to build &#8216;soft skills&#8217; via team-related exercises, communication skills, and problem-solving and critical thinking skills in our specialized scenario activities called Missions.</li>\n<li>Learning becomes engaging and fun&#8211;and relevant. Our activities are aligned to the NIST/NICE work role framework and the scenarios are based on real attacks.</li>\n<li>Learn using real tools and real virtual machines (nothing is simulated!).</li>\n<li>The best part? It&#8217;s all accessible via our CyberBridge portal online (browser-based).</li>\n<li>We have four subscription models to choose from (we recommend the Academy or Professional subscription model if you are just starting out).</li>\n</ul>\n<h3 style=\"text-align: center;\"><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-project-ares-demo-2019-10\">Watch an on-demand demonstration</a> of Project Ares</h3>\n<p>Happy cyber career searching!</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@ricaros?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Danial RiCaRoS</a> on <a href=\"https://unsplash.com/s/photos/coding?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n<div>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@grohsfabian?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Fabian Grohs</a> on <a href=\"https://unsplash.com/s/photos/coding?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"What you need to know about a cyber security career path"}},{"node":{"id":"44b3855d-5d88-5799-8f93-6e47d739af98","slug":"will-artificial-intelligence-replace-cyber-security-jobs","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/christian-wiediger-WkfDrhxDMC8-unsplash.jpg"},"date":"2019-10-29T08:34:01.000Z","content":"<p>The cyber security workforce gap continues to grow, and the availability of qualified cyber professionals is predicted to decrease in the coming years. In fact, a <a href=\"https://www.isc2.org/Research/Workforce-Study\">Cyber Security Workforce Study</a> from the International Information System Security Certification Consortium predicts a shortfall of 1.8 million in the cyber workforce by 2022. Some resources even claim upwards of a <a href=\"https://cybersecurityventures.com/jobs/\">3.5 million</a> worker shortfall within the next two years. While this can feel like impending doom and gloom for the industry, AI, or <a href=\"https://www.upwork.com/hiring/for-clients/artificial-intelligence-and-natural-language-processing-in-big-data/\">artificial intelligence</a>, can help to quell the concerns while empowering existing cyber workers.</p>\n<p>While many other industries have seen <a href=\"https://www.globalfemaleleaders.com/blog/robots-replacing-humans/\">robotic systems replacing the need for human workers</a>, this doesn’t appear to be the case in cyber security. Humans are able to accomplish more when supported by the right set of tools. Allowing AI to support and react to human behavior allows cyber professionals to focus on critical tasks, utilize their expertise to analyze potential threats, and to make informed decisions when rectifying a breach. Autonomous cyber security doesn&#8217;t mean cyber security without humans.</p>\n<p><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-how-gamification-ai-will-revolutionize-cyber-skill-acquisition\">AI can do the legwork</a> of processing and analyzing data in order to help inform human decision making. If we were to rely completely on AI to manage security risks, it <a href=\"https://www.scmagazine.com/home/opinion/artifical-intelligence-in-cybersecurity-is-vulnerable/\">could lead to more vulnerabilities</a> because such systems have high risks for things like program biases, exploitation, and yielding false data. Nevertheless, if utilize and deployed correctly for cyber teams, AI has the ability to automate routine tasks for processionals and augment their responsibilities to lighten the workload.</p>\n<h4><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-how-gamification-ai-will-revolutionize-cyber-skill-acquisition\">Learn more about AI&#8217;s role in cyber security professional training in our on-demand webinar!</a></h4>\n<p>So, is AI going to take over the jobs of seasoned cyber pros? The answer is no; however, <em>AI will drastically change the kinds of work cyber engineers are doing. </em>In order for IT teams to successfully implement AI technologies, they will need a new category of experts to train the AI technology, run it, and analyze the results. While AI may be great for processing large amounts of data or replacing autonomous manual tasks, it will never be able to replace a security analyst’s insights or understanding of the field. There are some data points that require a level of interpretation that even computers and algorithms can’t quite support yet.</p>\n<p>AI can help to fill the workforce gap in the cyber security sector, although it may create a need for new skillsets to be learned by humans in the industry. AI and the human workforce are not in conflict with one another in this field, in fact, <a href=\"https://www.circadence.com/when-cyber-security-meets-machine-learning/\">they complement each other</a>. The future is bright for AI and humans to work in tandem at the front lines of cyber defense.</p>\n<h4>For more information, check out our <a href=\"https://marketing.circadence.com/acton/media/36273/upskill-cyber-teams-with-artificial-intelligence-and-gamified-learning-whitepaper\">white paper</a> on AI and gamification!</h4>\n<p>&nbsp;</p>\n<p style=\"text-align: center;\"><a style=\"border: 1px solid #333333; border-color: #FF9E1B; border-radius: 1px; border-width: 3px; color: #ff9e1b; display: inline-block; font-family: helvetica,arial,sans-serif; font-size: 14px; font-weight: 300; letter-spacing: 1px; line-height: 14px; padding: 12px 10px 12px 10px; text-align: center; text-decoration: none; width: 60%;\" href=\"https://marketing.circadence.com/acton/media/36273/upskill-cyber-teams-with-artificial-intelligence-and-gamified-learning-whitepaper\" target=\"_blank\" rel=\"noopener noreferrer\">DOWNLOAD WHITEPAPER</a></p>\n<p>Photo by</p>\n<p><a href=\"https://unsplash.com/@christianw?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Christian Wiediger</a> on <a href=\"https://unsplash.com/search/photos/computer?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\nPhoto by <a href=\"https://unsplash.com/@mimithian?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Mimi Thian</a> on <a href=\"https://unsplash.com/search/photos/computer?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n<p>&nbsp;</p>\n","title":"Will Artificial Intelligence Replace Cyber Security Jobs?"}},{"node":{"id":"a17f968d-2b17-5eee-a407-20d1a9f002c5","slug":"why-cyber-security-is-important-in-the-education-sector","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/vasily-koloda-8CqDvPuo_kI-unsplash.jpg"},"date":"2019-10-22T08:45:02.000Z","content":"<p>It might surprise you to know that the education industry is a prime target for malicious hackers. While threats in this sector are on the rise, many education institutions are not prepared for a cyber attack nor do they know how to recover from one. In fact, there were <a href=\"https://www.campussafetymagazine.com/safety/k-12-cybersecurity-resource-center-cyber-attacks/\">122 cyber attacks</a> last year at 119 K-12 public education institutions, averaging out to an attack every three days. A <a href=\"https://securityscorecard.com/resources/2018-education-report\">2018 Education Cyber Security Report</a> published by SecurityScorecard also found that of 17 industries, the education sector ranked dead last in total cyber security safety. Schools are leaving themselves open to student and faculty identity theft, stolen intellectual property, and extremely high cost data breach reconciliation. In fact, a <a href=\"https://www.ibm.com/security/data-breach\">study done by the Ponemon Institute</a> shows the average cost of a data breach in the education sector is $141 per record leaked.</p>\n<p>This industry faces some unique cyber security challenges:</p>\n<ul>\n<li>Historically, this industry is based on the free exchange of information, i.e the philosophy that information should be readily available to all. The use of computers and internet in education has allowed information to be stored and accessed in many different ways, creating vulnerabilities in storage, network security, and user error which leaves systems susceptible to hacks.</li>\n<li>Students and staff may have limited technical skills and prowess to know how to stay safe online.</li>\n<li>Online education systems are highly distributed across multiple schools in a district or across state lines, making it easier to infect one system to gain access to all.</li>\n<li>Computer systems used by schools often lack a single application, or “source of truth” to safely manage student and employee identities.</li>\n<li>There’s a significant change in the user population every year due to students graduating and new students enrolling, making it difficult to track who is using certain resources and who has access to them.</li>\n<li>Remote access is often required, with students and parents accessing systems from home computers and smartphones. When you access an online resource repeatedly from potentially vulnerable or unsecure networks, it creates more opportunity for hacks.</li>\n</ul>\n<p>So how can educational institutions better protect themselves against looming cyber threats?</p>\n<ul>\n<li>Shift the focus to prevention instead of mitigation – by making the focus on securing data before an attack happens rather than after, organizations will be better prepared to protect students and staff against a breach.\n<ul>\n<li>IT directors and security operators within educational institutions would be wise to consider persistent training solutions for their teams to optimize existing cyber skills so they don’t go “stale” after a period of time.</li>\n<li>Likewise, perform a security audit and work across departments to understand all the digital systems in place (financial, teacher, student portals, etc.) and where vulnerabilities might exist.</li>\n<li>HR departments of institutions should consider updating or adopting <a href=\"https://www.circadence.com/products/inCyt\">employee security awareness</a> training to ensure every education-employed professional working on a computer understands the basics of cyber security and how to stay safe online.</li>\n</ul>\n</li>\n<li>Minimize internal threats – Verizon’s <a href=\"https://enterprise.verizon.com/resources/executivebriefs/2019-dbir-executive-brief.pdf\">2019 Data Breach Investigations Report</a> found that nearly 32% of breaches involved phishing and that human error was the causation in 21% of breaches. Proper and continued training and awareness around security issues is key in preventing possible attacks.</li>\n<li>Make cyber security a priority in IT budgeting – Schools and other educational institutions need to recognize the growing cyber threatscape and prioritize allocating funds to training tools, IT teams, and continued education for internal staff.</li>\n</ul>\n<p>Circadence is here to help. Cybersecurity in the education sector is more important than ever, and our immersive, gamified cyber learning platform, <a href=\"https://www.circadence.com/products/project-ares-b/?utm_expid=.w0jHvZF_SxmVxreiyGvwHQ.1&amp;utm_referrer=https%3A%2F%2Fwww.google.com%2F\">Project Ares</a>, can help ensure that your cyber team is ready to defend against malicious attacks. Our <a href=\"https://www.circadence.com/products/inCyt\">inCyt</a> product (coming soon!) will keep everyone else in your organization up to snuff on cyber defense and offense. We pair gamification with prolonged learning methods to make learning and retaining cyber security tactics simple and fun for all. Don’t let your institution and students be next in line for a breach&#8211;think inCyt, and Project Ares when you think cyber security for the education sector!</p>\n<h4>If you’re still looking for more information on education and cyber security, check out these handy references:</h4>\n<ul>\n<li>\n<h4><a href=\"https://marketing.circadence.com/acton/attachment/36273/f-d94d76d6-49f7-4624-80b4-24e87972c2eb/1/-/-/-/-/Faces%20of%20Ranges%20EDU%20white%20paper.pdf\">The Faces of Cyber Ranges: Tapping into Experiential Skill Building for Cyber Security Teaching and Learning White Paper</a></h4>\n</li>\n<li>\n<h4><a href=\"https://www.circadence.com/guest-blog-reimagining-cyber-learning-for-students-featuring-divergence-academy/\">Reimagining Cyber Learning for Students: A Divergence Academy Guest Blog</a></h4>\n</li>\n<li>\n<h4><a href=\"https://www.circadence.com/blog/nichols-college-students-spearhead-cyber-security-education-for-the-entire-campus/\">Nichols College Students Spearhead Cyber Security Education for the Entire Campus</a></h4>\n</li>\n</ul>\n<p style=\"text-align: center;\"><a style=\"border: 1px solid #333333; border-color: #FF9E1B; border-radius: 1px; border-width: 3px; color: #ff9e1b; display: inline-block; font-family: helvetica,arial,sans-serif; font-size: 14px; font-weight: 300; letter-spacing: 1px; line-height: 14px; padding: 12px 10px 12px 10px; text-align: center; text-decoration: none; width: 60%;\" href=\"https://marketing.circadence.com/acton/attachment/36273/f-d94d76d6-49f7-4624-80b4-24e87972c2eb/1/-/-/-/-/Faces%20of%20Ranges%20EDU%20white%20paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DOWNLOAD WHITEPAPER</a></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">Photo by <a href=\"https://unsplash.com/@napr0tiv?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Vasily Koloda</a> on <a href=\"https://unsplash.com/search/photos/education?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Why Cybersecurity is Important for Higher Education Institutions"}},{"node":{"id":"e4eb9c5b-610f-5383-b07c-49e0b2c14b4c","slug":"trick-or-cyber-treat-how-quickly-hackers-use-your-information","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/10/mathew-schwartz-8rj4sz9YLCI-unsplash.jpg"},"date":"2019-10-17T21:21:17.000Z","content":"<p>We’re getting in the Halloween spirit (with a cyber security spin of course)! We started wondering about the mysterious (or not-so-mysterious) world of hacking.  We wondered just how frightfully easy it might be to gather intel from social platforms with minimal prerequisite knowledge.</p>\n<p>To that end, we did a little experiment in an attempt to understand the hacking process. We asked ourselves…</p>\n<ul>\n<li>What details can hackers find about us online?</li>\n<li>Are there enough details out there for a hacker to really manipulate us?</li>\n</ul>\n<h3>Are we “sharing too much” as a population committed to living our lives on social media?</h3>\n<p>To answer these questions and learn if we’re just asking to be <em>tricked</em> or if what hackers can find out about us is really their <em>treat</em> to exploit&#8230;[insert gloomy music here], we simulated an online  “stalking” exercise.</p>\n<p><strong>&lt;&lt; See this cool graphic to your left</strong> or read below for the simple steps we took to find personal details of someone online.</p>\n<ul>\n<li>Identify a known person you want to learn more about</li>\n<li>Go to the ol’ Google to dig up articles and social profiles about that person\n<ol>\n<li>Easily obtain properties like their full name, interests, employer, etc.</li>\n</ol>\n</li>\n<li>Search their social accounts in greater depth to find:\n<ol>\n<li>Their interests and passions</li>\n<li>Their work history</li>\n<li>Education level</li>\n<li>Birthday</li>\n<li>Previous co-workers and friends</li>\n<li>Geographic residence</li>\n<li>Links to their Instagram profile (for visual data)</li>\n<li>Pet’s name</li>\n<li>Marital status</li>\n</ol>\n</li>\n<li>Search through their friend list on Facebook, connections on LinkedIn, or followers on Twitter to isolate any missing social profiles or details on the person\n<ol>\n<li>Find their hometown, family members, and political/religious views</li>\n</ol>\n</li>\n</ul>\n<p>So gosh.  This turned out to be a frighteningly straightforward path to take to find intel on someone….even if some of their social accounts are private!  And, you might be shocked to know that it took us <u>less than an hour</u> to discover enough information about a random person.</p>\n<p>So what might a hacker do with the intel like what we just dug up? They use the information to manipulate us and make us vulnerable to an attack.</p>\n<ul>\n<li>A hacker might craft a Twitter message asking about this person’s pet or commenting on the weather in her place of residence to start a conversation.</li>\n<li>A hacker might name drop her former co-worker as a “friend” of ours and thereby “established a connection.”</li>\n<li>A hacker might have contacted the persons parents or a friend claiming we were associated with individual’s previous employer to get his/her phone number to call them.</li>\n<li>The TRICKS are endless!</li>\n</ul>\n<p>And it can happen fairly quickly. Are you surprised?</p>\n<p>There’s good news here though. While we did learn from this exercise that what we each choose to share online is, indeed, asking to be tricked by hacker, the fact is WE have some control of what information is “out there”.  Hackers LOVE any data they can use about our interests and personal information to gain access to something they want (e.g. bank accounts, social security numbers, credit cards, etc.); but we can limit our personal information and lock down our profiles to minimize how much intel is out there to start with.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@paramir?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Ehud Neuhaus</a> on <a href=\"https://unsplash.com/s/photos/halloween?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Trick or Cyber Treat? How Quickly Hackers Use Your Information"}},{"node":{"id":"c0fe67d1-e295-5705-af6a-95bd72c3be1f","slug":"living-our-mission-blog-series-programming-innovation-in-orion-thanks-to-raeschel-reed-circadence-software-engineer","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/08/kaitlyn-baker-vZJdYl5JVXY-unsplash.jpg"},"date":"2019-10-16T08:25:32.000Z","content":"<p>There’s never a dull moment at work for Circadence Software Engineer Raeschel Reed. Between learning ways to use new technology, improving coding techniques, and operationalizing cyber innovations, Raeschel is a critical part to the success of the company’s product suite.</p>\n<p>She currently works on Orion, a curriculum development application that allows learning coordinators or security managers to customize cyber training exercises based on specific needs. Raeschel has been a part of the Orion development team for over nine months, working on the back-end operations to create the logic behind the functionality. The best part about working on this product is the level of collaboration Raeschel gets to experience.</p>\n<blockquote><p>“We do a lot of pair-programming on Orion, where we work in groups of two or three to move tasks along quickly. Everyone has good ideas to share and suggestions that build on one another and it helps expediate the problem-solving aspect of software engineering,” she said.</p></blockquote>\n<p>Prior to joining Circadence, she served as a senior software developer supporting the Naval Integrated Tactical Environmental System Next Generation and before that, at the Battelle Memorial Institute supporting various government contracts for the Department of Defense and Homeland Security. Those experiences helped her learn critical technical skills and computer languages that diversified her understanding of programming and software development. She’s also an alumnus of George Mason University (master’s degree in Computer Science) and Mary Washington College (bachelor’s in Computer Science).</p>\n<p>For Raeschel, the process of working with and applying a new tech stack like Kubernetes, back-end tools like Golang (an open-source programming language), and working in Azure, keep the act of software development truly unique and on the cutting-edge of innovation.</p>\n<p>While unique hobbies like soccer, sewing and improv feed her need to try new things, it is the tech industry she keeps returning to for career fulfillment.</p>\n<blockquote><p>“Tech stuff I keep coming back to,” she said. “I have a growth mindset where I want to keep learning new things and trying new things and the field of cyber allows me to do that.”</p></blockquote>\n<p>And if that wasn’t enough for Raeschel to feel inspired and innovative at Circadence, the team she works with is second to none in her eyes.</p>\n<blockquote><p>“Team Orion is the BEST!” she exclaimed. “I feel very fortunate to be here and to have found ‘my people.’ Mondays never feel like Mondays.”</p></blockquote>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@fatosi?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Fatos Bytyqi</a> on <a href=\"https://unsplash.com/search/photos/programming?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n<div></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Living our Mission Blog Series: Programming Innovation in Orion, Thanks to Raeschel Reed, Circadence Software Engineer"}},{"node":{"id":"77622803-f63d-52ff-90b0-c852bd56ad93","slug":"living-our-mission-blog-series-hitting-a-home-run-with-circadences-security-management-thanks-to-ts-reed-cybersecurity-engineer","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/10/joey-kyber-8eREIa0u4lw-unsplash.jpg"},"date":"2019-10-10T08:28:55.000Z","content":"<p>The journey to cybersecurity engineer has been an exciting one for Circadence’s TS Reed. The former baseball pro turned security tech expert found his passion for problem solving at Circadence. After completing an undergraduate degree in criminology at Cal State Northridge, he pursued a master’s degree in mechanical engineering at CSUN and then a master’s in cybersecurity engineering from the University of San Diego.</p>\n<p>TS started as an intern at Circadence and was quickly onboarded as a full-time employee for his technical prowess, adaptability, and knowledge of modern security functions and processes. For the past three years at Circadence, TS has monitored the company’s network security, tested the security of its products (including Project Ares) and learned how and what to look for to stay one step ahead of attackers.</p>\n<blockquote><p>“It’s impossible to be bored in this job. Security is always changing: the way people build it, the way people attack it. You have to continuously learn and teach yourself the latest and greatest practices,” said TS.</p></blockquote>\n<p>But cybersecurity management wasn’t always in the stars for TS. Prior to joining Circadence, TS coached division one baseball at the University of San Diego and was also an assistant coach and recruiting coordinator at the University of Arkansas Fort Smith. A Cal State Northridge Alum, TS was a well-respected baseball player, hitting home runs in the athletic industry (named a CIF California Player of the Year and a Division 1 All-American at CSUN) with the fourth highest batting average at the 2008 Big West Conference. After college he went on to play one year of professional baseball in St. Louis for the Gateway Grizzlies of the Frontier League.</p>\n<p>He traded in his baseball cleats for cybersecurity after discovering the inherent problem-solving nature of the field—a part of the job that greatly intrigued TS to dive into a completely new field of study and long-term career trajectory.</p>\n<p>For TS, one of the best ways to “win the game” in the security field is to think like a hacker. By understanding what vulnerabilities they look for to exploit and why, security engineers like TS, know how to harden systems and deploy preventative measures beforehand. And while open forum online communities help TS and other security professionals “understand the mind of a hacker” there is always a level of uncertainty he has to deal with.</p>\n<blockquote><p>“Hackers are attacking constantly and finding new ways to infiltrate networks,” said TS. “We have to stay as close to them as possible,” he adds.</p></blockquote>\n<p>While TS’ professional journey has been unconventional at best, he has noticed many lessons from his baseball career that have translated into the cyber arena.</p>\n<p>“Teamwork is huge; I learned early on in baseball that every teammate receives things differently. You have to take the time and care enough to figure out how your team members communicate. [In cyber security], everyone communicates differently too. Both in receiving communication and externally communicating. Step one is always getting a feel for that in order to be as effective as possible when communicating with teammates/team members.”</p>\n<p>Likewise, TS learned that in baseball, a player’s own skill level and performance weren’t the sole indicator of how “good” a teammate was. The greatest measure, he says, is how effective one is at making others better and serving them.</p>\n<blockquote><p>“To be good at and handle your job is one thing but whenever you have a team involved, the greatest measure of a player or cyber employee is the capability to lift up those around them and make them better,” he advises. Empowering teammates, teaching them, and learning from them is the approach he lives by at Circadence.</p></blockquote>\n<p>We are proud to have TS as part of the Circadence family and know while he’s not hitting balls out of the park at the stadium, he’s hitting home runs with Circadence, hardening its cyber security posture.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">\n<p><span style=\"font-size: 8pt;\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@jtkyber1?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Joey Kyber</a> on <a href=\"https://unsplash.com/s/photos/baseball?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></span></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@kowalikus?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Krzysztof Kowalik</a> on <a href=\"https://unsplash.com/s/photos/network?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div class=\"K8oc9 _13vXb\"></div>\n","title":"Living our Mission Blog Series: Hitting a Home Run with Circadence’s Security Management, thanks to TS Reed, Cybersecurity Engineer"}},{"node":{"id":"a1376dd1-aa16-5aa5-a890-d008f1c862af","slug":"living-our-mission-blog-series-supporting-cyber-red-teams-with-consultations-and-pen-testing-from-josiah-bryan","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/StrikeSet_01_wallpaper_1440x900.jpg"},"date":"2019-10-08T08:00:12.000Z","content":"<p>While Circadence is proud to be a pioneer that has developed innovative cyber learning products to strengthen readiness at all levels of business, there’s one professional area at Circadence that doesn’t tend to get the limelight, until now. Meet Josiah Bryan, principle Security Architect for Circadence’s security consultation services, aptly called Advanced Red Team Intrusion Capabilities (ARTIC for short). For almost two years, Josiah has provided support and services to Red Teams around the country, those leading-edge professionals who test and challenge the security readiness of a system by assuming adversarial roles and hacker points of view.</p>\n<p>Josiah enjoys doing penetration testing and exploit development with Red Teams at a variety of companies to help them understand what a bad actor might try to do to compromise their security systems.</p>\n<p>But Josiah wasn’t always on the offensive side of cyber security in his professional career. He was first introduced to the “blue team,” or the defensive side of cyber, when he began participating in Capture the Flag competitions across the U.S. during his time as a computer science student at Charleston Southern University. Those competitions also exposed him to the offensive side of security <em>training </em>and he never looked back.</p>\n<p>After graduation, he took a job in San Diego with the U.S. Navy as a DoD civilian, finding vulnerabilities in critical infrastructure, which were then reported up to the Department of Homeland Security.</p>\n<blockquote><p>“Learning how the DoD operates internally and how they conduct penetration tests/security evaluations was an extremely valuable skill and great background for my current job at Circadence,” he says.</p></blockquote>\n<p>In addition to consulting with Red Teams, Josiah uses a variety of tools to show and tell companies about existing vulnerabilities. For example, badge scanners that let people gain access to a facility or room are quite common devices for Josiah and his team to test for customers. He might also use USB implants that provide full access to workstations and wireless signal identification devices.</p>\n<blockquote><p>“We show people how easy it is to get credentials off of someone’s badge and gain access to an area,” he says. “They never believe we will find vulnerabilities but when we do, they realize how much they need to do to improve their cyber readiness,” he adds.</p></blockquote>\n<p>But, ultimately Josiah’s favorite part of his job is the level of research and analysis he gets to do. “We are a research team, first,” he says. “We are pushing the boundaries in cybersecurity and discovering new ways that bad actors might take advantage of companies, before they actually do.  It’s a great feeling to help companies and Red Teams see the ‘light’ before the hackers get them,” he adds.</p>\n<p>Whether circumventing a security measure or patching a system, Josiah’s contributions to the field are significant.</p>\n<blockquote><p>“Finding new ways to help people understand the importance of strong cyber hygiene is fulfilling,” he says. “We can’t stress it enough in today’s culture where attacks are so dynamic and hackers are always looking for ways to take advantage of companies.”</p></blockquote>\n<p>To stay on the cutting edge of Red Team support, Josiah follows Circadence’s philosophy to persistently learn new ways to protect people and companies. “Any company is only as good as the least trained person,” Josiah says.</p>\n<p>&nbsp;</p>\n","title":"Living our Mission Blog Series: Supporting Cyber Red Teams, with Consultations and Pen Testing from Josiah Bryan"}},{"node":{"id":"757d02d5-2137-5343-ac95-81103251ded6","slug":"how-to-stay-safe-from-social-engineering-attacks","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/tom-roberts-7vmA7Fx1Nyo-unsplash.jpg"},"date":"2019-10-03T08:15:59.000Z","content":"<p><a href=\"https://youtu.be/IJeqE8-fwM4\">What is social engineering</a> and why does it matter? In the context of information security, it is a hacking tactic designed to psychologically manipulate or “trick” a person into performing actions or divulging confidential information. Social engineering threats are a wildly popular way for cybercriminals to get access to money or damage a company’s reputation. In fact, social engineering attack statistics in the past year are daunting. In 2018, <a href=\"https://www.infosecurity-magazine.com/news/17-of-workers-fall-for-social/\">more than 17% of workers fell victim to social engineering attacks</a>, according to InfoSecurity Magazine. This is problematic, as you can imagine because it disempowers people who place their trust in digital communications and leaves them feeling scared to engage with anyone online (especially if they’ve fallen victim to an attack already). Likewise, the propensity of workers who fall for these attacks tells cyber professionals that more needs to be done to: 1) educate people on what social engineering is, 2) how it manifests and impacts your personal life, and 3) the effects it can have on companies whose workers succumb to the attacks. In this article, we will discuss ways to recognize social engineering in your digital life and how to increase your cyber security awareness for these types of attacks using&#8230;games (yes, games!). More to come on that later.</p>\n<h2>Types of Social Engineering Attacks and How to Spot Them</h2>\n<p>Social engineering techniques come in many forms, but one of the most common ways to manipulate a person is via <a href=\"https://youtu.be/7y4vgdDFpxk\">phishing email</a> or a phone call. A malicious hacker could pose as one of your email contacts and send you a message to get personal information. Or an email aligning to your interests that seemingly comes from a store you frequent could allow a hacker access to your bank account. Perhaps your friend reaches out in need of help for an issue they are experiencing. One click in that email and a cybercriminal has instant access to all kinds of data about you from the operating system you use, even your social security number.</p>\n<p>&nbsp;</p>\n<p>Some warning signs to think about if you believe you’re being attacked:</p>\n<ul>\n<li>A hacker won’t give you their contact information, name, phone, or email address; they tend to pose as “someone else” familiar to you; if you&#8217;re at all suspicious and ask for their real name and info, they won&#8217;t divulge.</li>\n<li>Hackers might come across with a sense of urgency and you need to act quickly to prevent something bad from occurring.</li>\n<li>They might intimidate you to convince you to take action by informing you of an “issue” using technical words they know you won’t understand, yet seem legitimate.</li>\n<li>They could misspell words in their communications or ask odd questions to get you to reveal more information.</li>\n<li>Effective social engineers will try to build trust with their victim first by associating themselves with a reputable company or simply starting a casual conversation about a topic of your interest.</li>\n</ul>\n<blockquote><p>“My mom just became a victim of a social engineering hack recently&#8230;A person hacked into her email and she received a notice her firewalls were damaged and that she needed to pay money to have them restored before her data was compromised…a few hours later she found herself on the phone with a supposed representative of a reputable tech company giving out her credit card info to remedy the situation. It was incredibly disheartening to hear and I felt terrible that she experienced that. Fortunately, she was able to get her money back but this wasn’t the first time she fell victim to such a scam.” ~ a Circadence employee</p></blockquote>\n<p>This is just one example of what can happen when someone is unaware of social engineering tactics or just doesn’t know how to recognize them.</p>\n<h2>How to Protect Yourself from Social Engineering Attacks</h2>\n<p>Understanding defensive strategies will help anyone looking to “up the ante” on their social engineering detection prowess. Some strategies include:</p>\n<ul>\n<li>Know what “bad” emails look like/email sender email address</li>\n<li>Identify suspicious website URLs</li>\n<li>Set spam filters to “high”</li>\n<li>Update your passwords regularly (and don’t just change one character to make it “new”)</li>\n</ul>\n<p>These are just a few options but honestly, one should not simply “pick and choose” from the above options in a silo. Those looking to protect themselves should adopt what <a href=\"https://www.sans.org/reading-room/whitepapers/engineering/multi-level-defense-social-engineering-920\">SANS calls a “multi-layered” defense</a> against social engineering, where if a hacker penetrates one level of protection, he/she can’t get into the next layer without being “found out.” And when all else fails, trust your gut! If something seems strange, out of the blue, or too good to be true, it probably is.</p>\n<h2>Persistent Cybercrime Requires Persistent Cyber Learning and Training – with Games!</h2>\n<p>Security awareness and defensive strategies are more than just telling people to update their software when prompted. It requires a deeper analysis and understanding of what, when, and how cybercriminals exploit vulnerabilities (and warning signs you’re being attacked).</p>\n<p>Further, as social engineering attacks infiltrate and impact businesses, employees need to know what confidential information is, how to identify sensitive data, and how they as individuals can safeguard it simply by being proactive and cautious in their everyday online behavior. Nobody is immune to a social engineering attack and malicious hackers are working new vulnerable people every day to make progress and get what they want. But don’t let the “doom and gloom” of <a href=\"https://www.circadence.com/blog/targeted-cybercrime-on-the-rise/\">persistent cybercrime</a> get you down…get empowered and fight back!</p>\n<p>To begin a journey toward social engineering self-protection, we recommend looking into tools that help you learn cyber security basics and foundations. Our <a href=\"https://www.circadence.com/products/inCyt\">inCyt</a> tool can help with that. It is a gamified security awareness training solution that doesn’t require any prerequisite knowledge of cyber security to play.</p>\n<p>Accessible via a browser, inCyt invites players to complete in epic cyber-themed battles to increase the Cyber IQ of all players. Players gather intel and then use gamified hack processes like phishing and malware to take out their opponent. It disrupts the standard, stale teaching options currently available by giving people instant, approachable access to learning cyber in a fun way. Non-technical employees too, can play and learn real-world concepts like social engineering.</p>\n<p><iframe src=\"//www.youtube.com/embed/c_g58XB3s2w\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<p>Social engineering is a very real threat and one that isn’t going away any time soon. Once companies realize that every cyber vulnerability starts with its people knowing and understanding how to protect themselves, the more companies will be on the defensive against these types of attacks. A willingness to empower oneself with persistent, gamified training and a multi-layered defensive approach is key to stopping social engineering hackers in their tracks. If more people adopt these strategies, social engineering will become much more difficult to deploy.</p>\n<p><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@austindistel?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Austin Distel</a> on <a href=\"https://unsplash.com/search/photos/social-engineering?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span><br />\n<span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@tomrdesigns?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Tom Roberts</a> on <a href=\"https://unsplash.com/search/photos/mysterious?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></p>\n","title":"How to stay safe from social engineering attacks"}},{"node":{"id":"a333dba1-7ddf-5b25-b739-10a22f9927c8","slug":"exclaim-cyber-for-all-during-national-cyber-security-awareness-month","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/joel-muniz-XZBjfxj_NPQ-unsplash.jpg"},"date":"2019-10-01T08:20:29.000Z","content":"<p>Happy <a href=\"https://staysafeonline.org/ncsam/\" target=\"_blank\" rel=\"noopener noreferrer\">National Cyber Security Awareness Month</a>! We all know that cyber security isn’t just a month-long focus area for businesses and individuals—but this month, we are grateful for the collaborative effort between government entity Department of Homeland Security and the National Cyber Security Alliance that together, place a lens on cyber (as an industry, strategy, and operation). It reminds us that the industry is persistent and impacts us all, and is not siloed into a single time span, or targeted to a specific industry or person. We know this because of data cyberattacks on businesses occurring every day, the continual discussion about the <a href=\"https://www.circadence.com/help-wanted-combating-the-cybersecurity-skills-shortage/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber talent “gap”</a> and lack of holistically-trained workforce, and because of the <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\" target=\"_blank\" rel=\"noopener noreferrer\">ineffectiveness of passive-learning training models</a> many professionals are exposed to today. Nevertheless, as the world draws its attention around cyber in October and the industry evolves to better serve today’s professionals and businesses, we wanted to communicate the critical idea that cyber really IS for all as we strive to make cyber awareness learning <strong>accessible, intentional, and effective</strong>.</p>\n<h2><strong>Making cyber learning accessible </strong></h2>\n<p>We believe there are three ways to make cyber learning more accessible: providing a comprehensive learning curriculum, making it available via a browser, and using gamification as a tool for ingesting and retaining new information.</p>\n<p>Before we dive into each of those areas, let’s get more context about the concept of cyber learning itself. For a long time, cyber security has been thought of as a technical career and while there is a great deal of technical prowess that goes into the day-to-day tasks of a cyber pro, the idea of cyber security being an “anyone can do it” profession hasn’t popularized &#8211; and rightly so.</p>\n<p>With roots in the military and government (<a href=\"https://www.circadence.com/blog/cyber-ranges-101-and-how-they-improve-security-training/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber range training</a>), learning cyber security has been a structured, systematic, and data-driven process typically executed in a passive learning setting where students watch or listen and then take a test at the end of the lesson. There is minimal opportunity for hands-on practice in safe and secure environments, making cyber security learning and awareness of its purpose, value, and function a little more ethereal than we in the industry would like.</p>\n<h2><strong>Comprehensive Learning Curriculum</strong></h2>\n<p>One way to ensure “cyber for all” (our rally cry this year), is to make cyber training more readily available to reach today’s learner (the next generation of cyber pros) while injecting a touch of personal accountability toward the concept. This should include a learning curriculum that addresses:</p>\n<p>&#8211;      <strong>General awareness topics: </strong>These are topics that are broadly applicable to all employees of an organization and ones they should know regardless of IT level or expertise. Cyber security awareness topics at this level might include phishing, malware, social engineering, identity theft, removable media security, insider threats, social media vulnerabilities, etc.</p>\n<p>&#8211;      <strong>Industry-focused topics: </strong>relevant cyber security issues segmented by industry where security is a priority, especially highly regulated sectors like healthcare, government and industry, finance, election security, manufacturing, electricity, etc.</p>\n<p>&#8211;      <strong>Executive level topics: </strong>more functional/business topic areas where corporate leaders and other high-risk personnel and privilege users are impacted. Cyber security awareness topics at this level might include support/maintenance, consulting, managed services, legislation, risk assessment, etc.</p>\n<p>By offering pathways upon which interested cyber enthusiasts or seasoned pros can “walk along,” it gives learners an idea as to how to develop their knowledge and skills. Further, cyber learning and awareness becomes more accessible because there is a route—or <a href=\"https://www.youtube.com/watch?v=wU7blY-J8RI\" target=\"_blank\" rel=\"noopener noreferrer\">cyber learning journey</a>—for everyone to choose.</p>\n<h2><strong>Browser-Based Accessibility </strong></h2>\n<p>The other component to ensure learning cyber awareness is accessible is by making the act of learning available to virtually anyone—via a browser. Online trainings today are quite popular for cyber enthusiasts and pros in training who want to hone their skills—and the idea of being able to access a cyber security course or activity online without having to leave the office or home is not only convenient but <em>preferred</em> these days. Some companies (like ours) are taking cyber training a step further by placing it in the cloud (Microsoft Azure) so learning can be scalable, more collaborative, and more customizable to learner needs.</p>\n<h2><strong>Gamified Cyber Learning</strong></h2>\n<p>Finally, cyber awareness learning can be attained by making learning fun. We do this with elements of gamification, which engage and inspire learners to train in environments that are not only realistic but also supported by a compelling narrative that invites players to progress through activities. Components like leaderboards, points, badges, and team-based collaboration allow learners to build a sense of “healthy competition” while learning and building skills and cyber competencies. Circadence offers learners of all skill levels various game-based activities from <strong>foundational concept learning</strong> in games like <a href=\"https://www.circadence.com/demos/\" target=\"_blank\" rel=\"noopener noreferrer\">RegExile</a> to <strong>application and analysis</strong> in Project Ares’ battle rooms and missions.</p>\n<p>One student who played our RegExile cyber learning game in his cyber security course at CU Boulder said:</p>\n<p><em>“I played the RegExile game today and I have to say I have hated regex till now, but when I learned it through the game, I actually liked it. It was really fun. I liked the concept of how a false sense of impending danger from the robots can make you think better and learn more. I was typing out my regex and actually thinking quite hard on how it could work and what I could do to make sure it was right as I did not want to lose the shield. I learned more through this game on regex than what I had in my undergrad class.” ~ Student at CU Boulder Cyber Security Course</em></p>\n<p><iframe src=\"//www.youtube.com/embed/AbSdKm5JNSo\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<h2><strong>Make Cyber Learning Intentional</strong></h2>\n<p>Cyber learning has to be intentional. In order for students and existing cyber pros to get the most out of their training, they need a curriculum path that is not only diverse (based on skill needs), but also one that addresses <strong>all phases of learning: knowledge, comprehension, application/analysis, and synthesis/evaluation.</strong></p>\n<p><strong>Can we insert an image that illustrates the “learning phases” of knowledge, comprehension, application/analysis, and synthesis/evaluation? </strong></p>\n<p>After understanding what cyber concepts are and how they impact our professional and personal lives (knowledge and comprehension), a learner needs to be able to build their cyber literacy and knowledge “essentials” by developing baseline cyber skills (application/analysis). Then, they can apply those skills in objective-based activities that synthesize concepts (evaluation).</p>\n<p><em>“I personally found Project Ares to be a great learning experience and thought the mission environment was seamless.” ~ Chris N. UNCW Cyber Security Operations Club </em></p>\n<h2><strong>Making Cyber Learning Effective</strong></h2>\n<p>For IT Security Specialists and professionals, cyber learners can advance their competencies via recurring <strong>role-based training</strong> <em>combined with</em> continuing education and real-world experience trainings. Cyber learning needs to be rooted in best practice, industry-defined frameworks and there’s no better model to follow than the framework set forth by the NIST/NICE organization.</p>\n<p>By aligning learning curriculum against work roles, learning concepts and skills inherently becomes more effective because it is RELEVANT for people. They learn concepts, how to apply them and can draw connections to how those concepts apply to their own jobs or jobs they aspire to. Further, the learning permeates into individual&#8217;s personal lives as well, enhancing cybersecurity at home.</p>\n<p>We have built-in five NIST/NICE work roles that are present in Project Ares for trainees to work toward including:</p>\n<p>&#8211;      Cyber Defense Infrastructure Support Specialist</p>\n<p>&#8211;      Information Systems Security Manager</p>\n<p>&#8211;      Threat Warning Analyst</p>\n<p>&#8211;      Systems Security Analyst</p>\n<p>&#8211;      Cyber Defense Analyst</p>\n<p>Intentional cyber learning following this framework focuses on a particular technical topic, such as Incident and Event Management, Identification of Privilege Escalation Techniques, or Elections and Voting Security. This type of work role specification helps make learning cyber a reality.</p>\n<h2><strong>Summing it up </strong></h2>\n<p>While there’s no switch to turn on every part of this “cyber for all” plan, we hope it helps shed light on ways security leaders and HR directors can begin to cultivate an inclusive cyber culture in their own workplace, among their own teams. As we celebrate National Cyber Security Awareness Month (NCSAM 2019), it’s important for us to resurface conversations around what it means to actually be aware and how we can manifest that meaning into something that really makes an impact on business’ security posture. We hope this post is one inspiration to start initiating those conversations around shared responsibility to ensure all Americans stay safe.</p>\n<p>&nbsp;</p>\n<p><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@jmuniz?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Joel Muniz</a> on <a href=\"https://unsplash.com/s/photos/phones?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@mimithian?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Mimi Thian</a> on <a href=\"https://unsplash.com/s/photos/computer?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Exclaim “Cyber for All!” During National Cyber Security Awareness Month"}},{"node":{"id":"4d8842ca-df81-5f40-9dd3-6659a98120bf","slug":"why-alternatives-to-traditional-cyber-training-are-needed-immediately","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/christopher-gower-m_HRfLhgABo-unsplash.jpg"},"date":"2019-09-24T06:32:03.000Z","content":"<p>Are you looking for a more effective, cost-conscious cyber training tool that <em>actually teaches competencies and cyber skills</em>? We’ve been there. Let us share our perspective on the top cyber training alternatives to complement or supplement your organization’s current training efforts.</p>\n<p>Cyber training has evolved over the years but not at pace with the rapid persistence of cybercrime. Cyberattacks impact businesses of all sizes and it’s only a matter of time before your business is next in line. Traditional cyber training has been comprised of individuals sitting in a classroom environment, off-site, reading static materials, listening to lectures, and if you’re lucky, performing step-by-step, prescriptive tasks to “upskill” and “learn.” Unfortunately, this model isn’t working anymore. Learners are not retaining concepts and are disengaged from the learning process. This means by the time they make it back to your company to defend your networks, <em>they’ve likely forgotten most of the new concepts that you sent them to learn about in the first place</em>. <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\">Read more on the disadvantages of passive cyber training here</a>.</p>\n<p>So, what cyber training alternatives are available for building competency and skill among professionals? More importantly, why do you need a better way to train professionals? We hope this blog helps answer these questions.</p>\n<h2><strong>Cyber Range Training </strong></h2>\n<p><a href=\"https://www.circadence.com/blog/cyber-ranges-101-and-how-they-improve-security-training/\">Cyber ranges</a> provide trainees with simulated (highly scalable, small number of servers) or emulated (high fidelity testing using real computers, OS, and application) environments to practice skills such as defending networks, hardening critical infrastructure (ICS/SCADA) and responding to attacks. They simulate realistic technical settings for professionals to practice network configurations and detect abnormalities and anomalies in computer systems. While simulated ranges are considered more affordable than emulated ranges, <a href=\"https://apps.dtic.mil/dtic/tr/fulltext/u2/a594524.pdf\">several academic papers question whether test results from a simulation reflect a cyber pro’s workplace reality</a>.</p>\n<h2><strong>Traditional Cyber Security Training </strong></h2>\n<p>Courses can be taken in a classroom setting from certified instructors (like a SANS course), self-paced over the Internet, or in mentored settings in cities around the world. Several organizations offer online classes too, for professionals looking to hone their skills in their specific work role (e.g. incident response analyst, ethical hacker). Online or in-classroom training environments are almost exclusively built to cater to offensive-type cyber security practices and are highly prescriptive when it comes to the learning and the process for submitting “answers”/ scoring.</p>\n<p>However, as cyber security proves to be largely a “learn by doing” skillset, where outside-of-the-box thinking, real-world, high fidelity virtual environments, and on-going training are crucially important, attendees of traditional course trainings are often left searching for more cross-disciplined opportunities to hone their craft over the long term. Nevertheless, online trainings prove <em>a good first step</em> for professionals who want foundational learnings from which they can build upon with more sophisticated tools and technologies.</p>\n<h2><strong>Gamified, Cyber Range, Cloud-Based Training </strong></h2>\n<p>It wouldn’t be our blog if we didn’t mention <a href=\"https://www.circadence.com/products/project-ares/\">Project Ares</a> as a recommended, next generation alternative to traditional cyber training for professionals because it uses gamified backstories to engage learners in activities.  And, it combines the benefits and convenience of online, cyber range training with the power of AI and machine learning to automate and augment trainee’s cyber competencies.</p>\n<p>Our goal is to create a learning experience that is engaging, immersive, fun, and challenges trainee thinking in ways most authentic to cyber scenarios they’d experience in their actual jobs.</p>\n<p>Project Ares was built with an active-learning approach to teaching, which studies show <a href=\"http://thepeakperformancecenter.com/educational-learning/learning/principles-of-learning/learning-pyramid/\">increase information retention among learners to 75% compared to passive-learning models</a>.</p>\n<p>Check out the comparison table below for details on the differences between traditional training models and what Project Ares delivers.</p>\n<table class=\"blogtable\">\n<tbody>\n<tr>\n<td><strong>Traditional Training</strong><br />\n(classroom and online delivery of lectured based material)</td>\n<td><strong>Project Ares</strong><br />\n(immersive environment for hands on, experiential learning)</td>\n</tr>\n<tr>\n<td><strong>Curriculum Design</strong></p>\n<ul>\n<li>Instructors are generally experts in their field and exceptional classroom facilitators.</li>\n<li>Often hired to develop a specific course.</li>\n<li>It can take up to a year to build a course and it might be used for as long as 5 years, with updates.</li>\n<li>Instructors are challenged to keep pace with evolving threats and to update course material frequently enough to reflect today’s attack surface in real time.</li>\n<li>It is taught the same way every time.</li>\n</ul>\n</td>\n<td><strong>Curriculum Design</strong></p>\n<ul>\n<li>Cyber subject matter experts partner with instructional design specialists to reengineer real-world threat scenarios into immersive, learning-based exercises.</li>\n<li>An in-game advisor serves as a resource for players to guide them through activities, minimizing the need for physical instructors and subsequent overhead.</li>\n<li>Project Ares is drawn from real-world threats and attacks, so content is always relevant and updated to meet user’s needs.</li>\n</ul>\n</td>\n</tr>\n<tr>\n<td><strong>Learning Delivery</strong></p>\n<ul>\n<li>Courses are often concept-specific going deep on a narrow subject. And it can take multiple courses to cover a whole subject area.</li>\n<li>Students take the whole course or watch the whole video – for example, if a student knows 70%, they sit through that to get to the 30% that is new to them.</li>\n<li>On Demand materials are available for reference (sometimes for an additional fee) and are helpful for review of complex concepts.   But this does <em>not </em>help student put the concepts into practice.</li>\n<li>Most courses teach offensive concepts….from the viewpoint that it is easier to teach how to break the network and then assumes that students will figure out how to ‘re-engineer’ defense. This approach can build a deep foundational understanding of concepts but it is not tempered by practical ‘application’ until students are back home facing real defensive challenges.</li>\n</ul>\n</td>\n<td><strong>Learning  Delivery</strong></p>\n<ul>\n<li>Wherever a user is in his/her cyber security career path, Project Ares meets them at their level and provides a curriculum pathway.</li>\n<li>From skills to strategy:   Students / Players can use the Project Ares platform to refresh skills, learn new skills, test their capabilities on their own and, most critically, collaborate with teammates to combine techniques and critical thinking to successfully reach the end of a mission.</li>\n<li>It takes a village to defend a network, sensitive data, executive leaders, finances, and an enterprises reputation:  This approach teaches and enables experience of the many and multiple skills and job roles that <em>come together</em> in the real-world to detect and respond to threats and attacks….</li>\n<li>Project Ares creates challenging environments that demand the kind of problem solving and strategic thinking necessary to create an effective and evolving defensive posture</li>\n<li>Project Ares Battle Rooms and Missions present real-world problems that need to be solved, not just answered. It is a higher-level learning approach.</li>\n</ul>\n</td>\n</tr>\n</tbody>\n</table>\n<p>If you want to learn more about Project Ares and how it stacks up to other training options out there, watch our on-demand webinar <a href=\"https://www.circadence.com/webinar/get-gamified-why-learning-happens-better-with-games-with-keenan-skelly/\"> <strong>“Get Gamified: Why Cyber Learning Happens Better With Games”</strong> </a> <strong> featuring our VP of Global Partnerships, Keenan Skelly.</strong></p>\n<p><strong> </strong> <strong>You can also contact our experts at </strong> <a href=\"mailto:info@circadence.com\"> <strong>info@circadence.com</strong> </a> <strong> or </strong> <a href=\"https://www.circadence.com/request-a-demo/\"> <strong>schedule a demo</strong> </a> <strong> to see it in action! </strong></p>\n<p><span style=\"font-size: 10pt;\"> Photo by <a href=\"https://unsplash.com/@helloquence?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Helloquence</a> on <a href=\"https://unsplash.com/search/photos/training?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a> </span></p>\n","title":"Why Alternatives to Traditional Cyber Training Are Needed Immediately"}},{"node":{"id":"66fcded9-1e3b-570d-aff4-89cea51b363d","slug":"help-wanted-combating-the-cybersecurity-skills-shortage","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/projAres_office_03_wallpaper_2560x1440.jpg"},"date":"2019-09-18T19:35:04.000Z","content":"<p>Recent news headlines frequently communicate about the massive cyber security skills shortage in the industry so we wanted to dig deeper into this phenomenon to find out why there’s a cyber security talent gap and what can be done about it. Cyberattacks are permeating every commercial and government sector out there yet industry and analyst reports indicate there isn’t a large enough talent pool of defenders to keep pace with evolving threats. When data is compromised and there aren’t enough cyber security staff to secure the front lines, we ALL are at risk of identity theft, monetary losses, reputational damage, fines, and operational disruption. cy</p>\n<h2>Statistics on the Cyber Skills and Talent Gap</h2>\n<p>With more than <a href=\"http://www.isaca.org/knowledge-center/research/researchdeliverables/pages/advanced-persistent-threats-awareness-study-results.aspx?cid=pr_1110482&amp;appeal=pr\">one in four organizations experiencing an advanced persistent threat (APT) attack</a> and when <a href=\"https://www.isaca.org/cyber/Documents/State-of-Cybersecurity_Res_Eng_0415.pdf\">97 percent of those APT’s</a> are considered a credible threat to national security and economic stability, it’s no wonder the skills shortage is on everyone’s mind.</p>\n<p><a href=\"https://iamcybersafe.org/wp-content/uploads/2017/07/N-America-GISWS-Report.pdf\">A report from Frost &amp; Sullivan</a> found that the global cybersecurity workforce will have more than 1.8 million unfilled positions by 2020 (that’s next year!) while some sources report a <a href=\"https://cybersecurityventures.com/jobs/\">3.5 million shortfall by 2021</a>.</p>\n<p>It begs several questions:</p>\n<ul>\n<li><strong style=\"font-style: inherit;\">What’s causing the shortage of cybersecurity skills?</strong> <a href=\"https://www2.deloitte.com/content/dam/Deloitte/us/Documents/consumer-business/us-cb-cybersecurity-talent-shortage-consumer-products.pdf\">According to a Deloitte report</a>, the lack of effective training opportunities and risk of attrition may be to blame.</li>\n<li><strong style=\"font-style: inherit;\">Is there really a shortage of talent?</strong> Hacker, security evangelist, and cyber security professional Alyssa Miller thinks there is more of a <a href=\"https://alyssasec.com/2019/09/talent-shortage-really\">cyber talent disconnect</a> between job seeker’s expectations of what a job entails versus what employer’s demand from a prospective candidate.</li>\n<li><strong style=\"font-style: inherit;\">How do we fill these cyber positions?</strong> <a href=\"https://www.phoenix.edu/about_us/media-center/news/uopx-survey-perceptions-cybersecurity.html\">A study of 2,000 American adults</a> found that nearly 80% of adults never considered cyber security careers. Why? Sheer unawareness. Most had never even heard of specific cyber job roles like a penetration tester and software engineer and others were deterred by their lack of education, interest, and knowledge about <a href=\"https://www.circadence.com/blog/how-to-launch-a-cyber-security-career/\">how to launch a cyber career</a>.</li>\n</ul>\n<h2><strong>Strategies to Minimize the Cybersecurity Skills Shortage</strong></h2>\n<p>Given the pervasive nature of cyber attacks, businesses can’t afford to wait around for premiere talent to walk through the door. Companies need to take a proactive and non-traditional approach to hiring talent—and, yes, it takes effort. Closing the corporate cyber-operations talent shortage may even take a company culture overhaul.</p>\n<p>Miller suggests that recruiters “must learn to <a href=\"https://alyssasec.com/2019/09/talent-shortage-really\">engage security professionals through less traditional avenues</a>. The best security recruiters have learned how to connect with the community via social media. They’ve learned how to have meaningful interactions on Twitter and are patient in their approach.”</p>\n<p>Whether looking to fill a position in digital forensics or computer programming or network defense or even cyber law, the skills required for those positions can be taught with the right tools. Companies should learn to be flexible with those requirements as many are now filling unopened positions by hiring and then teaching and training professionals on preferred cyber skills and competencies. Recruiters need to adopt a paradigm shift during the talent search and be more comfortable hiring for character and cultural fit first, then, training for skills development.</p>\n<p><strong style=\"font-style: inherit;\">Fill the talent pipeline</strong></p>\n<p>Consider hiring people with different industry backgrounds or skill sets to bring new ideas to the table. Sometimes, getting an “outside” perspective on the challenges firms are facing sheds a new light because they notice nuances and inconsistencies that internal teams, who are in the day-to-day, may not see immediately. Look for passionate candidates with an eagerness to learn.</p>\n<p>Companies today are prioritizing skills, knowledge, and willingness to learn over degrees and career fields because they know that some things cannot be taught in a classroom such as: curiosity, passion, problem-solving, and strong ethics.</p>\n<p><strong style=\"font-style: inherit;\">Look for individuals with real-world experience</strong></p>\n<p>If you happen to have candidates in your pipeline that have industry knowledge, ask about their real-world experience. Inquire about the kinds of things they’ve learned in their previous position and get them to share how they remedied attacks. Create a checklist of skills you desire from a candidate that may include identity management, incident response management, system administration, network design and security, and hacking methodologies, to name a few. Learning how they dealt with real situations will reveal a lot about their personality, character, and skill set.</p>\n<p><strong style=\"font-style: inherit;\">Re-examine job postings</strong></p>\n<p>Often a job posting is the only thing compelling a candidate to apply for a position. If the job posting is simply a laundry list of skills requirements and degree preferences, it may deter candidates who have those skills but also seek to work for a company that values innovation, creativity, and strategic vision. Read descriptions carefully to determine if they portray the culture of your organization. If a cultural vibe is lacking, it may be time to inject a sense of corporate personality to attract the right candidates.</p>\n<p><strong style=\"font-style: inherit;\">Provide continuous professional development opportunities</strong></p>\n<p>With advances in technology, professionals need to be on top of the latest trends and tools to succeed in their job. That is why it is vital to re-skill and persistently train cybersecurity professionals so they can prepare for anything that comes their way—and you can retain your top talent. Conferences, webinars and certifications are not for everyone—so it is important to find growth opportunities that employees want to pursue for both their personal as well as their professional benefit.</p>\n<p><strong style=\"font-style: inherit;\">Create a culture of empowerment for retention</strong></p>\n<p>CISOs can set expectations early in the hiring process so candidates understand how their specific role impacts the organization. For example, during the interview process, notify candidates of your expectation that they be “students of the industry” such that they are expected to stay on top of security news and happenings.</p>\n<p>Gartner advocates for a “people-centric security” approach where stacks of tools are secondary to the powerful human element of security. Additionally, send out quarterly or bi-monthly roundups of the latest cyber security news and events to keep your team abreast of current affairs. Making it as easy as possible for them to be “students of the industry” increases the likelihood that they will remain current on industry developments and engaged in their role.</p>\n<p><strong style=\"font-style: inherit;\">Invest in Cyber Training to Cultivate Talent</strong></p>\n<p>Executives are demonstrating their support for strong info security programs by increasing hiring budgets, supporting the development of info security operation centers (SOCs) and providing CISOs with the resources they need to build strong teams.</p>\n<p>With the right talent, you will have a better chance of successfully defeating attackers, staying aware of current threats, and protecting your team, your company—and your job. These strategies will go a long way in preventing future attacks and preparing staff and systems to respond when things go awry. The cyber security staffing shortage is no longer just a cyber security department issue—it’s a global business risk issue.</p>\n<p>&nbsp;</p>\n","title":"Help Wanted: Combating the Cyber Skills Gap"}},{"node":{"id":"11893628-7f60-5921-9130-135efb1c59e7","slug":"living-our-mission-embracing-the-art-of-gamification-with-hector-robles-lead-game-designer-at-circadence","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/09/ugur-akdemir-5X39cfzKX3o-unsplash.jpg"},"date":"2019-09-17T08:35:29.000Z","content":"<p>If there’s anyone who truly embodies the art of gamification, Hector Robles name just might top that list. As a lead game designer at Circadence, Hector works closely with the company’s content and curriculum departments to take complex cyber concepts and learning paths and artistically weaving them into fun cyber games that make learning desirable.</p>\n<p>Hector has more than nine years of professional experience in the game design and cyber security/tech space, but his career wasn’t always rooted in making games for companies. In fact, after graduating from high school, Hector proudly served in the U.S. Army, as a military police officer. It was there he gained an understanding of and appreciation for the importance of security as a whole. Hector saw firsthand how proliferating technology impacted both civilian security and military security operations. After his service, Hector followed his interest and passion for game design by attending the Miami International University of Art and Design and graduating with a degree in game design. Then, he began working with media conglomerates and startup companies as a designer, producer, and artist.</p>\n<p>But something was missing. While Hector was accumulating an impressive portfolio of entertainment game design work, he sought something more meaningful—a way to apply his skills in game design to help others. It was then he learned about Circadence and joined the game development team alongside colleagues Kari Sershon, Ronaldo Periera and Jose Velazquez.</p>\n<p>Hector has worked on <a href=\"https://www.circadence.com/products/project-ares/?utm_expid=.w0jHvZF_SxmVxreiyGvwHQ.0&amp;utm_referrer=https%3A%2F%2Fwww.circadence.com%2F\">Circadence’s flagship platform Project Ares</a>, specifically the cyber learning games embedded within it. The cyber learning games that Hector has designed will also soon become a part of the CyberBridge Essentials learning hub for wider customer access. Hector’s work can be seen most poignantly in Circadence’s new 2019 game, RegExile, which teaches players how to do regular expression coding work. RegExile helps players learn the syntax of regular expressions so they can efficiently parse through the data in search of evidence of a breach. It is a fast-paced pattern-recognition game that teaches the concepts of regular expression while exercising player’s muscle memory and reaction time. The game challenges players to form the correct expression to select or exclude data while immersing them in a futuristic “save the world” scenario filled with human-destroying robots. Players must recognize patterns in the names and type proper RegEx techniques to eliminate robots before they destroy the colony.</p>\n<p>For Hector, designing games like this is fulfilling. “It’s a completely different beast from entertainment game design. It’s meaningful to take complex cyber concepts and turn them into fun, interactive, easily-digestible material for players—whether it’s people just starting out in cyber security or seasoned professionals looking to brush up on skills,” Hector says.</p>\n<p>Hector typically approaches new game development by first thinking about how to make a certain concept or task in cyber “fun.” He does a lot of game research to come up with ideas of new game play designs and layouts. The research, which may include playing a game of Dungeons and Dragons to get the cognitive juices flowing, playing an arcade style game to think of narrative storylines and actions, or even breaking out a board game with friends, sparks Hector’s imagination and creativity. Once he has an idea of what kind of game he wants to create to teach the cyber concept that the Circadence Curriculum team has outlined, he develops a one-page pitch for stakeholders that presents his ideas cohesively, including details on game objectives, purpose, and technical specifications. After approval, the fun begins! Hector and his team start prototyping features and components of the game to make the ideas on paper become reality. For RegExile, he planned out the movement of the robots in the game by moving game board pieces around to capture an authentic “in game” feeling for the player.</p>\n<blockquote><p>“I try to always think about what games are out there and how we can make our games truly unique,” says Hector. “We’re constantly thinking about things like accessibility, narrative, and pacing to ensure our games aren’t just entertaining, but that people are really learning from them,” he adds.</p></blockquote>\n<p>Hector is also working on augmented reality and virtual reality card games where players can learn cyber security concepts in industry-specific settings like oil rigs and power plants to further engage one’s understanding of different cyber threats and defense tactics in the cyber kill chain. Users will eventually be able to use physical playing cards to learn things like ports and protocols too. Stay tuned for more on that!</p>\n<p>While some may view Hector’s work as all fun and games, it does have a meaningful component that many end-users don’t think about at first. When someone logs onto a game, they are presented with audio/visual and text-based cues to inspire their behavior or ignite an action. Those cues are what allow a player to understand how to engage and act in a game setting, so they are not confused as to what to do or how to do something. <strong>Hector’s work takes the guessing out of game play for Circadence’s products.</strong> Players who engage with a cyber learning game like RegExile know immediately how to play the game and what the objective is without having to jump through hurdles or be confused at where to start. Thank Hector and his team for that!</p>\n<blockquote><p>“When they get to the platform, they know what to do, the basics of the tool, and more of the narrative and understanding of how they’ll engage with it,” said Hector. “It’s the components we build into the game that allow them to feel empowered when they hit “play” to start,” he adds.</p></blockquote>\n<p>It’s Hector’s team’s expertise behind the coding work, gamification elements, and user interface that comes together to create the best user experience for the player. The art of gamification not only engages and entertains, but it inspires, teaches, and instills cyber knowledge in the minds of players who want to grow in cyber competency and skill.</p>\n<blockquote><p>“Seeing someone’s face light up when they play our games brings a smile to my face,” says Hector. “At first they’re hesitant but then they start playing and there is a moment of clarity that washes over their face that makes the time and energy put into our games all worth it.”</p></blockquote>\n<p>Hector believes the best way to learn is by playing games. That’s what ‘living our mission’ at Circadence is all about. The power of games can cement cyber concepts and we look forward to seeing what Hector and his team whip up next to keep professionals and first-time cyber learners coming back for more knowledge and skill building.</p>\n","title":"Living Our Mission: Embracing the Art of Gamification with Hector Robles, Lead Game Designer at Circadence"}},{"node":{"id":"ea1da9d4-1443-59bc-969b-9bfc82c0c41b","slug":"living-our-mission-blog-series-building-hyper-scalable-cyber-training-experiences-with-randy-thornton-enterprise-architect-at-circadence","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/08/markus-spiske-Skf7HxARcoc-unsplash.jpg"},"date":"2019-09-09T08:25:35.000Z","content":"<p>A newly minted Engineering Fellow, Randy Thornton has dedicated his craft to software development for over 30 years. His passion for learning and using new technologies is evident in Circadence’s cyber range platform, Project Ares<sup>Ò</sup>.</p>\n<p>Randy joined Circadence in 2005 when the company was selling its WAN Optimization product, MVO<sup>Ô</sup>. His background in scientific computing software for CAD/CAM, telecom, and seismology have all been brought to bear to transform Project Ares from a mere cool idea that met unique market demands, to now, a full-fidelity, hyper-scalable range training tool for cyber security professionals used worldwide.</p>\n<h2>Randy and Circadence: Then and Now</h2>\n<p>In the beginning, there were about four Circadence employees working on the Project Ares prototype, which was eventually adopted by government and military agencies who were looking for better ways to train their cyber operators. Fast forward to today, Randy is leading the Project Ares team to redesign the architecture to scale within Microsoft Azure.  The goal is to provide private sector enterprises the same cutting-edge opportunity to train their cyber teams of any size and location on a gamified range—persistently, authentically, with flexibility and relevant to their specific cyber readiness needs. And Randy has been there through it all!</p>\n<p>Today Randy mentors the engineering team at Circadence and helps them identify and collate standards around how the company’s products’ code is written and tested. He also helps identify what technologies to use and evaluates the technical feasibility of using new tech in the products themselves.</p>\n<blockquote><p>“Researching and learning new technology and staying on the cutting-edge is one of the most exciting parts of my job,” said Randy. “I see so much potential for Project Ares…so much promise…and being able to build out complicated networks in the cloud is a welcomed challenge for me.” he added.</p></blockquote>\n<h2>Fellow Designation Reflected in Technical Capabilities within Project Ares</h2>\n<p>Randy’s contributions have been celebrated with a promotion to an Engineering Fellow, a significant career milestone that honors his achievements, expertise, and technical leadership to Project Ares, Circadence, and the cyber security industry as a whole.  The well-deserved recognition clearly stems from the fact that Randy never stops learning! He recently completed his Azure architecture certification exam, which helps him contribute to transitioning Project Ares to run on Microsoft Azure intelligent cloud.</p>\n<blockquote><p>“Project Ares’ ability to scale across regions is even more prevalent now thanks to Microsoft Azure,” said Randy. “The usability, the functionality, and its capability to connect across multiple locations and look like one single installation will be very beneficial to enterprise and government entities looking to scale their cyber training efforts effectively.”</p></blockquote>\n<p>A professional motto that drives Randy’s belief in continuous innovation in Project Ares is “Every time we change code, we should improve it.” It is this technical philosophy that has kept Randy and the Circadence engineering team on their toes and moving at pace to meeting market demands for scalable cyber training experiences.</p>\n<h2>Evolving Cyber Training to Scale for Customers</h2>\n<p>Randy’s current project lies in Project Ares.Next, an evolution of Project Ares from an on-premise application to a true cloud native SaaS platform that fully exploits the advantages of the cloud computing model.  Many of the cloud native improvements for Project Ares will be “under the covers”.  But customers will see performance improvements in mission virtual machines and new cyber curriculum will be able to be added to the platform more expeditiously. Project Ares users who want to train their teams from anywhere in the world will be able to do so persistently, without compromising user experience and impacting mission load times, etc.</p>\n<p>As Project Ares evolves, we start to adapt to Go and Google standards and Kubernetes standards,” said Randy. “We’ve been working closely with Microsoft engineering teams on how we use the Azure Cloud most effectively and efficiently,” he adds.</p>\n<p>The work of Randy and his teams is technical in nature and we greatly appreciate the level of knowledge and expertise they have to ensure Project Ares stays on the cusp of cyber training market demands using the latest technology to automate and augment the cyber workforces of tomorrow. We are grateful for their work to make Project Ares better every day as they use their talents to inform what our customers experience in the platform.</p>\n<h3><a href=\"https://www.circadence.com/blog/Project-Ares-Update-8089-2/\">Learn Project Ares, including recent mission and battle room updates!</a></h3>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\">\n<p><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@markusspiske?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Markus Spiske</a> on <a href=\"https://unsplash.com/search/photos/software-engineering?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\n</span><span style=\"font-size: 10pt;\">Photo by </span><a style=\"font-size: 10pt;\" href=\"https://unsplash.com/@johnschno?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">John Schnobrich</a><span style=\"font-size: 10pt;\"> on </span><a style=\"font-size: 10pt;\" href=\"https://unsplash.com/search/photos/computer?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Living Our Mission Blog Series: Building Hyper-Scalable Cyber Training Experiences with Randy Thornton, Enterprise Architect at Circadence"}},{"node":{"id":"fcbadf28-d1f1-5dc8-8a52-6e771dacbc7d","slug":"living-our-mission-learning-is-built-into-project-ares-thanks-to-victoria-bowen-instructional-designer-at-circadence","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/08/art-creative-design-5836.jpg"},"date":"2019-09-04T10:30:55.000Z","content":"<p>Victoria Bowen has worked in the instructional design field for about 35 years – primarily developing e-learning with a smattering of web development, SharePoint development, and Learning Management System administration. She holds an undergrad degree is in psychology, a master’s in special education, and doctorate in curriculum, instruction, and supervision with emphasis on instructional design.  What that means is that she knows how people learn and what aids and interferes with learning in training products. Victoria worked an IT security services company and then transitioned to a training role with the Air Force’s Cyberspace Vulnerability Assessment/Hunter (CVAH) weapon system. “I was responsible for the training database and the app store for several versions of CVAH.  I also developed user guides and training materials,” she said. Victoria served in that role for about nine months before joining the Circadence team.</p>\n<p>Since September 2013, Victoria’s main job as an instructional designer has been to analyze training needs for Circadence products. She helps assess target audiences for Circadence products to determine learning goals and objectives for the product designers. She establishes the behaviors that a user would be assessed against, after engaging with the product, to ensure learning has occurred. Victoria also suggests ways to evaluate those behaviors to optimize product utility. In doing so, she prepares training outlines and documentation and writes content development processes and learning paths. Mapping Job Qualification Requirements (JQRs) tasks to training tasks is a regular function of Victoria’s job alongside mapping National Institute of Standards and Technology (NIST) standards to training tasks. She ensures the core skills addressed in our curriculum creation tool <a href=\"https://www.circadence.com/products/orion/\">Orion™ </a>align to defined NIST standards.</p>\n<h2>Applying instructional design theory to new technology</h2>\n<p>What keeps Victoria returning to her desk every day is the challenge of learning and applying instructional design theory to cutting edge training technology. <strong>Although the old rules still apply, Circadence is leading the way in developing new rules and research on how learning happens and best practices for simulations like <a href=\"https://www.circadence.com/products/project-ares-b/?utm_expid=.8Yn0dMlxSEOspzTQQFKGSw.1&amp;utm_referrer=https%3A%2F%2Fwww.circadence.com%2F\">Project Ares<sup>®</sup></a>. </strong><strong>“</strong>We know a lot about constructivism as an underlying theory, but to apply it gaming environments like Project Ares is new and fascinating,” she says.</p>\n<p>The challenge of applying theory to technology is complicated by the fact that new books about instructional design and cognitive analysis and processing are published frequently. And there are new online articles every month. Also, there is a growing emphasis on instructional analysis before beginning training development projects, so there is a growing emphasis on analytical skills for instructional designers. <strong>These skills help us design the right training, just enough training, and just in time training for learners.</strong></p>\n<p>“Ensuring we are constructing an environment in which the player is constantly learning, not just performing a task or activity is essential.  We need the player to understand the what, when, how, and why related to the tasks they perform in the environment.  For deeper learner and better retrieval from long term memory, we also need the player to understand how their tasks relate to each other.” Victoria says. “Furthermore,” she adds, “we want the player’s understanding and performance to progress from novice to intermediate to expert. That doesn’t happen just by repetition. There must be instruction too.”</p>\n<h2>Instructional design within Project Ares</h2>\n<p>For the <a href=\"https://www.circadence.com/blog/living-our-mission-creating-authentic-cyber-training-and-learning-environments-inspired-by-real-world-experience-todd-humes-sr-mission-designer/\">Project Ares Battle Rooms and Missions</a>, Victoria collaborates with cyber security subject matter experts to write the learning objectives and assessment criteria, provide role-based learning content outlines, identify gaps and redundancies in content, and review product design to ensure high quality instructional design aspects. For <a href=\"https://www.circadence.com/products/inCyt\">inCyt™</a>, she’s written the scripts for several of the cyber security lessons. Finally, Victoria also reviews and identifies instructional design issues such as scrolling text and text display not controlled by the user, “both of which interfere with cognitive processing by the user and adversely affect transfer from short term to long term memory,” she adds.</p>\n<blockquote><p><em>“I have a different challenge every day and I like challenges. I’m also fascinated by cyber security and enjoy learning more about it every day. Instructional research has consistently supported that interactivity is the most important component of instruction regardless of delivery method. We have a very interactive environment and that’s great for retention and transfer of learning to real world application.”</em></p></blockquote>\n<p>Victoria’s passion for intelligent learning systems dates back to her time in school. “When I was a poor graduate student at the University of Georgia, I paid around $25 a month in overdue fees to the library so I could keep the AI books I checked out longer. (Once they were turned in, professors usually got them and could keep them up to a year.) There were only about 25 books on that topic at the time. Today, it is remarkable to see what our AI team can do with Athena.”</p>\n<h2>Why persistent cyber training matters</h2>\n<p>The cyber world is changing very fast. People need to learn constantly to keep up with their job requirements. Cyber challenges are not about cookie cutter solutions. It’s important that the cyber operator learns cyber problem solving, not just cyber solutions. <strong>By jumping into a training program and being able to craft different approaches to solving problems and test those approaches, the cyber professional can learn skills that directly help them do better on the job. Plus – a big plus – the training is fun!</strong></p>\n","title":"Living Our Mission: Learning is Built into Project Ares, Thanks to Victoria Bowen, Instructional Designer at Circadence"}},{"node":{"id":"d9177db7-0480-5493-827e-217d30e45562","slug":"living-our-mission-creating-authentic-cyber-training-and-learning-environments-inspired-by-real-world-experience-todd-humes-sr-mission-designer","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/freestocks-org-540554-unsplash.jpg"},"date":"2019-08-19T15:32:11.000Z","content":"<p><span data-contrast=\"auto\">Bringing his Air Force and military security engineering background to use, Senior Mission Designer Todd Humes understands what it takes to defend networks from adversaries. Prior to Circadence, he served in various government security roles including as a Systems Security Engineer and Systems Administrator and on the commercial side as a Director of Network Defense Operations at </span><span data-contrast=\"auto\">a Managed Security Service Provider</span><span data-contrast=\"auto\">. He noticed a gap in commercial cyber training and readiness that eventually lead him to Circadence. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">In his current role, Todd ensures that real-world training exercises developed meet critical training objectives and are authentic for the end-user. “We want to provide a safe place for trainees to learn cyber…so he/she doesn’t have to worry about causing damage on actual networks when trying to build skills,” he says. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">It’s important trainees in Project Ares experience true-to-life cyber threat scenarios that they would in their actual workplace. </span></p>\n<blockquote><p><span data-contrast=\"auto\">In “mimicking a controlled environment that they would see” in the workplace, trainees gain “an experience that is highly relatable and allows for professional development,” Todd says. </span><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">When developing new missions Todd and his team examine market verticals and threats associated with those industries to identify unique scenarios that can be built out in a Project Ares mission. “We do our own research and threat intelligence targeting verticals, brainstorm specific scenarios and begin designing what the network environment should look like,” he says. The automation and orchestration of how the mission will unfold require a great deal of programming. Between building the mission components, the layout, and the services that will be “affected” in the exercise, Todd and his team bring cyber threats to life in the most authentic way possible. Sometimes, he adds, “we have to reverse engineer the malware [for example] to get the capability we want,” adding layers of complexity and back-end work to produce the final product. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">But the intricacies of building missions </span><span data-contrast=\"auto\">is</span><span data-contrast=\"auto\"> anything but dull. “It’s never boring! We’re always learning day in and day out and the people who are successful in this field are the individuals who continue to learn themselves,” Todd says.</span></p>\n<p><span data-contrast=\"auto\">To ensure missions stay relevant against today’s threats, Todd is always keeping a pulse on the latest research and vulnerabilities by studying online reports and attending cyber conferences and industry-related events to network with like-minded leaders. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">He believes by continuously learning about the industry, all professionals in this line of work and beyond can find new and better ways to address an exploit and stay one (or several) steps ahead of hackers. He considers cyber security one the few industries and specializations that </span><span data-contrast=\"auto\">requires persistent learning and skill building in order to “extend the life” of security across organizations and companies.  </span><span data-ccp-props=\"{}\"> </span></p>\n<h3><a href=\"https://www.circadence.com/blog/Project-Ares-Update-8089-2/\"><span data-contrast=\"none\">Learn Project Ares, including recent mission and battle room updates here</span></a><span data-contrast=\"auto\">.  </span><span data-ccp-props=\"{}\"> </span></h3>\n","title":"Living our Mission: Creating Authentic Cyber Training and Learning Environments Inspired by Real-World Experience: Todd Humes, Sr. Mission Designer"}},{"node":{"id":"f6173379-fb6d-58c5-bf70-9272a1581718","slug":"cyber-security-and-the-baby-boomer-gen-x-populations","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/08/image-20151029-15338-mctq40.jpg"},"date":"2019-08-13T14:59:19.000Z","content":"<p><span data-contrast=\"auto\">We all have someone in our lives who isn’t </span><span data-contrast=\"auto\">tech-savvy</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\"> They don’t know how </span><span data-contrast=\"auto\">to convert a word doc into a PDF, </span><span data-contrast=\"auto\">or they try to do a Google search on </span><span data-contrast=\"auto\">Facebook, or </span><span data-contrast=\"auto\">they seem to struggle with the ‘simple’ act of </span><span data-contrast=\"auto\">text</span><span data-contrast=\"auto\"> messaging</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">T</span><span data-contrast=\"auto\">hese</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">are </span><span data-contrast=\"auto\">not un</span><span data-contrast=\"auto\">common missteps </span><span data-contrast=\"auto\">when</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">using </span><span data-contrast=\"auto\">smart devices</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">for</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">people </span><span data-contrast=\"auto\">who didn’t grow up with </span><span data-contrast=\"auto\">Siri</span><span data-contrast=\"none\"> </span><span data-contrast=\"none\">®</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">(let alone the Internet!)</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">at their fingertips</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> While these mistakes seem harmless or even comical at times, there </span><span data-contrast=\"auto\">can be </span><span data-contrast=\"auto\">much more serious</span><span data-contrast=\"auto\"> cyber security</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">consequences</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">Baby </span><span data-contrast=\"auto\">B</span><span data-contrast=\"auto\">oomer and Generation X populations </span><span data-contrast=\"auto\">(born 1946-64 and 1965-76) </span><span data-contrast=\"auto\">are a </span><span data-contrast=\"auto\">growing </span><span data-contrast=\"auto\">target for scammers because they are a largely trustworthy population made up of financially </span><span data-contrast=\"auto\">successful</span><span data-contrast=\"auto\"> people</span><span data-contrast=\"auto\">. And some</span><span data-contrast=\"auto\"> of the oldest </span><span data-contrast=\"auto\">may have cognition and memory ailments.</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">The </span><a href=\"https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.2017.303821\"><span data-contrast=\"none\">American Journal of Public Health</span></a><span data-contrast=\"auto\"> estimates that about 5</span><span data-contrast=\"auto\">% </span><span data-contrast=\"auto\">of the </span><span data-contrast=\"auto\">Baby Boomer </span><span data-contrast=\"auto\">population, </span><span data-contrast=\"auto\">(about</span><span data-contrast=\"auto\"> 2 to 3 million people</span><span data-contrast=\"auto\">)</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">experience </span><span data-contrast=\"auto\">from some sort of scam every year. The </span><a href=\"https://www.fbi.gov/contact-us/field-offices/portland/news/press-releases/fbi-tech-tuesdaybuilding-a-digital-defense-against-elder-fraud\"><span data-contrast=\"none\">Federal Bureau of Investigation</span></a><span data-contrast=\"auto\"> cites that older adults lose more than 3 billion dollars a year to financial scams.</span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">Some of the most common form</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\"> of cyber threats that </span><span data-contrast=\"auto\">vulnerable</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">Baby Boomers </span><span data-contrast=\"auto\">can </span><span data-contrast=\"auto\">fall victim to are </span><span data-contrast=\"auto\">impersonation </span><span data-contrast=\"auto\">scams, or fraud. This is a kind of deception involving trickery and deceit that leads unsuspecting victims to give money, property, or personal information</span><span data-contrast=\"auto\"> in exchange for something they perceive as valuable or worth protecting</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">According to </span><a href=\"https://www.scamwatch.gov.au/about-scamwatch/scam-statistics\"><span data-contrast=\"none\">Scam Watch</span></a><span data-contrast=\"auto\">, in 2019</span><span data-contrast=\"auto\"> so far</span><span data-contrast=\"auto\"> 10,297 scams have been reported in the 55-64 age range, and 13,323 scams have been reported in those 65 and older. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">Here are some of the top types of scams used</span><span data-contrast=\"auto\"> against this population</span><span data-contrast=\"auto\">:</span><span data-ccp-props=\"{}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Medicare, health insurance, and pharmacy </span></b><b><span data-contrast=\"auto\">scams</span></b><span data-contrast=\"auto\"> in which p</span><span data-contrast=\"auto\">erpetrators may pose as a Medicare representative or provide bogus healthcare services for </span><span data-contrast=\"auto\">patients</span><span data-contrast=\"auto\"> in order to gain access to their personal information.</span><span data-contrast=\"auto\"> They may also be persuaded to buy unsafe or fake prescription medication that may harm their health.</span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Sweepstakes and lottery</span></b><b><span data-contrast=\"auto\"> fraud</span></b><span data-contrast=\"auto\"> occur when an advertisement pops up saying you’re the lucky winner in a random website sweepstakes. This is a ploy to get people to enter their personal information, including address and credit card number</span><span data-contrast=\"auto\"> in order to “claim a prize” or win money</span><span data-contrast=\"auto\">.</span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Sweetheart scams</span></b><span data-contrast=\"auto\"> seem unu</span><span data-contrast=\"auto\">su</span><span data-contrast=\"auto\">ally cruel. With a majority of the </span><span data-contrast=\"auto\">Baby Boomer </span><span data-contrast=\"auto\">population dealing with the death of a loved one or </span><span data-contrast=\"auto\">children leaving home, </span><span data-contrast=\"auto\">maybe living alone for the first time, </span><span data-contrast=\"auto\">loneliness can creep in. Scammers in these scenarios pretend to be a love interest of the victim and eventually ask for money to help support them.</span><span data-ccp-props=\"{&quot;134233279&quot;:true}\"> </span></li>\n</ul>\n<p><span data-contrast=\"auto\">The good news is that we can</span><span data-contrast=\"auto\"> help </span><span data-contrast=\"auto\">the most vulnerable in this </span><span data-contrast=\"auto\">population </span><span data-contrast=\"auto\">avoid falling victim to a scam</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">We can have </span><span data-contrast=\"auto\">conversations to stimulate awareness of online</span><span data-contrast=\"auto\"> and phone</span><span data-contrast=\"auto\"> safety practices</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> make</span><span data-contrast=\"auto\"> frequent visits and </span><span data-contrast=\"auto\">facilitate </span><span data-contrast=\"auto\">discussions about monthly bills and medications, and destigmatizing fear or </span><span data-contrast=\"auto\">embarrass</span><span data-contrast=\"auto\">ment</span><span data-contrast=\"auto\"> to come forward if </span><span data-contrast=\"auto\">they </span><span data-contrast=\"auto\">find </span><span data-contrast=\"auto\">they </span><span data-contrast=\"auto\">have been taken advantage of</span><span data-contrast=\"auto\"> (</span><span data-contrast=\"auto\">waiting to rectify the situation could only make things worse</span><span data-contrast=\"auto\">)</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> You can report scams to a number of organizations, including the FBI, Social Security Administration, Federal Trade Commission, </span><span data-contrast=\"auto\">or</span><span data-contrast=\"auto\"> your bank or retirement facility.</span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">Don’t wait until it’s too late, have important conversations with loved ones </span><span data-contrast=\"auto\">of all ages </span><span data-contrast=\"auto\">and ensure they feel empowered to make smart decisions online.</span><span data-ccp-props=\"{}\"> </span></p>\n<p>Photo by Kaitlyn Baker on Unsplash <a href=\"https://unsplash.com/@kaitlynbaker?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">https://unsplash.com/@kaitlynbaker?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText </a></p>\n","title":"Cyber Security and the Baby Boomer, Gen X Populations"}},{"node":{"id":"9fa51229-e6d1-5ad0-958a-41180d006254","slug":"deepfake-the-deeply-disturbing-implications-behind-this-new-technology","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/08/ciaran-o-brien-qegMLAiTBA4-unsplash-2.jpg"},"date":"2019-08-05T15:33:21.000Z","content":"<p><a href=\"https://whatis.techtarget.com/definition/deepfake\">DeepFake</a> is a term you may have heard lately. The term is a combination of “deep learning” and “fake news”. Deep learning is a class of machine learning algorithms that impact image processing, and fake news is just that – deliberate misinformation spread through news outlets or social media. Essentially, DeepFake is a process by which anyone can create audio and/or video of real people saying and doing things they never said or did. One can imagine immediately why this is a cause for concern from a security perspective.</p>\n<p><a href=\"https://www.youtube.com/watch?v=gLoI9hAX9dw\">DeepFake technology</a> is still in its infancy and can be easily detected by the untrained eye. Things like glitches in the software, current technical limitations, and the need for a large collection of shots of other’s likeness from multiple angles in order to create fake facial models can make this a difficult space for hackers to master. While not a security threat now, given how easy it is to spot manipulations, the possibility of flawless DeepFakes is on the horizon and, as such, yields insidious implications far worse than any hack or breach.</p>\n<p>The power to contort content in such a way yields a huge trust problem across multiple channels with varying types of individuals, communities, and organizations: politicians, media outlets, brands and consumers just to name a few. While the cyber industry focuses on the severity of unauthorized data access as the “problem,” hackers are shifting their attacks to now modify data while leaving it in place rather than holding it hostage or “stealing” it. One study from Sonatype, a provider of DevOps-native tools, predicts that, by 2020, <a href=\"https://www.sonatype.com/sonatype-2017-state-of-the-software-supply-chain-report-reveals\">50% of organizations </a>will have suffered damage caused by fraudulent data and software, while another  <a href=\"https://s3.eu-west-2.amazonaws.com/rep2018/2018-the-state-of-deepfakes.pdf\">report</a> by DeepTrace B.V, a company based in Amsterdam building technologies for fake video detection and analysis, states, “Expert opinion generally agrees that Deepfakes are likely to have a high profile, potentially catastrophic impact on key events or individuals in the period 2019-2020.”</p>\n<p>What do hackers have to gain from manipulated data?</p>\n<ul>\n<li><strong>Political motivation</strong> – From propaganda by foreign governments to reports coming from an event and being altered before they reach their destination, there are many ways this technology can impact public perception and politics across the globe. In fact, a quote from Katja Bego, Senior Researcher at Nesta says, “2019 will be the year that a malicious ‘deepfake’ video sparks a geopolitical incident. We predict that within the next 12 months, the world will see the release of a highly authentic looking malicious fake video which could cause substantial damage to diplomatic relations between countries.” Bego was right about Deepfake being introduced to the market this year, so we will see how it develops in the near future.</li>\n</ul>\n<p>&nbsp;</p>\n<ul>\n<li><strong>Individual impacts</strong> –It’s frightening to think that someone who understands this technology enough could make a person do or say almost anything if convinced enough. These kinds of videos if persuasive enough, have far reaching impacts on individuals, such as relationships, jobs, or even personal finances. If anyone can essentially “be you” through audio or video, the possibilities of what a hacker could do are nearly limitless.</li>\n</ul>\n<p>&nbsp;</p>\n<ul>\n<li><strong>Business tampering</strong> – While fraud and data breaches are by no means a new threat in the business and financial sectors, Deepfakes will provide an unprecedented means of impersonating individuals. This will contribute to fraud in traditionally “secure” contexts, such as video conferencing and phone calls. From a synthesized voice of a CEO requesting fund transfers, to a fake client video requesting sensitive details on a project, these kinds of video and audio clips open a whole new realm of fraud that businesses need to watch out for.</li>\n</ul>\n<p>While the ramifications of these kinds of audio and video clips seem disturbing, DeepFake technology can be used for good. New forms of communication are cropping up, like smart speakers that can <a href=\"https://www.youtube.com/watch?v=AgHghcYqeto&amp;source=post_page---------------------------\">talk like our favorite artists</a>, or having our <a href=\"https://www.forbes.com/sites/bernardmarr/2019/05/06/artificial-intelligence-can-now-copy-your-voice-what-does-that-mean-for-humans/?source=post_page---------------------------#2e7639c72a2a\">own virtual selves</a> representing us when we’re out of office. Most recently, the Dalí Museum in Florida leveraged this technology to create a <a href=\"https://www.youtube.com/watch?v=BIDaxl4xqJ4&amp;source=post_page---------------------------\">lifelike version of the Spanish artist himself</a> where visitors could interact with him. These instances show us that DeepFake is a crucial building block in creating humanlike AI characters, advancing, robotics, and widening communication channels around the world.</p>\n<p>In order to see the benefits and stay safe from the threats, it is no longer going to be enough to ensure your security software is up to date or to create strong passwords. Companies must be able to continuously validate the authenticity of their data, and software developers must look more deeply into the systems and processes that store and exchange data. Humans continue to be the beginning and ending lines of defense in the cyber-scape, and while hackers create DeepFakes, the human element of cyber security reminds us that just as easily as we can use this technology for wrongdoing, we have the power to use it to create wonderful things as well.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\"><em>Photo by <a href=\"https://unsplash.com/@vipul_uthaiah?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">vipul uthaiah</a> on <a href=\"https://unsplash.com/search/photos/cyber-security?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></em></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"DeepFake: The Deeply Disturbing Implications Behind This New Technology"}},{"node":{"id":"9b4cc89d-457c-5758-a5f2-b622d15e454a","slug":"when-cyber-security-meets-machine-learning","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/07/coaching-coders-coding-7374.jpg"},"date":"2019-07-30T08:45:06.000Z","content":"<p>What happens when cyber security and machine learning work together? The results are pretty positive. Many technologies are leveraging machine learning in cyber security functions nowadays in order to automate and augment their cyber workforce. How? Most recently in training and skill building.</p>\n<p>Machine learning helps emulate human cognition (e.g. learning based on experiences and patterns rather than inference) so autonomous agents in a cyber security system for instance, can “teach themselves” how to build models for pattern recognition—while engaging with real human cyber professionals.</p>\n<h2><strong>Machine learning as a training support system</strong></h2>\n<p>Machine learning becomes particularly valuable in cyber security training for professionals when it can support human activities like malware detection, incident response, network analysis, and more. One way machine learning shows up is in our gamified cyber learning platform <a href=\"https://www.circadence.com/products/project-ares/\">Project Ares</a>, under our AI-advisor “Athena” who generates responses to player’s queries when they get stuck on an activity and/or need hints to progress through a problem.</p>\n<p>Athena generates a response from its learning corpus, using machine learning to aggregate and correlate all player conversations it has, while integrating knowledge about each player in the platform to recommend the most efficient path to solving a problem. It’s like modeling the “two heads are better than one” saying, but with a lot more “heads” at play.</p>\n<h2><strong>Machine learning as an autonomous adversary</strong></h2>\n<p>Likewise, machine learning models provide a general mechanism for organization-tailored obscuring of malicious intent during professional training—enabling adversaries to disguise their network traffic or on-system behavior to look more typical to evade detection. Machine learning’s ability to continually model and adapt enables the technology to persist undetected for longer (if it is acting as an autonomous agent against a trainee in our platform). This act challenges the trainee in the platform in a good way, so they begin to think like an adversary and understand their response to defensive behavior.</p>\n<h2><strong>Machine learning supports cyber skills building</strong></h2>\n<p>Companies like Uber use machine learning to understand the various routes a driver takes to transport people from point A to point B. It uses data collected to recommend the most efficient route to its destination.</p>\n<blockquote><p><strong>It increases the learning potential for professionals looking to hone their cyber skills and competencies using machine learning. </strong></p></blockquote>\n<p>Now imagine that concept applied to cyber training in a way that can both help cyber pros through cyber activities while also activating a trainee’s cognitive functions in ways we previously could not with traditional, off-site courses.</p>\n<p>Machine learning abilities can analyze user behavior for both fraud detection and malicious network activity. It can aggregate and enrich data from multiple sources, act as virtual assistants with specialized knowledge, and augment cyber operators&#8217; daily tasks. It’s powerful stuff!</p>\n<h3><a href=\"https://marketing.circadence.com/acton/fs/blocks/showLandingPage/a/36273/p/p-00a5/t/page/fm/0\"><strong>To learn more about machine learning and AI in cyber training, download our white paper “Upskilling Cyber Teams with Artificial Intelligence and Gamified Learning.”</strong></a></h3>\n<p><span style=\"font-size: 10pt;\">Photo by <strong><a href=\"https://www.pexels.com/@startup-stock-photos?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\">Startup Stock Photos </a></strong>from <strong><a href=\"https://www.pexels.com/photo/working-woman-technology-computer-7374/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\">Pexels</a></strong></span></p>\n","title":"When cyber security meets machine learning"}},{"node":{"id":"400d0da1-f533-586a-a19f-2bfc6d5d0737","slug":"how-cyber-security-can-be-improved","status":"publish","template":"","format":"standard","featured_media":null,"date":"2019-07-22T16:50:05.000Z","content":"<p>Every day we get more interconnected and that naturally widens the threat surface for cybercriminals. In order to protect vulnerabilities and keep pace with hacker methods, security – and non-security professionals must understand how to protect themselves (and their companies). And that involves looking for new ways to improve cyber security. To start, we believe cyber security can be improved by focusing on three areas: enterprise-wide cyber awareness programs, within cyber teams via persistent training, and in communication between the C-suite and the CISO. Check out our recommendations below and if you have a strategy that worked to improve cyber security in your company or organization, <a href=\"https://www.circadence.com/contact-us/\">we’d love to hear about it</a>.</p>\n<h2><strong>Company-Wide Security Awareness Programs</strong></h2>\n<p>Regardless of company size or budget, every person employed at a business should understand fundamental cyber concepts so they can protect themselves from malicious hackers. Failure to do so places the employee and the company at risk of being attacked and could result in significant monetary and reputation damages.</p>\n<p>Simple knowledge of what a phishing email looks like, what an unsecured website looks like, and implications of sharing personal information on social media are all topics that can be addressed in a company-wide security program. Further, staff should understand how hackers work and what kinds of tactics they use to get information on a victim to exploit. Reports vary but a most recent article from ThreatPost notes that <a href=\"https://threatpost.com/threatlist-phishing-attacks-doubled-in-2018/142732/\">phishing attempts have doubled in 2018</a> with new scams on the rise every day.</p>\n<p>But where and how should companies start building a security awareness program—not to mention a program that staff will actually take seriously and participate in?</p>\n<blockquote><p>We believe in the power of gamified learning to engage employees in cyber security best practices.</p></blockquote>\n<p>Our mobile app <a href=\"https://www.circadence.com/products/inCyt\">inCyt</a> helps novice and non-technical professionals learn the ins and outs of cyber security from hacking methods to understanding cyber definitions. The game allows employees to play against one another in a healthy, yet competitive, manner. Players have digital “hackables” they have to protect in the game while trying to steal other player’s assets for vulnerabilities to exploit. The back and forth game play teaches learners <em>how</em> and <em>why</em> attacks occur in the first place and where vulnerabilities exist on a variety of digital networks.</p>\n<p>By making the learning fun, it shifts the preconceived attitude of “have to do” to “want to do.” When an employee learns the fundamentals of cyber security not only are they empowering themselves to protect their own data, which translates into improved personal data cyber hygiene, but it also adds value for them as professionals. Companies are more confident when employees work with vigilance and security at the forefront.</p>\n<h2><strong>Benefits of company-wide security awareness training </strong></h2>\n<ul>\n<li><strong>Lowers risk</strong> – Prevents an internal employee cyber mishap with proper education and training to inform daily activities.</li>\n<li><strong>Strengthens workforce</strong> – Existing security protocols are hardened to keep the entire staff aware of daily vulnerabilities and prevention.</li>\n<li><strong>Improved practices</strong> – Cultivate good cyber hygiene by growing cyber aptitude in a safe, virtual environment, instead of trial and error on workplace networks.</li>\n</ul>\n<h3><strong><a href=\"https://www.circadence.com/products/inCyt\">For more information about company-wide cyber learning, read about our award-winning mobile app inCyt.</a> </strong></h3>\n<h2><strong>Persistent (Not Periodic) Cyber Training</strong></h2>\n<p>For cyber security professionals like network analysts, IT directors, CISOs, and incident responders, knowledge of the latest hacker methods and ways to protect and defend, govern, and mitigate threats is key. Today’s periodic training conducted at off-site training courses has and continues to be the option of choice—but the financial costs and time away from the frontlines makes it a less-than-fruitful ROI for leaders looking to harden their posture productively and efficiently.</p>\n<p>Further, periodic cyber security training classes are often dull, static, PowerPoint-driven or prescriptive, step-by-step instructor-driven—meaning the material is often too outdates to be relevant to today’s threats—and the learning is passive. There’s minimal opportunity for hands-on learning to apply learned concepts in a virtualized, safe setting. These roadblocks make periodic learning ineffective and unfortunately companies are spending thousands of dollars every quarter or month to upskill professionals without knowing if it’s money well spent. That’s frustrating!</p>\n<blockquote><p>What if companies could track cyber team performance to identify gaps in security skills—and do so on emulated networks to enrich the learning experience?</p></blockquote>\n<p>We believe persistent training on a <a href=\"https://www.circadence.com/solutions/topic/cyber-ranges/\">cyber range</a> is the modern response for companies to better align with today’s evolving threats. Cyber ranges allow cyber teams to engage in skill building in a “safe” environment. Sophisticated ranges should be able to scale as companies grow in security posture too. Our <a href=\"https://www.circadence.com/products/project-ares/\">Project Ares</a> cyber learning platform helps professionals develop frontier learning capabilities on mirrored networks for a more authentic training experience. Running on Microsoft Azure, enterprise, government and academic IT teams can persistently training on their own networks safely using their own tools to “train as they would fight.”</p>\n<p>Browser-based, Project Ares also allows professionals to train on their terms – wherever they are. Artificial intelligence via natural language processing and machine learning support players on the platform by acting as both automated adversaries to challenge trainees in skill, and as an in-game advisor to support trainee progression through a cyber exercise.</p>\n<p>The gamified element of cyber training keeps professionals engaged while building skill. Digital badges, leaderboards, levels, and team-based mission scenarios build communicative skills, technical skills, and increase information retention in this active-learning model of training.</p>\n<h2><strong>Benefits of persistent cyber training </strong></h2>\n<p>Gamifying cyber training is the next evolution of learning for professionals who are either already in the field or curious to <a href=\"https://www.circadence.com/blog/how-to-launch-a-cyber-security-career/\">start a career in cyber security</a>. The benefits are noteworthy:</p>\n<ul>\n<li>Increased engagement, sense of control and self-efficacy</li>\n<li>Adoption of new initiatives</li>\n<li>Increased satisfaction with internal communication</li>\n<li>Development of personal and organizational capabilities and resources</li>\n<li>Increased personal satisfaction and employee retention</li>\n<li>Enhanced productivity, monitoring and decision making</li>\n</ul>\n<h3><a href=\"https://www.circadence.com/products/project-ares/\"><strong>For more information about gamified cyber training, read about our award-winning platform Project Ares</strong></a><strong>. </strong></h3>\n<h2><strong>CISO Involvement in C-Suite Decision-Making </strong></h2>\n<p>Communication processes between the C-suite and CISO need to be more transparent and frequent to achieve better alignment between cyber risk and business risk.</p>\n<p>Many CISOs are currently challenged in reporting to the C-suite because of the very technical nature and reputation of cyber security. It’s often perceived as “too technical” for laymen, non-cyber professionals. However, it doesn’t have to be that way.</p>\n<p>C-suite execs can understand their business’ cyber risks in the context of business risk to see how the two are inter-related and impact each other.</p>\n<p>A CISO is typically concerned about the security of the business as a whole and if a breach occurs at the sake of a new product launch, service addition, or employee productivity, it’s his or her reputation on the line.</p>\n<p>The CISO perspective is, if ever a company is deploying a new product or service, security should be involved from the get-go. Having CISOs brought into discussions about business initiatives early on is key to ensuring there are not security “add ons” brought in too late in the game. Also, actualizing the cost of a breach on the company in terms of dollar amounts can also capture the attention of the C-suite.</p>\n<p>Furthermore, CISOs are measuring risk severity and breaking it down for the C-suite to help them understand the business value of cyber.  To achieve this alignment, CISOs are finding unique ways to do remediation or cyber security monitoring to reduce their workloads enough so they can prioritize communications with execs and keep all facets of the company safe from the employees it employs to the technologies it adopts to function.</p>\n<h2><strong>Improving Cyber Security for the Future </strong></h2>\n<p>Better communications between execs and security leaders, continual cyber training for teams, and company-wide cyber learning are a few suggestions we’ve talked about today to help companies reduce their cyber risk and harden their posture. We’ve said it before and we will say it again: cyber security is everyone’s responsibility. And evolving threats in the age of digital transformation mean that we are always susceptible to attacks regardless of how many firewalls we put up or encryption codes we embed.</p>\n<p>If we have a computer, a phone, an electronic device that can exchange information in some way to other parties, we are vulnerable to cyber attacks. Every bit and byte of information exchanged on a company network is up for grabs for hackers and the more technical, business, and non-technical professionals come together to educate and empower themselves to improve cyber hygiene practices, the more prepared they and their company assets will be when a hacker comes knocking on their digital door.</p>\n<p>Photo of computer by <strong><a href=\"https://www.pexels.com/@rawpixel?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\">rawpixel.com </a></strong>from <strong><a href=\"https://www.pexels.com/photo/woman-s-hand-on-laptop-1799342/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\">Pexels</a>. </strong></p>\n","title":"How Cyber Security Can Be Improved"}},{"node":{"id":"f3d25848-4d7e-51d8-a564-725f3c5a4810","slug":"living-our-mission-blog-series-3-new-learning-curriculum-in-project-ares-3-6-4","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/07/M6_D.png"},"date":"2019-07-08T22:20:13.000Z","content":"<p><span style=\"color: #000000;\">We’ve made several new updates to our gamified cyber learning platform Project Ares. We are releasing new battle room and mission cyber security exercises for professionals to continue training and honing skills and competency and have optimized some aspects of performance to make the learning experience smoother.</span></p>\n<h2><span style=\"color: #000000;\"><strong>New Missions and Battle Rooms</strong></span></h2>\n<p><span style=\"color: #000000;\">To ensure professionals have access to the latest threats to train against, we develop new missions and battle rooms for our users so they can continually learn new cyber security skills, both technical and professional. The following new missions are available to users of the Professional and Enterprise licenses of Project Ares; while the new battle rooms updates are available to users of the Academy, Professional, and Enterprise licenses of Project Ares.</span></p>\n<h2><span style=\"color: #000000;\"><strong>Mission 5 – Operation Wounded Bear </strong></span></h2>\n<p><span style=\"color: #000000;\">Designed to feature cyber security protection for <strong>financial institutions</strong>, the learning objectives for this mission are to identify and remove malware responsible for identity theft and protect the network from further infections. Variability in play within the mission includes method of exfiltration, malicious DNS and IP addresses, infected machines, data collection with file share uploads that vary, method of payload and persistence, and a mix of Windows and Linux.</span></p>\n<p><span style=\"color: #000000;\">This mission provides practical application of the following skill sets:</span></p>\n<ul>\n<li><span style=\"color: #000000;\">Computer languages</span></li>\n<li><span style=\"color: #000000;\">Computer network defense</span></li>\n<li><span style=\"color: #000000;\">Information systems</span></li>\n<li><span style=\"color: #000000;\">Information security</span></li>\n<li><span style=\"color: #000000;\">Command line interface</span></li>\n<li><span style=\"color: #000000;\">Cyber defense analysis</span></li>\n<li><span style=\"color: #000000;\">Network and O/S hardening techniques</span></li>\n<li><span style=\"color: #000000;\">Signature development, implementation and impact</span></li>\n<li><span style=\"color: #000000;\">Incident response</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><u>Mission Objectives: </u></span></p>\n<ol>\n<li><span style=\"color: #000000;\">Use IDS/IPS to alert on initial malware infection vectors</span></li>\n<li><span style=\"color: #000000;\">Alert/prevent download of malicious executables</span></li>\n<li><span style=\"color: #000000;\">Create alert for infections</span></li>\n<li><span style=\"color: #000000;\">Kill malware processes and remove malware from the initially infected machine</span></li>\n<li><span style=\"color: #000000;\">Kill other instances of malware processes and remove from machines</span></li>\n<li><span style=\"color: #000000;\">Prevent further infection</span></li>\n</ol>\n<h2><span style=\"color: #000000;\"><strong>Mission 6 – Operation Angry Tiger </strong></span></h2>\n<p><span style=\"color: #000000;\">Using threat vectors similar to the Saudi Arabia Aramco and Doha RasGas cyber attacks, this mission is about responding to <strong>phishing and exfiltration attacks</strong>.  Cyber defenders conduct a risk assessment of a company’s existing network structure and its cyber risk posture for possible phishing attacks. Tasks include reviewing all detectable weaknesses to ensure no malicious activity is occurring on the network currently. Variability in play within the mission includes the method of phishing in email and payload injection, the alert generated, the persistence location and lateral movement specifics, and the malicious DNS and IP addresses.</span></p>\n<p><span style=\"color: #000000;\"><u>Core competencies used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\">Incident response team processes</span></li>\n<li><span style=\"color: #000000;\">Windows and *nix systems administration (Active Directory, Group Policy, Email)</span></li>\n<li><span style=\"color: #000000;\">Network monitoring (Snort, Bro, Sguil)</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><u>Mission Objectives: </u></span></p>\n<ol>\n<li><span style=\"color: #000000;\">Verify network monitoring tools are functioning</span></li>\n<li><span style=\"color: #000000;\">Examine current email policies for risk</span></li>\n<li><span style=\"color: #000000;\">Examine domain group/user policies for risk</span></li>\n<li><span style=\"color: #000000;\">Verify indicator of compromise (IOC)</span></li>\n<li><span style=\"color: #000000;\">Find and kill malicious process</span></li>\n<li><span style=\"color: #000000;\">Remove all artifacts of infection</span></li>\n<li><span style=\"color: #000000;\">Stop exfiltration of corporate data</span></li>\n</ol>\n<h2><span style=\"color: #000000;\"><strong>Mission 13 – Operation Black Dragon </strong></span></h2>\n<p><span style=\"color: #000000;\">Defending the<strong> power grid </strong>is a prevailing concern today and Mission 13 focuses on cyber security techniques for <strong>Industry Control Systems and Supervisory Control and Data Acquisition systems (ICS/SCADA)</strong>.  Players conduct a cyber defense assessment mission on a power distribution plant. The end state of the assessment will be a defensible power grid with local defender ability to detect attempts to compromise the grid as well as the ability to attribute any attacks and respond accordingly.</span></p>\n<p><span style=\"color: #000000;\"><u>Core competencies used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\"> Risk Management</span></li>\n<li><span style=\"color: #000000;\">Incident Response Management</span></li>\n<li><span style=\"color: #000000;\">Information Systems and Network Security</span></li>\n<li><span style=\"color: #000000;\">Vulnerability Assessment</span></li>\n<li><span style=\"color: #000000;\">Hacking Methodologies</span></li>\n</ul>\n<p><span style=\"color: #000000;\">Mission Objectives:</span></p>\n<ol>\n<li><span style=\"color: #000000;\">Evaluate risks to the plant</span></li>\n<li><span style=\"color: #000000;\">Determine if there are any indicators of compromise to the network</span></li>\n<li><span style=\"color: #000000;\">Improve monitoring of network behavior</span></li>\n<li><span style=\"color: #000000;\">Mitigate an attack if necessary</span></li>\n</ol>\n<h2><span style=\"color: #000000;\"><strong>Battle Room 8 – </strong><strong>Network Analysis Using Packet Capture (PCAP)</strong></span></h2>\n<p><span style=\"color: #000000;\">Battle Room 8 delivers new exercises to teach network forensic investigation skills via analysis of a PCAP. Analyze the file to answer objectives related to topics such as origins of C2 traffic, identification of credentials in the clear, sensitive document exfiltration, and database activity using a Kali image with multiple network analysis tools installed.</span></p>\n<p><span style=\"color: #000000;\"><u>Core competencies used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\">Intrusion Detection Basics</span></li>\n<li><span style=\"color: #000000;\">Packet Capture Analysis</span></li>\n</ul>\n<h2><span style=\"color: #000000;\"><strong>Battle Room 10 – </strong><strong>Scripting Fundamentals </strong></span></h2>\n<p><span style=\"color: #000000;\">Scripting is a <em>critical</em> cyber security operator skillset for any team. Previously announced and now available, Battle Room 10 is the first Project Ares exercise focus on this key skill.  The player conducts a series of regimented tasks using the Python language in order to become more familiar with fundamental programming concepts. This battle room is geared towards players looking to develop basic programming and scripting skills, such as:</span></p>\n<ul>\n<li><span style=\"color: #000000;\">Functions</span></li>\n<li><span style=\"color: #000000;\">Classes and Objects</span></li>\n<li><span style=\"color: #000000;\">File Manipulation</span></li>\n<li><span style=\"color: #000000;\">Exception Handling</span></li>\n<li><span style=\"color: #000000;\">User Input</span></li>\n<li><span style=\"color: #000000;\">Data Structures</span></li>\n<li><span style=\"color: #000000;\">Conditional Statements</span></li>\n<li><span style=\"color: #000000;\">Loops</span></li>\n<li><span style=\"color: #000000;\">Variables</span></li>\n<li><span style=\"color: #000000;\">Numbers &amp; Operators</span></li>\n<li><span style=\"color: #000000;\">Casting</span></li>\n<li><span style=\"color: #000000;\">String Manipulation</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><u>Core competency used in the mission: </u></span></p>\n<ul>\n<li><span style=\"color: #000000;\">Basic knowledge of programming concepts</span></li>\n</ul>\n<p><span style=\"color: #000000;\"><strong>Game client performance optimizations </strong></span></p>\n<p><span style=\"color: #000000;\">We made several adjustments to improve the performance of Project Ares and ensure a smooth player experience throughout the platform.</span></p>\n<ul>\n<li><span style=\"color: #000000;\">The application size has been reduced by optimizing the texture, font, and 3D assets. This will improve the load time for the game client application.</span></li>\n<li><span style=\"color: #000000;\">3D assets were optimized to minimize CPU and GPU loads to make the game client run smoother; especially on lower performance computers.</span></li>\n<li><span style=\"color: #000000;\">The game client frame rate can now be capped to a lower rate (i.e. 15fps) to lower CPU utilization for very resource constrained client computers.</span></li>\n</ul>\n<h3><span style=\"color: #000000;\">These features are part of the Project Ares version 3.6.4 on the Azure cloud which is available now. Similar updates in Project Ares version 3.6.5 for vCenter servers will be available shortly.</span></h3>\n<p>&nbsp;</p>\n","title":"Living our Mission Blog Series #3: New Learning Curriculum in Project Ares 3.6.4"}},{"node":{"id":"c06cc42c-1567-5c0e-af1e-a1f7a4c14b97","slug":"targeted-cybercrime-on-the-rise","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/bill-oxford-udXD2NrbXS8-unsplash.jpg"},"date":"2019-07-08T08:45:40.000Z","content":"<p>Targeted attacks against particular groups or entities are on the rise this year. Instead of a “spray and pray” approach, malicious hackers are getting particular about <em>who and what</em> they attack and <em>how</em> for maximum accuracy. Why? The right ransomware attack on the right data set to the right group of people can yield more monetary gain than an attack towards a general group of people at varying companies. To empower ourselves, we need to understand how cybercrime is “getting personal” and what we can do to prevent attacks like this.</p>\n<p>Cybercriminals want to stay under the radar, so the more their attacks remain hidden from the public eye, the better chance they have to replicate that method on other vulnerable groups with lots to lose. Unauthorized adversaries target certain devices, computer systems, and groups of professionals most vulnerable to cybercrime.</p>\n<h2><strong>Server hacking for faster monetary gain</strong></h2>\n<p>Attacks on endpoint devices like computers and laptops are a thing of the past for evolving hackers who know that unsecured enterprise servers offer the best chances of staying undercover than device firewalls allow. Why get pennies and minimal personal information from a single laptop user when you can get millions from a few locked up servers that house incredibly sensitive data like billing information and credit cards?</p>\n<p>The City of Baltimore experienced this firsthand with a <a href=\"https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-ransomware-sewer-bills-20190617-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware attack</a> that affected 14,000 customers with unverified sewer charges. Hackers demanded $76,000 in bitcoin to unlock city service computers, which impacted the delivery of water bills to local residents. While many residents might not mind skipping a payment, in the long run it’ll cause “surprise” bills when back-pay is requested.</p>\n<p>Recently, <a href=\"https://www.nytimes.com/2019/06/19/us/florida-riviera-beach-hacking-ransom.html\" target=\"_blank\" rel=\"noopener noreferrer\">Rivera Beach in Florida</a> was one of the latest government entities to be crippled by a ransomware attack, and unfortunately, they paid almost $600,000 to hackers to regain access to their data.</p>\n<p>But it’s more than a local city and state governments that are being attacked at this scale.</p>\n<h2><strong>Multi-mass hacking for political disruption</strong></h2>\n<p>Devices that are used by the masses are also at risk. Think about voting machines. Hacking into those machines has never been easier due to old devices and lack of security on them. To ensure the integrity of data, governments can consider using blockchain to maintain a more hardened security structure all the while, educating their election security professionals on the latest hacking methods so they can assess vulnerabilities on physical systems. The end result of voting machine hacking isn’t monetary per se—it’s much better—pure, unbridled political chaos and public distrust in <a href=\"https://www.circadence.com/blog/3-ways-prevent-cyber-security-election-interference/\" target=\"_blank\" rel=\"noopener noreferrer\">election security</a> and government operations.</p>\n<h2><strong>Car-jacking to car hacking</strong></h2>\n<p>Modern transportation system and vehicle attacks are on the rise too. Today’s cars are basically computers on wheels with the levels of code embedded within them. Hackers have been known to target cars to control key functions like brakes, steering and entertainment consoles to jeopardize the people in the car, as well as everyone around them on the road. In an interview with Ang Cui, CEO of Red Balloon Security, he notes “If you can disable a fleet of commercial trucks by infecting them with specialized vehicle ransomware or in some other way hijacking or crippling the key electronic control units in the vehicle, then the attacker could demand a hefty ransom.&#8221;</p>\n<p><a href=\"https://www.colorado.edu/program/tcp/laura-lee\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber security professor Laura Lee</a> notes, “The transportation sector is said to now be the third most vulnerable sector to cyber-attacks that may affect the seaport operations, air traffic control, and railways. The ubiquitous use of GPS information for positioning makes this sector especially concerned about resiliency.”</p>\n<h2><strong>Preventing targeted cybercrime </strong></h2>\n<p>In many of the incidences above and those not reported upon, humans are often the first and last line of defense for these companies and devices being attacked. Humans have the ability to detect vulnerabilities and gaps in security while also understanding what hackers are after when it comes to cybercrime tactics.</p>\n<p>Our ability to handle both technical and analytical aspects of hacking means more can be done proactively to prevent targeted cybercrime like this. Specifically, in the field of training cyber security professionals, government and commercial entities should evaluate current training efforts to ensure their teams are 100% prepared for targeted attacks like these. How hackers attack changes every day so a persistent, enduring method of training would be critical to helping empower and enable defenders to anticipate, identify, and mitigate threats coming their way.</p>\n<p>New cyber training approaches are using <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\" target=\"_blank\" rel=\"noopener noreferrer\">gamification</a> to complement and enhance existing traditional, off-site courses. Currently, many traditional courses are passively taught with PowerPoint presentations and prescriptive video learning, often disengaging trainees who want to learn new cyber concepts and skill sets (in addition to staying “fresh” on the cyber fundamentals).</p>\n<p>Government organizations and commercial enterprises would be smart to explore engaging ways to keep cyber team skills up to snuff while increasing skill retention rates during training.</p>\n<h3><a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\"><strong>More information on new ways to gamify cyber learning can be found </strong><strong>here</strong><strong>.</strong></a></h3>\n<p><span style=\"font-size: 10pt;\">Handcuffs: Photo by <a href=\"https://unsplash.com/@bill_oxford?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Bill Oxford</a> on <a href=\"https://unsplash.com/search/photos/cyber-crime?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\nKeyboard : Photo by <a href=\"https://unsplash.com/@taskinhoo?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Taskin Ashiq</a> on <a href=\"https://unsplash.com/search/photos/cybersecurity?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\n</span></p>\n","title":"Targeted Cybercrime on the Rise"}},{"node":{"id":"b32d602d-7e84-5b1d-a397-a4ac76c0df4a","slug":"good-bots-and-bad-bots-how-to-tell-the-difference-to-stay-cyber-safe","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/su-san-lee-1244964-unsplash.jpg"},"date":"2019-07-01T08:45:41.000Z","content":"<p>You may have heard or read the term “bot” in the context of cyber security. Normally we hear this word in the wake of a cyberattack and relate it to breaches in computer or network security. While there are certainly bad bots, there are good bots too! So what exactly is a bot, how can you differentiate, and how do they work?</p>\n<h2>What are bots?</h2>\n<p>The term bot is short for robot and is a type of software application created by a user (or hacker) that performs automated tasks on command. There are so many variations, from chatbots to spider bots to imposter bots. Good bots are able to assist in automating day to day activities, such as providing up to the minute information on weather, traffic, and news. They can also perform tasks like searching the web for plagiarized content and illegal uploads, producing progressively intelligent query results by scouring the internet content, or helping find the best purchase deals online.</p>\n<p>While we encounter bots like these in our everyday activities without really thinking about them, being aware of bad bots <em>is</em> important. Bad bots, used by adversaries, perform malicious tasks and allow an attacker to remotely take control over an infected computer. From there, hackers can infiltrate the network and create “zombie computers,” which can all be controlled at once to perform large-scale malicious acts. This is known as a “botnet”.</p>\n<h2>How do bots work?</h2>\n<p>Cybercriminals often use botnets to perform DoS and DDoS attacks (denial of service and distributed denial of service, respectively). These attacks flood target URLs with more requests than they can handle, making regular traffic on a web site almost impossible. Hackers use this as a way to extort money from companies that rely on their website’s accessibility for key business functions and can send out phishing e-mails to direct customers to a fake emergency site.</p>\n<h2>Protect yourself from bad bots</h2>\n<p>Don’t let this information scare you though! Awareness is a great first step to recognizing any potential harmful activity, whether on your own computer or on a site you visit online. Preventing bad bots from causing attacks before they start is easy with these tips:</p>\n<ul>\n<li>Ensure your antivirus software is up to date by setting it to automatically update.</li>\n<li>Routinely check the security options available to you for your iOS, web hosting platform, or internet service provider.</li>\n<li>Only click on links and open emails from trusted sources. Avoid accepting friend or connect requests, responding to messages, or clicking on links from unknown persons on social media.</li>\n</ul>\n<p>Bots can be incredibly helpful, and we use them every day. Knowing how to differentiate the good from the bad while taking the necessary precautions to protect yourself against malicious bots will ensure that you only need to deal with bots when they are telling you about blue skies or saving you money on that great shirt you’ve been wanting!</p>\n<p><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@blackodc?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Su San Lee</a> on <a href=\"https://unsplash.com/search/photos/network?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></p>\n","title":"Good Bots and Bad Bots: How to Tell the Difference to Stay Cyber Safe"}},{"node":{"id":"270c2144-5df7-55d5-bdd7-2b1af7330e62","slug":"ransomware-the-attack-du-jour","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/michael-geiger-JJPqavJBy_k-unsplash.jpg"},"date":"2019-06-25T19:50:43.000Z","content":"<p>Ransomware is gaining traction among hackers; emboldened by financial success and anonymity using cryptocurrencies. In fact, ransomware is now considered a tried and true cyberattack technique, with attacks spreading among small and medium-sized businesses, cities and county governments. Coveware’s recent <a href=\"https://www.coveware.com/blog/2019/4/15/ransom-amounts-rise-90-in-q1-as-ryuk-ransomware-increases\">2019 Q1 Ransomware Report</a> notes:</p>\n<ul>\n<li>Ransoms have increased by an average of 89% over Q1 in 2019 to $12,762 per ransom request</li>\n<li>Average downtime after a ransomware attack has increased to 7.3 days, up from 6.2 days in Q4 of 2018, with estimated downtime costs averaging $65,645</li>\n<li>Victim company size so far in 2019 is anywhere from 28 to 254 employees (small, medium, and large-sized businesses)</li>\n</ul>\n<p>Let’s review how ransomware works and why it’s so effective. Ransomware is a type of cyberattack where an unauthorized user gains access to an organization’s files or systems and blocks user access, holding the company’s data hostage until the victim pays a ransom in exchange for a decryption key. As you can surmise, the goal of such an attack is to extort businesses for financial gain.</p>\n<p>Ransomware can “get into” a system in different ways, one of the most common through phishing emails or social media where the human worker inadvertently opens a message, attachment, or link acting as a door to the network or system.  Messages that are urgent and appear to come from a supervisor, accounts payable professional, or perceived “friends” on social media are all likely ransomware actors disguising themselves to manipulate or socially engineer the human.</p>\n<h2><strong>Near and Far: Ransomware Has No Limits</strong></h2>\n<p>Many types of ransomware have affected small and medium-sized businesses over the last two decades but it shows no limitations in geography, frequency, type, or company target size.</p>\n<ul>\n<li><strong>Norwegian aluminum manufacturing company <a href=\"https://www.govtech.com/blogs/lohrmann-on-cybersecurity/ransomware-attacks-becoming-are-more-widespread-destructive-and-expensive.html\">Norsk Hydro</a></strong>, a significant provider of hydroelectric power in the Nordic region, was shut down because of a ransomware infection. The company’s aluminum plants were forced into manual operations and the costs are already projected to reach $40 million (and growing). The ransomware name: LockerGoga. It has crippled industrial firms across the globe from French engineering firm Altran, and manufacturing companies Momentive, and Hexion, according to <a href=\"https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/\">a report from Wired</a>.</li>\n<li>What was perceived as an unplanned system reboot at <strong>Maersk, a Danish shipping conglomerate</strong>, turned out to be a corrupt attack that impacted one-fifth of the entire world’s shipping capacity. Deemed the “<a href=\"https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/\">most devastating cyberattack in history</a>,” NotPetya created More than $10 billion in damages. To add insult to injury, the cyber risk <a href=\"https://www.nytimes.com/2019/04/15/technology/cyberinsurance-notpetya-attack.html\">insurance company for Maersk denied their claim</a> on the grounds that the NotPetya attack was a result of cyberwar (citing an act of war exclusionary clause).  WannaCry was also released in 2017 and generated between $4 billion and $8 billion in damages but nothing (yet) has come close to NotPetya.</li>\n<li>On Black Friday 2016, the <strong>San Francisco Municipal Transportation Agency</strong> fell victim to <a href=\"https://arstechnica.com/information-technology/2016/11/san-francisco-muni-hit-by-black-friday-ransomware-attack/\">a ransomware attack</a>. The attacker demanded $73,000 for services to be restored. Fortunately, speedy response and backup processes helped the company restore systems in 2 days—avoiding having to pay the ransom. In March 2018, the <a href=\"https://www.ajc.com/news/confidential-report-atlanta-cyber-attack-could-hit-million/GAljmndAF3EQdVWlMcXS0K/\">City of Atlanta</a> experienced a ransomware attack that cost upwards of $17 million in damages. The Colorado Department of Transportation fell victim, too, left with a bill totaling almost $2 million.</li>\n</ul>\n<p>These headlines are stories of a digital war that has no geographical borders or structured logic. No one is truly immune to ransomware, and any company that thinks that way is likely not as prepared as they think they are. <a href=\"https://www.beazley.com/news/2019/beazley_breach_insights_may_2019.html?gclid=Cj0KCQjwjMfoBRDDARIsAMUjNZoX-oHvkacxrbLvRkehjs4ibMCCY0k94sp7jer5Yp1Vlf8CMcStUnoaAjlCEALw_wcB\">Beazley Breach Response (BBR) Services</a> found a 105% increase in the number of ransomware attack notifications against clients in Q1 2019 compared to Q1 of 2018, as well as noting that attackers are shifting focus to targeting larger organizations and demanding higher ransom payments than ever before.</p>\n<h2><strong>Immersive cyber ranges &#8211; Protect Yourself, Your Business, Your People </strong></h2>\n<p>If your own security efforts, staff practices, and business infrastructure are continuously hardened every time a new breach headline makes the news, the things that matter most to you and your company will be better protected. One of the ways to consistently harden security practices is via immersive and persistent training on gamified cyber ranges. Some benefits of using cyber ranges like this include:</p>\n<ul>\n<li>Helping professionals of all skill levels learn and apply preventative measures such as: regular backups, multi-factor authentication, and incident response planning and analysis.</li>\n<li>Understanding what ransomware looks like and how it would “work” if it infected their company’s network.</li>\n<li>Cloud-based environments can scale to emulate any size digital system and help users “see” and respond to threats in safe spaces.</li>\n<li>Providing user assistance and immediate feedback in terms of rewards, badges, and progress indicators, allowing organizational leaders who want to upskill their cyber teams to see the skills gaps and strengths in their teams and identify ways to harden their defenses.</li>\n</ul>\n<p>When ransomware does come knocking at your business door, will you be ready to recover from the costly and reputational damages? If there is any shred of doubt in your mind, then it’s time to re-evaluate your cyber readiness strategy. As we’ve learned, even the smallest vulnerability or level of uncertainty is enough for a cybercriminal to take hold.</p>\n<p><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@jackson_893?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Michael Geiger</a> on <a href=\"https://unsplash.com/search/photos/ransomware?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a> and via <a href=\"http://www.expertiger.de\">website</a>.</span></p>\n","title":"Ransomware – The Attack Du Jour!"}},{"node":{"id":"8e60e2de-bf6a-5451-a43d-8b1031bd6666","slug":"cyber-security-and-the-lgbtqia-community","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/peter-hershey-282615-unsplash.jpg"},"date":"2019-06-18T11:00:38.000Z","content":"<p>While most of us recognize the inherent vulnerabilities of putting our personal information online, we may not think about how marginalized communities are at even greater risk of malicious attacks on the internet. The LGBTQIA (lesbian, gay, bi-sexual, transgender, queer, intersex, and asexual) community certainly understands the ramifications of sharing their lifestyles on the web, and it is of vital importance to consider how compromised online privacy can specifically impact these already vulnerable groups.</p>\n<p>To understand the privacy risks for LGBTQIA individuals, consider how we all use the internet and create digital footprints. Here are some statistics from <a href=\"https://www.lgbttech.org/\">LGBT Tech</a>, <a href=\"https://www.thetrevorproject.org/resources/preventing-suicide/facts-about-suicide/\">The Trevor Project</a>, and a study released by <a href=\"https://www.glsen.org/press/study-finds-lgbt-youth-face-greater-harassment-online\">GLSEN (the Gay, Lesbian, and Straight Education Network)</a>.</p>\n<ul>\n<li>81% of LGBTQIA youth have searched for health information online, as compared to 46% of non-LGBTQIA youth.</li>\n<li>62% of LGBTQIA youth have used the internet to connect with other members of the community in the last year.</li>\n<li>More than 1 in 10 said they had first disclosed their LGBTQIA identity to someone online.</li>\n<li>1 in 4 youth said they are more out online than in person.</li>\n<li>42% of youth in this community have been bullied online versus 15% of the general public.</li>\n<li>27% of LGBTQIA members report not feeling safe online.</li>\n<li>LGBTQIA youth are almost 5 times as likely to attempt suicide from harassment and isolation compared to heterosexual youth.</li>\n</ul>\n<p>The internet can be a scary place for members of the LGBTQIA community, but it is often also a lifeline.  LGBT-identifying adults often need to find resources and places that will be welcoming and supportive, and mobile devices play a vital role in their day today.  For many individuals who are not yet comfortable revealing their sexual identity at home or in their communities, the internet is often the first tentative step for seeking both information and community belonging.</p>\n<p>However, when privacy is breached, intentionally or unintentionally, for vulnerable populations, consequences can be catastrophic including loss of employment, damaged familial relationships or friendships, and even threats of physical harm or death.</p>\n<p>Back in 2013, the <a href=\"https://www.prnewswire.com/news-releases/national-cyber-security-alliance-and-lgbt-technology-partnership-launch-internet-safety-initiative-for-lgbt-community-207686631.html\">National Cyber Security Alliance (NCSA) launched a collaboration with the LGBT Technology Partnership</a> to highlight safety issues and increase focus on vulnerable populations. They created a sheet of specific tips and tricks for the LGBTQIA community for staying safe online based on the slogan STOP. THINK. CONNECT. which can be found <a href=\"https://staysafeonline.org/wp-content/uploads/2017/09/What-LGBT-Communities-Should-Know-About-Online-Safety.pdf\">here</a>. Many of these tips are helpful for everyone looking to stay safe online, but when reviewing them, you can see just how cautious members of this population need to be in order to feel safe.</p>\n<blockquote><p>Ensuring that every person has equal rights and access to online safety is of the utmost importance. While many walk through life taking precautions to ensure their data is protected, we must be aware of how certain communities are at more risk than others and strive to practice our own safe behavior online so as not to put anyone else’s lives at risk.</p></blockquote>\n<p>We wish members of the LGBTQIA community a cyber safe Pride Month and risk-free access to the resources they need.</p>\n<h3 style=\"text-align: center;\">To ensure everyone stays safe online, we’ve developed a few educational videos to keep everyone informed about hacking methods and how to avoid them.<br />\n<a href=\"https://www.youtube.com/playlist?list=PLUdKZUJquY1hn2EwlBJ90MyunBYcAaXRk\">Watch the video series here.</a></h3>\n<p>&nbsp;</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/@peterhershey?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Peter Hershey</a> on <a href=\"https://unsplash.com/search/photos/pride?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Cyber Security and the LGBTQIA Community"}},{"node":{"id":"65836fad-617d-5887-9c58-f1a2315d5356","slug":"spotlight-cyber-security-readiness-for-the-electricity-and-energy-industries","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/critical_energy_splash.jpg"},"date":"2019-06-18T08:35:01.000Z","content":"<p>When your power goes out, you recognize just how many things you use every day rely on energy. From phones to WiFi to air conditioning and heat, our homes and offices almost entirely rest on this silo of critical infrastructure.</p>\n<p>While we may not think of the energy sector as being a significant cyber vulnerability (we don’t read about a lot of breaches on this sector in the news media), it is not only of intrinsic importance to a functioning society but all other sectors that make up the nation’s critical infrastructure rely on electricity. According to the <a href=\"https://www.cfr.org/report/cyberattack-us-power-grid\">Council on Foreign Relations</a>, the U.S power system has evolved into a highly complex enterprise with:</p>\n<ul>\n<li>3,300 utilities that work together</li>\n<li>200,000 miles of high-voltage transmission lines</li>\n<li>55,000 substations</li>\n<li>5 million miles of lines that bring power to millions of homes and businesses</li>\n</ul>\n<p>There are not many documented cases of a successful power grid attack, but the first known instance occurred on December 23, 2015 in <a href=\"https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf\">Ukraine</a>. Hackers were able to compromise information systems of three energy distribution companies in Ukraine and temporarily disrupt electric supply to the end customers. A year later, Russian hackers targeted a <a href=\"https://www.wired.com/story/russian-hackers-attack-ukraine/\">transmission level substation</a>, blacking out part of Kiev.</p>\n<p>Although there may not be many examples of historical energy facility hacks, these kinds of attacks are no longer a theoretical concern. In 2014, Admiral Michael Rogers, director of the National Security Agency, <a href=\"https://www.c-span.org/video/?320969-1/discussion-nsa-director-admiral-michael-rogers\">testified before Congress</a> that China and other countries likely had the capability to shut down the U.S. power grid. An adversary with the capability to exploit vulnerabilities within the electric utility silo may be motivated to carry out such an attack under a variety of circumstances, and it seems increasingly likely that the <a href=\"https://securityboulevard.com/2019/04/will-the-next-war-be-cyber/\">next war will be cyber</a>.</p>\n<h2><strong>Cyber Security Readiness for Electricity and Energy</strong></h2>\n<p>So what can we do to prepare ourselves? Understanding that cyber security is the responsibility of everyone, not just CISOs or those in IT, helps ensure that everyone is participating in strengthening an organization’s cyber readiness.</p>\n<p>Utilizing AI, persistent learning, and gamified training to upskill your team will ensure that you are prepared for any looming threat.</p>\n<p>Electricity is of incredible importance to the country and the world, the remainder of our infrastructure would crumble without it. Building a culture of awareness and education around cyber security will help protect us from a domino effect of failing infrastructure. Continuously improving security posture is vital to defending ourselves against attacks that threaten our critical infrastructure.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"color: #ffffff; font-size: 10pt;\">Photo by <a style=\"color: #ffffff;\" href=\"https://unsplash.com/@gerritvermeulen?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Gerrit Vermeulen</a> on <a style=\"color: #ffffff;\" href=\"https://unsplash.com/search/photos/electricity?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Spotlight: Cyber Security Readiness for the Electricity and Energy Industries"}},{"node":{"id":"9ed92cfb-4778-588e-8158-e684b80fc2e8","slug":"cyber-attacks-and-risk-mitigation-in-critical-infrastructure","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/ian-simmonds-274504-unsplash.jpg"},"date":"2019-06-10T08:45:48.000Z","content":"<p>Critical infrastructure is a term used by the government to describe assets that are essential for the functioning of a society and economy (think oil and gas, water, electricity, telecommunication, etc.). According to the Department of Homeland Security, there are <a href=\"https://www.dhs.gov/cisa/critical-infrastructure-sectors\">16 sectors of critical infrastructure</a>. In the past few years, we’ve seen attacks on departments of transportation, cities, and other network infrastructure that are prompting many cyber security leaders to pay closer attention to their readiness strategy and risk management. With the threat of cyberattacks against public and private sector infrastructure on the rise, it is important to understand the history of these attacks, as well as what critical infrastructure cyber security professionals can do to protect themselves against them. Today, we are going to focus on three sectors: oil and gas, energy and electricity, and transportation.</p>\n<h2><strong>Oil &amp; Gas Cyber Security</strong></h2>\n<p>Much of how we live and work is dependent upon the energy produced from oil and gas production, including cooking, heating/cooling, driving, and use of electronic devices and appliances. There have been several successful attacks on this industry already:</p>\n<ul>\n<li>One of the most famous noted attacks came in 2010 with <a href=\"http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11\">Stuxnet, a malicious computer worm</a> used to hijack industrial control systems (ICS) around the globe, including computers used to manage oil refineries, gas pipelines, and power plants. It reportedly destroyed a fifth of Iran’s nuclear centrifuges. The worm was delivered through a worker’s thumb drive.</li>\n<li>In August 2012, an unauthorized user with privileged access to one of the world’s leading National Oil Companies’ (NOCs’) computers unleashed a computer virus called Shamoon (disk-wiping malware). This virus erased three quarters (30,000) of the company’s corporate personal computer data and resulted in an immediate shutdown of the company’s internal network.</li>\n<li>National Security Authority Norway said <a href=\"https://www.foxbusiness.com/markets/combatting-cyber-attacks-in-the-oil-and-gas-industry\">50 companies in the oil sector</a> were hacked and 250 more were warned to check their systems, in one of the biggest hacks in Norway’s history.</li>\n<li><a href=\"https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/realspin/2014/11/11/americas-critical-infrastructure-is-vulnerable-to-cyber-attacks/&amp;refURL=&amp;referrer=\">Ugly Gorilla, a Chinese</a> attacker who invaded the control systems of utilities in the United States, gained cyber keys necessary to access systems that regulate flow of natural gas. In January 2015, a <a href=\"http://arstechnica.com/security/2015/01/internet-attack-could-shut-down-us-gasoline-stations/\">device</a> used to monitor the gasoline levels at refueling stations was remotely accessed by online attackers, manipulated to cause alerts, and set to shut down the flow of fuel. Several gas-tank-monitoring systems suffered electronic attacks thought to be instigated by hacktivist groups.</li>\n<li>In December 2018, <a href=\"http://www.saipem.com/sites/SAIPEM_en_IT/con-side-dx/Press%20releases/2018/Cyber%20attack%20update.page\">Sapeim fell victim to a cyberattack that</a> hit servers based in the Middle East, India, Aberdeen and Italy.The attack led to cancellation of important data and infrastructures.</li>\n</ul>\n<h2><strong>Energy &amp; Electricity Cyber Security</strong></h2>\n<p>While we may not think of the energy sector as being a large cyber vulnerability, it is not only of intrinsic importance to a functioning society but necessary for all other sectors that make up the nation’s critical infrastructure.</p>\n<p>There are not many documented cases of a successful power grid attack but that doesn’t mean they don’t occur! The first known instance taking place on December 23, 2015 in <a href=\"https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf\">Ukraine</a>. Hackers were able to compromise information systems of three energy distribution companies in the Ukraine and temporarily disrupt electric supply to end customers. A year later, Russian hackers targeted a <a href=\"https://www.wired.com/story/russian-hackers-attack-ukraine/\">transmission level substation</a>, blacking out part of Kiev.</p>\n<p>Although there may not be many examples of historical energy utility hacks, these kinds of attacks are no longer a theoretical concern. In 2014, Admiral Michael Rogers, director of the National Security Agency, <a href=\"https://www.c-span.org/video/?320969-1/discussion-nsa-director-admiral-michael-rogers\">testified before Congress</a> that China and other countries likely had the capability to shut down the U.S. power grid. An adversary with the capability to exploit vulnerabilities within the electric utility silo may be motivated to carry out such an attack under a variety of circumstances, and it seems increasingly likely that the <a href=\"https://securityboulevard.com/2019/04/will-the-next-war-be-cyber/\">next war will be cyber</a>.</p>\n<h2><strong>Transportation Cyber Security</strong></h2>\n<p>Via plane, train, or automobile, the transportation sector supports nearly <a href=\"https://www.bts.gov/bts-publications/freight-facts-and-figures/freight-facts-figures-2017-chapter-5-economic\">10 percent of the U.S. GDP</a> (gross domestic product), which includes monetary value of all goods and services produced within the United States. Over the past couple of years, the industry has grown in operational complexity with logistical chains, production, facility and manufacturing partners and plant management. As a result of this growth, it has become an even more alluring and accessible hacking playground for cybercriminals. There have been a few noteworthy attacks on this silo of infrastructure in the last few years:</p>\n<ul>\n<li><a href=\"https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/\">Maersk</a>: Petyamalware variant infected the IT systems of the world’s largest shipping company with 600 container vessels handling 15% of the world’s seaborne trade in June 2017.</li>\n<li><a href=\"http://securityaffairs.co/wordpress/37997/cyber-crime/hacked-airline-lot.html\">LOT</a>: A Polish airline canceled 10 flights due to an attack against the airline’s ground computer systems at Warsaw’s Okecieairport in June 2015.</li>\n<li><a href=\"http://securityaffairs.co/wordpress/38739/hacking/connected-car-hacking.html\">Jeep Cherokee</a>: A coordinated attack in 2015 by Charlie Miller and Chris Valasek demonstrated the ease by which a connected car can be remotely hacked into, in this case, using Uconnect.</li>\n</ul>\n<p>&nbsp;</p>\n<p>You can see that attacks on these silos of industry have already begun (and show no signs of stopping) and we need to be prepared for what the future holds. To mitigate cyber attacks and protect critical infrastructure against looming threats, teams need to be prepared to address all possible scenarios that can occur on said attack surface in order to effectively protect and defend IT and OT critical infrastructures.</p>\n<h2><strong>Reducing Risk in Critical Infrastructure Cyber Security</strong></h2>\n<p><a href=\"https://www.circadence.com/products/project-ares/\">Project Ares<sup>®</sup></a> cyber security learning platform can prepare cyber teams with the right skills in immersive environments that emulate their own IT and OT networks to be most effective. In fact, there are exercises within the cyber range platform that have players detect threats on a water treatment plant and in an oil and gas refinery. It is designed for continuous learning, meaning it is constantly evolving with new missions rapidly added to address the latest threats in any critical infrastructure sector. Further, targeted training can be achieved from the library of battle room scenarios to work on specific skill sets like digital forensics, scripting and Linux.</p>\n<p>Training in cyber ranges is a great way to foster collaboration, accountability, and communication skills among your cyber team as well as cross-departmentally. Persistent and hands-on learning will help take your cyber team to the next level. Benefits of this kinds of learning include:</p>\n<ul>\n<li>Increased engagement – by keeping learners engaged they are able to stay focused on the subject matter at hand</li>\n<li>Opportunities to close gaps immediately – instant feedback, instruction, and critique make it easy for learners to benefit from interaction with the instructor and peers and immediately implement this feedback to improve</li>\n<li>Risk mitigation and improved problem solving – hands-on training allows learners to master skills prior to working in real-world environments. People can work through tough scenarios in a safe training environment – developing problem-solving skills without risk.</li>\n</ul>\n<p>By placing the power of security in human hands, cyber security teams can proactively improve a company’s ability to detect cyber-related security breaches or anomalous behavior, resulting in earlier detection and less impact of such incidence on energy delivery, thereby lowering overall business risk. Humans are the last line of defense against today’s adversary, so prioritizing gamified training for teams will foster the level of collaboration, transparency, and expertise needed to connect the dots for cyber security across these critical infrastructure sectors.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 10pt; color: #ffffff;\">Photo by <a style=\"color: #ffffff;\" href=\"https://unsplash.com/@ihs_photo?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Ian Simmonds</a> on <a style=\"color: #ffffff;\" href=\"https://unsplash.com/search/photos/oil-rig?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Cyber Attacks and Risk Mitigation in Critical Infrastructure"}},{"node":{"id":"d66075ff-a0d1-5c84-9800-8f1f3d508a35","slug":"kickstarting-your-cyber-security-career-path","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/andras-vas-655218-unsplash.jpg"},"date":"2019-06-04T08:45:37.000Z","content":"<p>Jumpstarting a new cyber security career path can feel like a daunting initiative, however, it may be more attainable than you think. By utilizing online cyber resources and persistent learning exercises, you can start learning everything you need to know to understand career options and land your dream job.</p>\n<p>Virtual machines and digital libraries are great places to start on your cyber learning journey. A virtual machine is a software program or operating system that exhibits the behavior of a separate computer and is capable of performing tasks such as running applications and programs like a separate computer. This enables you to create multiple independent VMs environments on one physical machine and it aids in detecting things like malware and ransomware attacks. A digital library is an online platform that offers a diverse collection of cyber security learning objectives, along with an online database of digital materials like videos and reports.</p>\n<p>Here are some resources that can help you pursue a career in cyber security:</p>\n<ul>\n<li><a href=\"https://www.virtualbox.org/\">Oracle VM VirtualBox</a> – this powerful virtualization product is for enterprise as well as home personal use. This is the best VM for home users and can be run on a multitude of operating systems.</li>\n<li><a href=\"https://www.kali.org/\">Kali Linux</a> &#8211; this is an open source tool used in information security training and penetration testing services. Kali Linux is one tool available for use in our Project Ares platform for offensive skill building and practice.</li>\n<li><a href=\"https://securityonion.net/\">Security Onion Virtual Machine</a> – this free and open sourced Linux distribution aids in intrusion detections, enterprise security monitoring, and log management. Security Onion is also available in Project Ares.</li>\n<li><a href=\"https://www.fireeye.com/services/freeware/flare-vm.html\">Flare Virtual Machine</a> – a freely available and open sourced Windows-based program that offers a fully configured platform with a comprehensive collection of Windows security tools.</li>\n<li><a href=\"https://www.cybrary.it/about/\">Cybrary</a> – this community based digital library gives you the ability to collaborate in an open source way and create an ever-growing catalog of online courses and experiential tools to learn all things cyber security from offensive, defensive and governance.</li>\n<li><a href=\"https://www.clark.center/home\">Clark Cybersecurity Library</a> – a digital library that hosts a diverse collection of cyber security learning objectives from <a href=\"https://www.clark.center/c/Intro%20to%20Cyber\">Intro to Cyber</a> to <a href=\"https://www.clark.center/details/shamman/Adversarial%20Thinking\">Adversarial Thinking</a>. It is a high-quality and high-availability repository for curricular resources in the cyber education community.</li>\n</ul>\n<p>From entry level positions to cyber security professionals, digital libraries help in understanding cyber concepts and virtual machines allow learners to apply and hone cyber skills that security professionals use on the job such as risk management, information systems security, and network security.</p>\n<blockquote>\n<div><span style=\"color: #ff9e1b;\">To complete your well-rounded cyber education, pairing these tools with hands-on practice in cyber range like Project Ares is key.</span></div>\n</blockquote>\n<p>Circadence’s own Project Ares uses gamified cyber range learning environments to emulate immersive and mission-specific network threats for a variety of cyber security work roles and job titles. The Project Ares platform is constantly evolving with foundational and specialized scenarios we call Battle Rooms and Missions to address the latest threats in the workplace. Learn tools, tactics and procedures and apply multiple skill sets in Mission scenarios hands-on to build experience. Using Project Ares is a great stepping stone to <a href=\"https://www.circadence.com/blog/how-to-launch-a-cyber-security-career/\">launching into a career in cyber security</a>.</p>\n<p>From concept learning to skills application, gamification paired with persistent, hands-on training in virtual environments is an ideal approach to understanding the ins and outs of complex cyber networks and how to recognize potential vulnerabilities in today’s evolving threat landscape. Pairing Project Ares with any of the aforementioned resources is a sure-fire way to kick off your cyber security career and <a href=\"https://www.circadence.com/ares-accomplishments-verification/\">prepare for security certifications</a>!</p>\n<p><span style=\"font-size: 10pt;\">Photo by <a href=\"https://unsplash.com/photos/Bd7gNnWJBkU?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Andras Vas</a> on <a href=\"https://unsplash.com/search/photos/career?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></p>\n","title":"Resources for starting a career in Cyber Security"}},{"node":{"id":"31f3ec2d-bd3b-5187-bef0-2a308599b9ca","slug":"microsoft-azure-government-secret-helps-enhance-cyber-training","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/projAres_dataCenter_01_wallpaper_1920x1080.jpg"},"date":"2019-05-30T19:50:32.000Z","content":"<p>Across the board there’s been a push from a policy perspective to get into secure cloud environments that provide organizations with the on-demand and protected availability that they need to improve business processes. <a href=\"https://www.youtube.com/watch?v=48YRdYuR3CQ\">Azure Government Secret</a> is a cloud solution that delivers <a href=\"https://azure.microsoft.com/en-us/blog/announcing-azure-government-secret-private-preview-and-expansion-of-dod-il5/\">comprehensive and mission-enabling cloud services</a> to US Federal Civilian, Department of Defense (DoD), Intelligence Community (IC), and US government partners working within Secret enclaves. It can also have global implications for how cyber defenders prepare for tomorrow’s threats.</p>\n<p>The April 2019 announcement of Azure Government Secret enables Circadence to deliver Project Ares to similar defense industry partners in support of their cyber training and readiness missions. Having the power of the Azure Secret cloud infrastructure behind Circadence is necessary to deliver infinite cyber range scalability for gamified training and learning opportunities to defenders across the globe who need specialized security and scalability in training programs.</p>\n<p>As cyber threats grow more frequent and more malicious, it is mission critical to government cyber protection teams to have the flexibility and accessibility to scale training to their needs, with limitless opportunity for enhanced cyber preparedness. The persistent, gamified training and frontier learning that occurs in Project Ares, coupled with this new level of secure cloud, enhances the protection of the nation’s most critical digital assets and will undoubtedly contribute to our overall national security.</p>\n<p>VP of Global Partnerships Keenan Skelly tells us how it helps improve cyber training today.</p>\n<blockquote><p>“Our partnership with Microsoft Azure allows us to build infinitely scalable cyber ranges to do cyber exercises and trainings,” said Skelly.</p>\n<p><iframe src=\"//www.youtube.com/embed/Ji9Pi7l0r6w\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p></blockquote>\n<p>With the help from Microsoft Azure Government Secret cloud, Circadence can continue to evolve cyber training solutions that help today’s elite, DoD cyber security professionals anticipate, prevent, and react to threats more efficiently and effectively. In doing so, we are proud to contribute to a world-class security culture that proactively protects our most critical assets and our people.</p>\n","title":"Microsoft Azure Government Secret Helps Enhance Cyber Training"}},{"node":{"id":"71ebb71c-1577-5f73-8e60-622e2fdee78a","slug":"girl-scout-troop-visits-circadence-to-earn-cyber-security-badges","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/IMG_87141.jpg"},"date":"2019-05-29T08:15:17.000Z","content":"<p>Introducing girls to the world of cyber security and empowering their access to this STEM discipline is incredibly important to Circadence as we advocate for a cyber workforce with diversified thinking and problem-solving perspectives to keep pace with today’s adversaries. In mid-May, Circadence was honored to host 12 Brownies from a local Girl Scout troop at our San Diego office to help them earn their <a href=\"https://www.girlscoutshop.com/Junior-Cybersecurity-Badge-Requirement-Pamphlet\">cyber security badges</a>. Some of Circadence’s own family members are involved with the local troop and several co-workers facilitated a series of workshops for the girls to teach aspects of cyber security including cryptography, spamming, and virus detection.</p>\n<p>Circadence’s Raeschel Reed, software engineer, taught the group about Cryptography and showed them how to use a Caesar Cypher to encrypt messages. The girls worked in groups of two to encrypt their favorite food and color. Then, they traded messages with each other and worked to decrypt the messages.</p>\n<p>The group also learned about spotting fake emails and about using photo filters and editing pictures from Shirley Quach, Software Engineer at Circadence. Girls broke into groups and presented their comparison arguments for which photo was real and which was fake.</p>\n<p>Yadhi Marquez-Garcia, DevOps engineer, taught a section about what a digital footprint is and how we should only share positive and not personal information. The girls wrote down all of the websites, games, and online services they interact with in order to learn about their own digital trail and “see” where they have been online. This helped them be much more conscientious and intentional about sites they visit online and the implications of their online activity.</p>\n<p>Digital viruses and how they spread was another topic of discussion that included a hands-on activity. Domonique Lopez, office operations manager, led the girls through an exercise where they shook hands with as many people as they could in two minutes and then pulled a card out of a bucket. The girl who pulled the card out was deemed “the virus” and the other girls quickly realized they were likely “infected” because most had touched her either directly or indirectly. Domonique and the girls then discussed ways to limit exposure to viruses while online. The underlying lesson was that viruses can spread quickly if you aren’t careful about what websites you “shake hands” with.</p>\n<p>Complementary to that topic, Kate Dionisio, software engineer, applied the concept of viruses to computer networks. She discussed about how malicious viruses are designed to disrupt computer systems and explained how ransomware attacks work. The girls gathered in a group and tried to pass a message from one to another (a game of “telephone”) while 3 disrupters shouted and tried to stop the message. Then they did the same thing but with 6 disrupters! This led into a discussion about how some viruses will overload a server with requests and stop messages from going where they need to go.</p>\n<p>&nbsp;</p>\n<p>Finally, the girls formed teams of two to play <a href=\"https://www.circadence.com/products/inCyt\">inCyt</a>, Circadence’s new cyber awareness game designed to help anybody learn basic cyber concepts similar to the ones that the troop had been learning about. Volunteers helped the girls understand how the cyber topics they’d been learning about applied to cyber attacks they were playing with on inCyt.</p>\n<blockquote><p><span style=\"color: #ff9e1b;\">“When interacting with inCyt the girls were excited to get a chance to play a game. They loved picking their hackables and choosing a name. They got really excited when they were successful at sending a hack and loved the music. When talking with each other and volunteers they did a great job of connecting what they were doing with our discussions about digital trails and clicking suspicious links. I think they walked away more engaged than if we had just given them a lecture on the content,” said Domonique.</span></p></blockquote>\n<p>Circadence is pleased to host opportunities like this to engage the next generation and improve their cyber awareness.  There is a significant cyber skills gap today and while these young girls won’t be entering the workforce soon, we hoped they learned that cyber security isn’t scary and is a field they could consider someday.   In the meantime, we’re glad that they might be a little safer online.</p>\n","title":"Girl Scout Troop Visits Circadence to Earn Cyber Security Badges"}},{"node":{"id":"9444921f-c902-5dd0-9158-67e539a4ba30","slug":"how-to-launch-a-cyber-security-career","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/annie-spratt-605838-unsplash.jpg"},"date":"2019-05-21T18:39:57.000Z","content":"<p>Preparing for a <strong>cyber security career</strong> is more enjoyable than you may think! The technical challenge, problem-solving, constant change (you’re never bored!), and continuous learning opportunities are positive experiences one can have when entering the field of cyber security.</p>\n<p>For any interested student or autodidactic, a <strong>cyber career path</strong> may seem a little daunting. But with the right cyber security tools and teachings in place, coupled with the latest proficiencies, any person can learn cyber and garner the skills necessary to enter the workforce with confidence and competency.</p>\n<p>The earning potential for an individual pursuing a career in cyber is significant. The national average frontline <strong>cyber security career salary</strong> is $94,000-119,000 (on the low end) for security-related positions in the U.S. according to the <a href=\"https://www.roberthalf.com/sites/default/files/documents_not_indexed/2020_Salary_Guide_Technology_NA.pdf?utm_campaign=RH-NA-Salary_Guide-Autoresponder-Email-10-24-2019&amp;utm_medium=Email&amp;utm_source=autoresponder&amp;utm_content=Download+the+2020+Technology+Salary+Guide&amp;sfi=\" target=\"_blank\" rel=\"noopener noreferrer\">Robert Half Technology’s 2020 Salary Guide</a></p>\n<p>The industry offers high paying jobs, yet many positions continue to be unfilled with an estimated <a href=\"https://www.isc2.org/News-and-Events/Press-Room/Posts/2019/11/06/ISC2-Finds-the-Cybersecurity-Workforce-Needs-to-Grow--145\" target=\"_blank\" rel=\"noopener noreferrer\">145% workforce needed to fill the talent gap</a>.</p>\n<p>This begs the question: what is the best way to fill the cyber security skills gap with motivated and budding professionals? The answer is multi-faceted but at its core is a fundamental shift in how we prepare and train them with the skills needed to thrive.</p>\n<h2><span style=\"color: #ff9900;\"><strong>Pro Tips for Building a Cyber Security Career Path </strong></span></h2>\n<p>Just like many <a href=\"https://www.circadence.com/blog/what-you-need-to-know-about-cyber-security-career\">other career paths</a>, cyber security needs people who possess a mix of academic, theoretical-based knowledge, practical skill sets, and a lot of creative thinking. An aspiring cyber security professional can learn the knowledge, skills, and abilities needed in the industry, seek out internships and/or apprenticeships, and learn of careers in cyber without actually being on the defensive frontlines of cyber attacks. Details of each approach are below.</p>\n<h3><span style=\"color: #ff9900;\">Step 1: Identify individual strengths, knowledge, skills, abilities</span></h3>\n<p>The first suggestion for an individual who wants to learns on their own is to match their unique strengths (technical and non-technical) to the kinds of knowledge, skills, and abilities needed to do certain cyber jobs in the workplace. Understand what kinds of jobs are available too. For students, they will likely learn these details in traditional classes and in their coursework assignments. With Google at our fingertips, however, it’s easy to find a variety of online resources to learn cyber security KSA’s including ISACA, ISC(2), ISSA, and The SANS Institute—all of which provide information about the profession and detail certification and training options. Understanding the kinds of tasks performed in certain work roles and the kinds of behaviors needed to perform certain jobs, an aspiring cyber professional will be better prepared during the interview and job search process. He/she won’t be surprised to learn about what is required to start a job in cyber security.</p>\n<h3><span style=\"color: #ff9900;\">Step 2: Consider internships, apprenticeships, and alternative pathways to cyber learning </span></h3>\n<p>As a self-guided learner, you likely have the go-getting attitude needed to find a cyber security internship, apprenticeship, or alternative trade school to start building your knowledge, skills, and abilities more.</p>\n<p>Internships are available through many community colleges, technical colleges, and universities, each of which has well-oiled practices of connecting students with local companies. In fact, it’s not uncommon for most students, both undergraduate and graduate, to be required to complete an internship in their field of study before graduation.</p>\n<p>Apprenticeships are a “learn while you earn” kind of model and are incredibly beneficial for both the company offering the apprenticeship and the student.</p>\n<blockquote><p>“This is absolutely fundamental, and a key plan in meeting the workforce needs. Our solution to the gap will be about skills and technical ability,” says Eric Iversen, VP of Learning &amp; Communications, <a href=\"http://start-engineering.com/cybersecurity-career-guide/\" target=\"_blank\" rel=\"noopener noreferrer\">Start Engineering</a>. “And the most successful of apprenticeship programs offer student benefits (e.g., real-world job skills, active income, mentorship, industry-recognized credentials, an inside track to full-time employment, etc.) and employer benefits (i.e., developed talent that matches specific needs and skill sets, reduced hiring costs and a high return on investment, low turnover rates and employee retention, etc.)”</p></blockquote>\n<p>The Department of Homeland security created a <a href=\"https://www.sfs.opm.gov/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Corp Scholarship program</a> to fund undergraduate and graduate degrees in Cyber Security. Students in this program agree to work for the Federal Government after graduating (with a one year service for every year of scholarship).</p>\n<p>These types of opportunities are especially advantageous for recruiting individuals who may be switching careers, may not have advanced degrees, or are looking to re-enter the field.</p>\n<p>Alternative pathways are also quite accessible for the college graduate or self-driven learner seeking a career in cyber security. One cyber career pathway is via “stackable” courses, credits, and certifications that allow learners to quickly build their knowledge base and get industry-relevant experience. These kinds of courses are available in high school (taking collegiate-level courses) and at the college level. Another type of alternative pathway is via cyber competitions and hackathons. Learners can gain practical skills in a game-like event while meeting fellow ambitious professionals. Participating in these events also makes for great “extracurricular activities” on one’s resumé too.</p>\n<p>Circadence is proud to lend its platform Project Ares® for many local and national cyber competitions including the <a href=\"http://www.wicked6.com/\" target=\"_blank\" rel=\"noopener noreferrer\">Wicked6 Cyber Games</a>, cyberBUFFS, <a href=\"https://ca-cyberhub.org/news/106-socal-cyber-cup-challenge-invites-collaboration-to-solve-cybersecurity-workforce-needs\" target=\"_blank\" rel=\"noopener noreferrer\">SoCal Cyber Cup</a>, and Paranoia Challenge so students can engage in healthy competition and skill-building among peers. For more information on cyber competitions and hackathons, check out the <a href=\"https://www.uscyberpatriot.org/\" target=\"_blank\" rel=\"noopener noreferrer\">Air Force Association’s CyberPatriot</a>, <a href=\"https://picoctf.com/\" target=\"_blank\" rel=\"noopener noreferrer\">Carnegie Mellon’s picoCTF</a>, <a href=\"https://mlh.io/\" target=\"_blank\" rel=\"noopener noreferrer\">Major League Hacking</a>, and the <a href=\"https://www.nationalcyberleague.org/\" target=\"_blank\" rel=\"noopener noreferrer\">National Cyber League</a>.</p>\n<p>Cyberseek.org also has a detailed and interactive roadmap for hopeful professionals to learn more about how to start and advance their careers in cyber security. This interactive cyber security career pathway map breaks it all down. For example, if you’re interested in a software development role, you’ll want to build skills in Java or Python, databases, code testing, and software engineering, as well as, build cyber skills in cryptography, information assurance, security operations, risk management, and vulnerability assessment. You may also consider certifications in Certified Ethical Hacking (CEH), Security+, Network+, Linux+, Offensive Security Certified Professional (OSCP), CISSP, and GIAC in addition to having real-world experience and training. In addition, check out Cyber-Security Degree, a free service that helps individuals looking to enter into the field find the right path to getting an online degree.</p>\n<h3><span style=\"color: #ff9900;\">Step 3: Understand Cyber Security Career Requirements</span></h3>\n<p>We recommend three types of experience when considering a career in cyber security:</p>\n<p>·     <strong>Degree experience</strong> for basic understandings of cyber theory and practice</p>\n<p>·     <strong>Technical experience</strong> to demonstrate learned knowledge translates to skill sets acquired</p>\n<p>·     <strong>Real-world training experience</strong>, either via an internship/on-the-job opportunity or via realistic <a href=\"https://www.circadence.com/blog/cyber-ranges-101-and-how-they-improve-security-training/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber range training</a></p>\n<p>Many entry-level <strong>cyber security job descriptions</strong> will require at least a bachelor’s degree or 4 years’ experience in lieu of a degree. Higher-level positions will require the academic degree plus some technical experience and/or real-world training.</p>\n<p>It’s important to note that there are two types of cyber training available: A traditional classroom-based setting and an <a href=\"https://www.circadence.com/products/project-ares/\" target=\"_blank\" rel=\"noopener noreferrer\">on-demand, persistent training</a> option. Both are great in their own ways and can complement each other for holistic cyber learning. The classroom-based learning presents information to learners via PowerPoints, lectures, and/or video tutorials. Learners can take that knowledge and apply it in a <a href=\"https://www.circadence.com/solutions/topic/cyber-ranges/\" target=\"_blank\" rel=\"noopener noreferrer\">hands-on virtual cyber range environment</a> to see how such concepts play out in real-life cyber scenarios.</p>\n<p>Since cyber security is an interdisciplinary field, it requires knowledge in technology, human behavior/thinking, risk, law, and regulation—to name a few. While many enter the field with the technical aptitude, many forget the “soft skills” to cyber security. To communicate effectively with a cyber team, problem-solve, analyze data, identify vulnerabilities, and understand the “security story” of the employer, a young professional needs to possess and demonstrate those social skills to thrive in their job.</p>\n<h2><span style=\"color: #ff9900;\"><strong>The Variety of Cyber Security Fields are Endless!</strong></span></h2>\n<p>There’s more to cyber security than being a network analyst or incident response manager. Interested, aspirant professionals can work in cyber security through other departments beyond security and IT. Cyber careers in human resources, marketing, finance, and business operations are all available sectors that allow a learner to “be in cyber” without doing the actual day-to-day frontline security defense tactics. It is important to know about the other careers individuals can pursue in cyber security because it is not just for the IT department to “manage” within a business. Furthermore, cyber security roles don’t have to be pursued at technology companies – there are many healthcare, banking, energy, and enterprise companies seeking cyber security professionals in their organizations. So, if a certain industry is of interest to you, you can explore cyber in that specific industry. In the age of digital transformation, practically every sector has a security need that needs to be hardened.</p>\n<p style=\"text-align: left;\">For young graduates entering the cyber security field, a multi-faceted approach to learning cyber security skills is recommended. The good news is that motivated learners have lots of avenues and resources available to them to pave a career path that best fits their needs and interests. <a href=\"https://www.circadence.com/blog/kickstarting-your-cyber-security-career-path/\">Check out this article</a> next for options to kickstart a cyber career.</p>\n<h3 style=\"text-align: center;\">WATCH this On-Demand Webinar</h3>\n<p><a href=\"https://marketing.circadence.com/acton/media/36273/webinar-kickstarting-a-cyber-career-2019-11\">&#8220;KICKSTARTING A CYBER CAREER </a>&#8221;</p>\n<p>with Dr. Dan Manson</p>\n<p>&nbsp;</p>\n","title":"How to Launch a Cyber Security Career"}},{"node":{"id":"108e573a-c8db-50d9-8a1f-d59f945cf7f8","slug":"the-future-of-cyber-security-in-the-wake-of-standardized-workforce-development","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/06/freestocks-org-540554-unsplash.jpg"},"date":"2019-05-19T14:13:29.000Z","content":"<p><em>The implications of the </em><a href=\"https://www.whitehouse.gov/presidential-actions/executive-order-americas-cybersecurity-workforce/\">Executive Order on America&#8217;s Cybersecurity Workforce</a> <em>and what it means for cyber workforce development going forward</em></p>\n<p>The White House recently issued the <a href=\"https://www.whitehouse.gov/presidential-actions/executive-order-americas-cybersecurity-workforce/\">Executive Order on America&#8217;s Cyber Security Workforce</a>. This forward-looking executive order aims to close the cyber security skills gap and increase the number of cybersecurity professionals working in the field. This is a huge need for our critical infrastructure, national defense and modern economy. We are bound to see some changes across the industry with the passing of this bill. Although we don’t have a crystal ball to see the future, there are some implications we anticipate for the cybersecurity industry overall.</p>\n<h2><strong>Improved Global Security from Nationally Recognized Standards </strong></h2>\n<p>The executive order encourages widespread adoption of the cyber security workforce framework created by the National Initiative for Cyber Security Education (NICE). The use of the NICE framework will create some national standards in the industry and allow for more qualifying leverage. This will provide evaluation requirements used in contracts for IT and cyber security services.</p>\n<h2><strong>Prioritizing Cyber Workforce Diversity </strong></h2>\n<p><a href=\"https://www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/#4fe7dd4d47e8\">According to Cyber Security Ventures, there will be up to 3.5 million job openings by 2021</a> and currently, females represent less than 12% of the global cyber security workforce. This stat is crazy! To keep pace with sophisticated adversaries and develop technology that supports human cyber operator decision making, diversity of thinking and skill and approach should be a hyper-focus for the security industry.  Women are well suited for, and extremely talented at, technical fields such as information security, security engineering, and AI engineering; however, recruiting and retaining women in these fields is not where it needs to be. There is a long-standing stereotype that cybersecurity is too technical for women and that’s not the case. There are many critical skills that women bring to the table including an incredible attention to detail, problem-solving, and communication skills that are as important in cyber work as the technical know-how. Groups like Cyber Patriot, Girls Who Code, and more recently Women’s Cyberjutsu are wonderful organizations that inspire young girls and women to pursue careers in cyber and technology.</p>\n<blockquote><p>The aptitude for cyber security lies not only in the technical fields, but can also be found in many unexpected disciplines. Some of the best cyber defenders started their career out doing something completely different. We need this type of diversity and people with different backgrounds to join the industry. We need to improve thinking and skill, both technical and critical thinking skills to combat today’s adversaries.</p></blockquote>\n<h2><strong>New Methods of Cyber Security Training </strong></h2>\n<p>In developing the workforce, we need to be cognizant of the need for new methods of training that inspire the next-gen learner. The traditional ways of learning in a classroom have worked in the past, but there are a lot of statistics that show traditional classroom settings alone aren’t the most effective in terms of applied skill preparedness and learning retention. Studies on the effectiveness of traditional classroom settings show that students lose  <a href=\"https://trainingmag.com/trgmag-article/strategies-make-learning-stick\">40% of what they’ve learned after 20 minutes and between 50 &#8211; 80% of what they’ve learned after one day, and 90% of what they’ve learned after six days</a>.</p>\n<p>Gamified learning approaches are currently being adopted federal agencies, banks, oil and gas and other infrastructure organizations as well as academic institutions such as the University of Colorado,  <a href=\"https://www.circadence.com/guest-blog-reimagining-cyber-learning-for-students-featuring-divergence-academy/\">Divergence Academy</a>, and Loudoun Public Schools. This form of active learning generally includes on-keyboard activities along with team collaboration and applying concepts to real-world scenarios, which has shown to improve retention to 75% compared to 5% through more passive learning methods like lectures with PowerPoints. Recently, <a href=\"https://denver.cbslocal.com/2019/05/24/video-game-cyber-security-boulder/\">a graduate student at the University of Colorado shared his experience</a> after he played one of the cyber games in Project Ares, Circadence’s flagship learning platform. He mentioned that he liked the feeling the game created of a sense of impending danger from the robots and that made him think better and learn more as he worked to defeat them.</p>\n<h2><strong>Pursuing &#8216;Cyber as a Sport&#8217; to Capture Talent </strong></h2>\n<p>We embrace the idea of “<em>cyber as a sport”</em> believing cyber security skill building can and should be fun, like sports. Cyber competitions are a great way to encourage skill-building plus they bring attention to the industry. These kinds of competitions should be happening from early school age (Girls Who Code), through high school (Cyber Patriot), and university (NCCDC), and then throughout the professional career. Competition categories can include individual and team-based events, software reverse engineering and exploitation, network operations, forensics, big data analysis, cyber analysis, cyber defense, cyber exploitation, secure programming, obfuscated coding and more.</p>\n<p><a href=\"http://www.wicked6.com/\">Wicked6 Cyber Games</a>, cyberBUFFS, <a href=\"https://ca-cyberhub.org/news/106-socal-cyber-cup-challenge-invites-collaboration-to-solve-cybersecurity-workforce-needs\">SoCal Cyber Cup</a>, and Paranoia Challenge are several examples of events where students can engage in healthy competition and skill-building among peers in an active, living lab setting. <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\">Circadence</a>’s gamified training platform, Project Ares<sup> </sup>is used as the platform to deliver the competitive exercises though its immersive, gamified cyber range.  Realistic scenarios challenge players in mission-specific virtual environments using real-world tools, network activity and a large library of authentic threat scenarios.</p>\n<p>Without continued effort to increase the cybersecurity workforce, our critical infrastructure, national defense and modern economy will be jeopardized.</p>\n<blockquote><p>The publication of this Executive Order is an indication that government is ready to proactively address our very serious cybersecurity challenges and is looking to new ways of training and skill building to meet the demands of today’s workforce.</p></blockquote>\n<p>To keep organizations better protected in the wake of digital transformation, legislative progress like this is a significant stepping stone to alleviating the industry’s largest challenges.</p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@freestocks?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">freestocks.org</a> on <a href=\"https://unsplash.com/search/photos/cyber-security?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a><br />\n</span></span></p>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@mktgmantra?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">David Everett Strickler</a> on <a href=\"https://unsplash.com/search/photos/white-house?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"The Future of Cyber Security in the Wake of Standardized Workforce Development"}},{"node":{"id":"9c9a71bc-ccf7-5a1c-925e-953b3ad16a1d","slug":"nichols-college-students-spearhead-cyber-security-education-for-the-entire-campus","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/marvin-meyer-571072-unsplash.jpg"},"date":"2019-05-16T14:37:43.000Z","content":"<p>Policy makers are now prioritizing data security over talent, efficiency and controlling costs. As students growing up and being educated in the digital age, we are just starting to understand the importance of cyber security to individuals and their companies. Taking part in a Research Associate Internship on campus at Nichols College, our eyes have been opened to the vast number of threats we face on a daily basis.</p>\n<p>Oracle conducted a study titled “<a href=\"https://www.oracle.com/a/ocom/docs/data-security-report.pdf\">Security in the Age of Artificial Intelligence</a>,” where 341 C-Suite executives and 110 policy makers were asked of their plans to improve their company&#8217;s security in the next two years. The top answer from this sample was to <strong>train existing staff</strong>. Human error poses the greatest risk to these companies (Oracle). In order to mitigate this risk, it is imperative to understand the opportunity cost of training employees on the importance of cybersecurity. Prioritizing training would prevent small mistakes, potentially costing a company much more in the long run.</p>\n<p>A Nichols College Associate Professor of Accounting and Finance, Bryant Richards, noticed a gap in cyber security education, wanting to bring cyber to campus in a big way, stating “As cyber risks have become ubiquitous throughout the industry, it is our responsibility to provide some degree of cyber literacy to our business students. We must train our accounting students to be data and technology professionals who understand accounting. The realistic and experiential nature of <a href=\"https://www.circadence.com/products/project-ares/\">Project Ares</a> matches how our students learn and provides a transformative learning experience.” Richards along with the two of us, helped Nichols partner with Circadence to complete a three-month pilot program of their gamified cybersecurity learning platform Project Ares.</p>\n<p><strong>What We Found:</strong> Circadence did a great job with Project Ares, with an appealing, gamified user interface that sucks you in and is easy to use. As a student with no technical experience in the cybersecurity field, Project Ares proved to be both engaging and challenging. It provided an abundance of resources through its Media Center and Mini Games. Users can obtain a base layer of knowledge, progressing into education on concepts like the Cyber Kill Chain and how hackers utilize it. The interactive Battle Rooms provide <a href=\"https://www.circadence.com/blog/cyber-ranges-101-and-how-they-improve-security-training/\">real-life, technical lab environments</a> where users can spin up virtual machines, explore real-world tools, build their confidence, and hone their skills.</p>\n<p><strong>What We Learned:</strong> You do not have to be a professional hacker to steal someone else’s information or gain access to their computer. Understanding the code is no longer enough; this is much more than an individual problem. If your own device is compromised, the hacker can steal your personal information, and steal information from your employer and worse. This harsh reality surprised us when we first commenced our research. From clicking a wrong link in an email, to accidentally tapping an advertisement banner on your phone; these small errors can seem harmless but are really detrimental to your overall security.</p>\n<p>The <a href=\"https://www.circadence.com/finding-the-needle-in-the-cybersecurity-haystack-why-gamification-is-the-answer-youve-been-looking-for/\">gamification of cybersecurity training</a> has allowed those of us with no prior knowledge, a chance to get a leg up. With increased demand to train existing staff, new training approaches must be made for the next generation of cybersecurity specialists. Gamifying the process made it easily digestible, directly benefitting any potential company or individual.</p>\n<p>The first step in becoming educated on cybersecurity is understanding that there are threats present in our everyday lives. In the words of the man who gave us our initial walkthrough of Project Ares, <a href=\"http://www.circadence.com/national-cybersecurity-awareness-month/\">Brad Wolfenden compared cybersecurity to buying a gallon of milk</a>, saying:</p>\n<p><em>“I believe that part of the disconnect around cybersecurity best practices comes from the assumptions we make as consumers in general – that what we’re buying is designed and sold with our best interests, and security, in mind &#8230; The food you buy and eat is certified by the Food &amp; Drug Administration to indicate it has been safely grown/ raised and suitable for human consumption. When making technology purchases, we cannot take these same conveniences for granted.”</em></p>\n<p>It is everyone’s ‘job’ to maintain high ethical standards and awareness when operating on the Internet nowadays. It is no longer up to one person or pre-installed software to protect your personal information. The more we are educated on the basic underlying principles of cybersecurity, the safer we will all be.</p>\n<p><strong>References</strong></p>\n<p>Oracle. “SECURITY IN THE AGE OF AI .” <em>Oracle</em>, 2018, <a href=\"https://word-edit.officeapps.live.com/we/www.oracle.com/a/ocom/docs/data-security-report.pdf\">www.oracle.com/a/ocom/docs/data-security-report.pdf</a>.</p>\n<p>Wolfenden, Brad. “A Rising Tide Lifts All Boats: Celebrating National Cybersecurity Awareness Month.” <em>Circadence</em>, 30 Oct. 2018, <a href=\"https://word-edit.officeapps.live.com/we/www.circadence.com/national-cybersecurity-awareness-month/\">www.circadence.com/national-cybersecurity-awareness-month/</a>.</p>\n<p><em>*Students R.J. LeBrun &amp; Lorenzo Secola guest authored this blog post as part of their Research Associate Internship at Nichols College </em></p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Nichols College Students Spearhead Cyber Security Education for the Entire Campus "}},{"node":{"id":"40935ba3-59d1-5781-bf19-8a317b6af473","slug":"diversity-in-cyber-security-why-its-important-and-how-to-integrate-it","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/circCorp_aboutUs_frame_02450.png"},"date":"2019-05-10T15:27:06.000Z","content":"<p>You may have heard that the cybersecurity skills gap is widening, and that there is a massive shortage of cyber professionals today. In fact, Cybersecurity Ventures predicts that there will be up to <a href=\"https://cybersecurityventures.com/jobs/\">3.5 million job openings</a> in the field by 2021. In spite of the growing need for people in cyber, women continue to be underrepresented in the field.</p>\n<p>According to major findings from the <a href=\"https://www.ewf-usa.com/page/WomenInCybersecurity\">2017 Global Information Security Workforce Study</a>:</p>\n<ul>\n<li>Women are globally underrepresented in the cybersecurity profession at 11%, much lower than the representation of women in the overall global workforce.</li>\n<li>Globally, men are 4 times more likely to hold C-suite and executive-level positions, and 9 times more likely to hold managerial positions than women.</li>\n<li>In 2016 women in cybersecurity earned less than men at every level.</li>\n</ul>\n<p>It’s no surprise that women are the underdog across plenty of male-dominated industries. So why is it so important for women to close the gender gap in cyber?</p>\n<p><iframe src=\"//www.youtube.com/embed/a5zUOaUDyDc?t=12s\" width=\"560\" height=\"314\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<h2><strong>We need diverse perspectives in cybersecurity</strong></h2>\n<p>Firstly, cyber is an area that benefits greatly from utilizing people with diverse perspectives and histories to solve problems. As threat actors and black hat hackers often come from disparate backgrounds, the wider variety of people and experience that are defending our networks, the better the chances of success at protecting them.</p>\n<h2><strong>Combat the stereotype that cyber is only for men</strong></h2>\n<p>Secondly, as there are so many empty jobs in the field, it is ultimately detrimental for a factor like a gender to narrow the pool of people pursuing it. Unfortunately, the message is ingrained in women from a young age that tech and security are “masculine” professions, which results in a self-perpetuating cycle of unconscious bias against women in the field. These problems are difficult to fix because they are subtle and pervasive and often come back to issues in culture and education. In fact, an online survey, <a href=\"https://d1srlirzdlmpew.cloudfront.net/wp-content/uploads/sites/86/2017/11/03114046/Beyond-11-percent-Futureproofing-Report-EN-FINAL.pdf\">Beyond 11%</a>, found that most women have ruled out cybersecurity as a potential job by the age of 15. This is unacceptable!</p>\n<h2><strong>Everyone can learn cyber</strong></h2>\n<p>Finally, there is a misconception that the cybersecurity industry is only for people with highly technical skills. Unfortunately, the “bad guy” hackers out there don’t require crazy technical skills to get to your personal information. Fortunately, being on the defensive lines don’t require them either. Cybersecurity is a highly trainable field and has a growing need for people in more positions than ever before, such as legal, marketing, and public policy – all of which women have proven to excel in. In fact, the communication skills, problem-solving and attention to detail skill sets needed to excel in cybersecurity are skills women possess and are really good at.</p>\n<h2><strong>Introducing more women to cybersecurity</strong></h2>\n<p><strong><br />\n<span style=\"color: #ff9e1b;\">Programs and Events</span></strong></p>\n<p>Since many of these problems start for women from a young age and through somewhat unconscious societal and cultural constructs, it can feel like a daunting task to get women more involved in cyber. In order to combat these misconceptions, many programs and events have been put into place to provide young women with female role models in the cybersecurity field. Events such as the Women in Cybersecurity Seminar, Women in Cybersecurity Conference, and Cyber Day for Girls are just a small number of direct-action groups that companies like IBM have put in place to address the gender gap. Further cyber competitions like the <a href=\"https://wicked6.com/\">Wicked6 Cyber Games</a>, and organizations like the <a href=\"https://womenscyberjutsu.org/\">Women’s Society of Cyberjutsu</a> and <a href=\"https://girlswhocode.com/\">Girls Who Code</a> are dedicated to introducing young women to cyber at that earlier age before they are told “it is not for them.”</p>\n<p><span style=\"color: #ff9e1b;\"><strong>Cybersecurity Mentorships and Internships</strong></span></p>\n<p>Mentorships and internships are another great way to introduce girls to other women in cybersecurity fields they may think are beyond their reach. Volunteers from tech companies have been going to summer camps specifically designed to encourage young girls to consider careers in STEM, such as the <a href=\"http://www.aauw-ca.org/what-is-tech-trek/\">Tech Trek</a> summer camp. Additionally, the Girl Scouts just introduced the first ever <a href=\"https://www.geek.com/tech/girl-scouts-can-now-earn-cool-cybersecurity-skills-badges-1771394/\">cybersecurity badge</a>, which can be earned by completing curriculum and gamified learning around internet safety.</p>\n<p><span style=\"color: #ff9e1b;\"><strong>Persistent cyber career development</strong></span></p>\n<p>Another way we can support and retain women who choose cybersecurity roles is for companies have policies in place that ensure women do not miss out on opportunities to further their careers after having children. Things like flexible hours and the option to work from home can be key in maintaining a diverse and productive workforce. Hiring managers can also work to ensure equal employment opportunities when looking to hire for a new position. People from all backgrounds should feel welcome to apply for roles in this highly trainable and accessible field.</p>\n<p>We need all hands-on deck now more than ever in cybersecurity, tech and STEM fields. Communicating to girls at a young age that technology isn’t just for their male counterparts, and that it can offer them a long and rewarding career, is essential in closing the gender and skills gap in cyber.</p>\n<h3>To learn more how to diversify the cybersecurity workforce from a strategic standpoint, read our other blog “Diversifying the Cybersecurity Workforce.” <a href=\"https://www.circadence.com/a-call-to-diversify-the-cybersecurity-workforce/\">https://www.circadence.com/a-call-to-diversify-the-cybersecurity-workforce/</a></h3>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Diversity in Cyber Security: Why It’s Important and How To Integrate It"}},{"node":{"id":"a88447d5-49a3-510f-b44a-fbf06c48733a","slug":"healthcare-cybersecurity-in-critical-condition","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/04/healthcare-image.jpg"},"date":"2019-04-29T08:15:19.000Z","content":"<p>The digitalization of healthcare communication has greatly impacted how healthcare professionals use medical devices, perform patient care, and conduct internal operations. Electronic health record (EHR) mandates and widespread adoption of mobile devices has accelerated at such a rapid pace, healthcare cybersecurity companies are making mistakes that are inviting malicious hackers inside. Unfortunately, the healthcare industry has developed a negative reputation due to frequent data breaches, ransomware attacks, and security threats. It is time to revive the industry and get it on a path to a healthy recovery.</p>\n<h2><strong>Healthcare Cybersecurity Statistics</strong></h2>\n<ul>\n<li>More than 300 reported data breaches</li>\n<li>More than 16 million Americans impacted</li>\n<li>62% of healthcare organizations have experienced a breach in past 12 months</li>\n</ul>\n<p>Causes for these attacks like unencrypted, lost and stolen devices, outdated systems, and sheer lack of cyber professional personnel contribute to the health care industry’s demise. It allows cybercriminals to steal financial and billing information from hospitals, patient records, and even bank account numbers.</p>\n<p>The following organizations have fallen victim to attacks. Their suffering gives us a glimpse into the severity of healthcare cybersecurity threats. It also sheds light on how healthcare cybersecurity spending can be re-directed to support cyber teams so they can better prevent an attack of their own.</p>\n<ol>\n<li><a href=\"https://www.campussafetymagazine.com/hospital/ssm-health-data-breach/\"><strong>SSM Health in St. Louis</strong></a><strong>:</strong> A former call center employee accessed 29,000 patient records including demographics and clinical information. The former employee did not have access to financial information, according to the statement.</li>\n<li><a href=\"https://www.healthdatamanagement.com/news/cyber-attack-on-cancer-treatment-chain-affects-22-million\"><strong>21st Century Oncology of Fort Myers, FL</strong></a><strong>:</strong> An unauthorized third party gained access to a company database, putting 2.2 million individuals at risk. Data stolen may have included patient names, social security numbers, physician names, diagnosis and treatment information, and insurance information.</li>\n<li><a href=\"https://www.bizjournals.com/triad/news/2017/12/08/unc-health-care-computer-stolen-from-triad.html\"><strong>UNC Dermatology and Skin Cancer Center</strong></a><strong>:</strong> A stolen computer contained roughly 24,000 patients with records detailing names, addresses, phone numbers, birthdates, Social Security numbers, employment status, and employer names.</li>\n<li><a href=\"http://www.chicagotribune.com/business/ct-biz-sinai-phishing-incident-20171207-story.html\"><strong>Sinai Health System in Chicago</strong></a><strong>:</strong> A phishing scam affected approximately 11,350 people of the seven-member hospital system. The investigation reported no financial information was compromised but patient information may have been compromised.</li>\n<li><a href=\"http://www.healthcareitnews.com/news/hackers-breach-henry-ford-health-exposing-data-18000-patients\"><strong>Henry Ford in Michigan</strong></a><strong>:</strong> A cybercriminal accessed email credentials from a group of employees to view and steal the data of 18,470 patients. While the email accounts were password protected and encrypted, the hacker accessed patient names, dates of birth, medical record numbers, provider names, dates of service, health insurer, medical conditions and locations.</li>\n</ol>\n<p>There is good news, however. These threats can be mitigated with the right “medicine.” How?</p>\n<h2><strong>Stopping Healthcare Cybersecurity Threats</strong></h2>\n<p>Cybersecurity starts and ends with humans. It is the people controlling the use and deployment of technologies who have the ultimate power to create a secure cyber environment. Therefore, we advocate for a “data privacy first” mentality that places people at the center of cybersecurity in the healthcare industry.</p>\n<p>Cyber teams can engage in persistent learning and skill-building opportunities to learn how best to protect patients and minimize security risk and identity theft. Protected health information and patient security is of utmost importance to healthcare cybersecurity so if cyber professionals and non-cyber professionals like understand how to improve data security, patients and the facilities that house them will be better protected.</p>\n<h3>To learn more about preventative ways to stop healthcare cybersecurity threats and upskill your cyber team, <strong><a href=\"https://marketing.circadence.com/acton/attachment/36273/f-8cdcab7f-21bb-4de6-bada-e1b510d36214/1/-/-/-/-/Healthcare%20Infographic%20Final.pdf\">download our infographic: “Cybersecurity in Healthcare.”</a></strong></h3>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Healthcare Cybersecurity: In Critical Condition"}},{"node":{"id":"d58e5e19-9cc8-52d7-a811-7b6437be3c8c","slug":"obstacles-and-opportunities-in-cybersecurity-regulation-and-legislation","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/04/sebastian-pichler-25154-unsplash.jpg"},"date":"2019-04-22T08:18:40.000Z","content":"<p>As our world becomes increasingly dependent on the internet, more safeguards must be put in place in order to keep our information and services we rely on secure. In the last few years, we have seen an increase in regulations and legislation passed to uphold these safeguards, but it is unclear how much this has helped in thwarting attacks. Not only are we as consumers and individuals vulnerable to data breaches and cyberattacks, but our governments are at risk for cyberwarfare and potentially crippling assaults on resources and infrastructure.</p>\n<p>Governments around the world are implementing new cybersecurity legislation, such as the NIS Directive in the EU and the Cybersecurity Act of 2015 in the US to provide more structure and protocol to cybersecurity management. Many studies have been conducted to ascertain the level of sophistication in cybersecurity that different territories around the world possess, such as the Asia-Pacific Cybersecurity Dashboard. These studies consider legislation a basic indicator of the security landscape in these territories and helps cyber legislators identify strengths and opportunities for safety improvements.</p>\n<p>The number of new cyber laws shows the importance of implementing regulatory frameworks that protect us from a personal and business perspective. These frameworks help us to understand <strong>how to implement policy</strong>, as businesses generally don’t think much about cybersecurity unless they have to due to regulations. They also contribute to the <strong>reduction of security incidents and prevention of IT crime</strong>.</p>\n<h4><span style=\"color: #ff9900;\"><strong>CYBERSECURITY LEGISLATION OBSTACLES</strong></span></h4>\n<p>There are various cybersecurity technology obstacles in the way across territories that make the actual establishment and implementation of “global cyber legislation” no easy task. Here are just a few ways that legislation can be blocked, delayed, or become obsolete:</p>\n<ul>\n<li>Laws surrounding cybersecurity can easily fall behind in time and context, considering that technology is advancing at such a rapid rate.</li>\n<li>Technical and legal specification in varying countries make it difficult to respond to and rule on cybersecurity incidents for the industry as a whole.</li>\n<li>Considering that the internet is free and has no physical borders, constitutional or legal conflicts can arise concerning the meaning and conceptions of privacy and freedom of expression.</li>\n<li>There are limitations to the scope of application of some laws, most notably between public and private sectors that each face challenges of information access for use in investigations with security implications, privacy rights, and commercial interests. One such example is the well-known case between the FBI and Apple, in which a U.S. judge requested the cooperation of Apple in order to unlock the phone of a terrorist involved in an attack. However, due to user privacy rights, Apple did not condone unlocking that information.</li>\n<li>There can be delays in the enactment of laws brought on by political upheaval, issues affecting local initiatives, or adherence to international agreements.</li>\n<li>Attribution is always a challenge when it comes to cyberattacks. It can be extremely difficult to find out who did it or to prove who did it, which can make legislation ineffective.</li>\n<li>The global nature of cybercrime makes it incredibly difficult to prosecute those involved, as it all depends on what laws the perpetrators are governed under.</li>\n</ul>\n<p>Despite these obstacles, the frequency of cybersecurity laws around the world continues to rise as the number and severity of cyberattack incidents recorded worldwide does as well. Therefore, the aim is to have legal measures in place to require protection within various territories, and in a variety of industry sectors. With this goal in mind, legislators have started to consider the requirements necessary for security in their own countries first, including assessing the capacity to respond to large-scale incidents, the protection of critical infrastructure, and ability to collaborate with other countries.</p>\n<h4><span style=\"color: #ff9900;\"><strong>ENSURING CYBERSECURITY LEGISLATION KEEPS US SAFE</strong></span></h4>\n<p>While obstacles may be prevalent, there are actions we can take regardless of territory or region to ensure these laws keep us safe on the ground floor.</p>\n<ul>\n<li>Businesses need to frequently revisit their own cyber protocols and policies to ensure they align with state and federal laws in place, while also protecting their key cyber terrain.</li>\n<li>Leaders need to keep tabs on new legislative efforts to understand how new rules and laws impact them personally and professionally at their business. One of the largest costs of a cyber breach are legal expenses, which can be reduced by staying ahead of the game and mitigating risks.</li>\n<li>The C-Suite must ensure the organization is abiding by new cyber laws, and that disaster recovery involving cyber threats are practiced at least annually.</li>\n</ul>\n<p>Staying in tune with cyber legislation can mitigate your company’s risks before, during, and after a potential attack. There remains much to be done in this field, and as both technology and cybercrime continue to evolve, so will the legal landscape surrounding these incidences.</p>\n<p>&nbsp;</p>\n","title":"Obstacles and Opportunities in Cybersecurity Regulation and Legislation"}},{"node":{"id":"5137aab6-93a2-596e-b2a6-0d7b9bf776c7","slug":"the-internet-of-things-ushers-in-a-new-wave-of-cybersecurity-needs","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/04/domenico-loia-272251-unsplash.jpg"},"date":"2019-04-15T08:45:46.000Z","content":"<p>The internet has changed rapidly since its inception in 1983. The way we communicate, consume news and media, shop, and collect data are just a few examples of the way the internet has changed the world. A term you may have heard crop up in recent years is IoT, or <a href=\"https://www.iotforall.com/what-is-iot-simple-explanation/\">The Internet of Things</a>. IoT is about extending the purpose of the internet from use in day to day devices like smartphones and computers to use as a host of connected “things.”</p>\n<p>So why would we want to do that? When something is connected to the internet and able to send and receive information, it makes the device smart. The more smart devices we have, the more connected and controllable our environment will become. IoT provides important insights to businesses and people that allow them to be more connected to the world and to do more meaningful, high-level work.</p>\n<p>While the Internet of Things holds incredible potential for the world, it also means opening up more avenues of vulnerability for hackers to tap into our infrastructure, our homes, and our businesses. On a large scale, the development of “smart cities” are cropping up, promising better usage of resources and more insights from data among other things. On the other hand, this could allow hackers higher access to critical infrastructure leading to potentially crippling instances of national and industrial espionage. On a smaller scale, things like parking meters can be hacked in order to cheat the system for free parking.</p>\n<p>The rise in IoT security must match the explosive growth rates for these devices, which means that a new era of cybersecurity is being ushered in. <a href=\"https://www.iotevolutionworld.com/iot/articles/432498-new-survey-says-half-us-companies-using-iot.htm\">Nearly half</a> of U.S. companies using an IoT network have been hit by a recent security breach, and spending on IoT security will reach more than <a href=\"https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/How-loT-is-influencing-a-new-cybersecurity-era\">$6 billion globally</a> by the year 2023.</p>\n<p>Where does this leave us in a world with a seemingly bright technological future that holds such dark potential? As IoT continues to grow and evolve, it’s hard to say what specifics need to be put in place in order to keep it secure. However, there are some good general practices that can mitigate your personal and professional risk of being a victim of a breach.</p>\n<ul>\n<li>Be aware when it comes to downloading apps. Always read the privacy policy of any apps you’re thinking of downloading to see how they plan to use your information and more.</li>\n<li>Do your research before you buy. Smart devices collect a lot of personal data. Understand what’s being collected, how it’s being stored and protected, and the manufacturer’s policies regarding data breaches.</li>\n<li>It seems obvious, but use strong and unique passwords for your device accounts, Wi-Fi networks, and connected devices (and update them often).</li>\n<li>Use caution when utilizing social sharing features that can expose your location information and could let people know when you’re not at home. This can lead to cyberstalking and other real-world dangers.</li>\n<li>Install reputable security software on your devices and use a VPN to secure data transmitted on your home or public Wi-Fi.</li>\n</ul>\n<p>All these tips are focused on educating yourself as a responsible user of the internet and sharer of all things personal and professional. To protect yourself (and others around you), keep learning safer internet and cybersecurity practices. Cyber is always changing, just like the internet, and if we overlook a privacy policy or share a little “too much” on social media, we place ourselves at risk of exploitation and danger. It is up to us, the individuals who use this technology day in and day out, to create safer spaces online to communicate and continue to enjoy the internet in all its glory.</p>\n<p>Eventually, there is hope that the IoT industry is able to revolutionize cybersecurity for itself, as compliance and regulation never seem to catch up to the pace required by cyber defense technologies. Since this is still such a new industry and constantly evolving, utilizing the aforementioned tips and tricks will help you stay safe while IoT security gets its footing. There is a lot to look forward to as IoT continues to revolutionize the way the world works, it’s just a matter of time before cyber teams are ready to take on this new wave of security needs.</p>\n<p>Photo by <a href=\"https://unsplash.com/photos/EhTcC9sYXsw?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Domenico Loia</a> on <a href=\"https://unsplash.com/search/photos/internet?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"The Internet of Things Ushers in a New Wave of Cybersecurity Needs"}},{"node":{"id":"a2b8a0c3-bf74-53e3-a1ef-792e425e4f1a","slug":"a-new-perspective-changing-how-we-think-about-cybersecurity-training","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/03/sergio-souza-735921-unsplash.jpg"},"date":"2019-04-08T08:45:08.000Z","content":"<p>What if someone told you that there was a new way to commute to work in the morning? A way that was more efficient than taking the highways or backroads to avoid traffic – a way that would allow you to save time, headaches and the dangers of driving altogether…you’d be interested, right? Maybe a little skeptical, certainly, but interested. So would we! Changing the way we think about a process or an act does not happen at the flip of a switch. We know that.  However, the speed at which technology advances and new products and services hit the market with attempts to make our daily lives easier, faster, better requires us to be open to new ways of thinking about traditional approaches. In this blog, it’s about changing how we think about “cybersecurity training.”</p>\n<p>While we can’t help you teleport to your office or lend you a flying car, the concept behind the “better way to commute” scenario is exactly what we at Circadence are advocating for—A new way to think about cybersecurity training and skills development. Now, we realize that might not be as “cool” as teleportation but hear us out.</p>\n<p>When it comes to cybersecurity, we believe wholeheartedly that there is a better way to train cyber professionals on the latest tactics and techniques. Why? Current ways of developing professionals with “one-and-done” trainings in classroom settings aren’t working. How do we know this? Because <strong>businesses are still getting hacked every day.</strong> In 2018 alone, we saw a <a href=\"https://www.industryweek.com/technology-and-iiot/cyberattacks-skyrocketed-2018-are-you-ready-2019\">350% increase in ransomware attacks</a> and 250% in spoofing or business email compromise.<strong> If lecture-based, classroom setting, PowerPoint-driven training courses were working, we wouldn’t still be reading about breaches in our local and national news.</strong> Something new, something different has to be done.</p>\n<h3><strong>Talk to your teams</strong></h3>\n<p>People develop, use and control the technologies we have available to us. People are the mechanisms by which we execute certain security methods and procedures. People are the reason there are actual tools to help us stop threats. Talking to your team can help gain perspective on how they are feeling with their current workloads and where they want to improve professionally.</p>\n<p>Without well-trained individuals who persistently learn new skills and find better (more efficient) ways to operationalize cyber processes and techniques, our businesses and our personal information will be exploited—it’s only a matter of time. While you may be thinking “I send my team to an off-site course and they learn new stuff every time” then great! We invite you to take the next step and talk to those teams about how they’re using what they’ve learned in everyday cyber practice. Sometimes the first step in adopting a new way of thinking about a process (in this case, cyber training), we need to talk to the people who actually experienced it (those with boots on the ground).</p>\n<p>Talk to your teams about:</p>\n<ul>\n<li>their experience on-site at the training</li>\n<li>what their main takeaways were</li>\n<li>how they are applying learned concepts to daily tasks</li>\n<li>where they see gaps or “opportunities for improvement”</li>\n</ul>\n<p>Listening to teams and asking objective questions like this can shed light on what’s working in your cyber readiness strategy and what’s not.</p>\n<h3><strong>Reframe negative thoughts</strong></h3>\n<p>Things that are new and different are disruptive and that can be scary for leaders looking for concrete ROI to tie to cyber readiness solutions. <em>Forbes</em> suggests <a href=\"https://www.fastcompany.com/40494077/4-ways-to-train-your-brain-to-be-more-open-minded\">reframing negative thoughts</a> as well. In thinking about a new way to do cyber training, instead of “gamified cyber learning will never work,” come from a place of inquiry and curiosity instead. Reflect on what feelings or experiences are causing you to think negatively about a new way of doing something.</p>\n<p>Ask objective questions like:</p>\n<ul>\n<li><a href=\"https://www.circadence.com/finding-the-needle-in-the-cybersecurity-haystack-why-gamification-is-the-answer-youve-been-looking-for/\">What is gamification in the first place?</a></li>\n<li>What are the pros and cons of gamified learning?</li>\n<li>How could my team even adopt a gamified learning approach?</li>\n</ul>\n<p>Understanding how something works or could work for your specific situation is the foundation for evaluating the merit of any new process or approach presented to you.</p>\n<h3><strong>Know Today’s Cyber Training Options </strong></h3>\n<p>How cyber training has been conducted hasn’t changed much in the past several years. Participation in courses require professionals to travel off-site to facilities/classrooms where they gather together to listen to lectures, view PowerPoint presentations and videos, and maybe engage in some online lab work to “bring concepts to life.”</p>\n<p>Travel costs incur, time away from the frontlines occurs, and learners often disengage with material that is passively delivered to them (only <a href=\"https://cdns3.trainingindustry.com/media/3203537/game%20based%20learning.pdf\">5% of information is retained</a> with passive-learning delivery).</p>\n<p>One of the biggest gaps in cyber training is that there isn’t a way to effectively measure cyber competencies in this traditional method. The proof is in the performance when professionals return to their desks and attempt to identify incoming threats and stop them. That absolute, black and white, way of measuring performance is too risky for businesses to stake their reputation and assets on.</p>\n<p>Leaders who send their teams to these trainings need to know the following:</p>\n<p style=\"padding-left: 40px;\">1) what new skills cyber teams have acquired</p>\n<p style=\"padding-left: 40px;\">2) how their performance compares to their colleagues</p>\n<p style=\"padding-left: 40px;\">3) what current skills they have improved</p>\n<p style=\"padding-left: 40px;\">4) what cyber activities have they completed to demonstrate improvement/progression</p>\n<p>Today’s off-site trainings don’t answer those questions until it’s too late and a threat has taken over a network. Professionals can “see” really quick when a learned skill doesn’t translate to real life.</p>\n<h3><strong>Embrace the journey of learning</strong></h3>\n<p>There is a better way to train professionals and it can happen with gamification. But don’t let us be your only source of truth. Talk to people. Listen to their experiences training traditionally and hear firsthand what they want out of a skill building opportunity. Read the latest research on gamification in the corporate workplace. Then, make connections based on the intel you’ve gathered to evaluate if gamification is right for your organization’s professional development approach.</p>\n<p>We’ll be here when you’re ready to dive deeper into specific solutions.</p>\n<p>Photo by <a href=\"https://unsplash.com/photos/V2cASd1teqE?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">sergio souza</a> on <a href=\"https://unsplash.com/search/photos/perspective?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"A New Perspective: Changing How We Think About Cybersecurity Training"}},{"node":{"id":"fa467c4b-1469-5e68-8eb0-28ab50b83a0a","slug":"are-you-living-the-ciso-nightmare-five-cyber-concerns-keeping-them-up-at-night","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/03/sergey-zolkin-192937-unsplash.jpg"},"date":"2019-04-01T08:45:12.000Z","content":"<p>What keeps CISOs up at night? Is it the looming concern of a threat? The uncertainty of cloud security? Wondering if you have enough cyber pros on the frontlines to defend and protect? Maybe it’s all three –and more. CISOs are carrying a lot of security responsibility on their shoulders, all while trying to make sure their department is transparent, vigilant, agile, and of course, secure. Focusing on so many areas of digital opportunity, security vulnerability, and defensive improvement make it challenging for CISOs to truly dedicate attention to any specific operational “thing” for too long before they have to move to the next issue. Adapting to this rapid change of pace in the security industry can compromise security strength and lead to growing concerns about whether teams are really prepared for the next threat. We’ve pinpointed the top five cybersecurity concerns of CISOs that are stuff nightmares are made of.</p>\n<ol>\n<li>\n<h3><strong>New Threats </strong></h3>\n</li>\n</ol>\n<p>This shouldn’t be a surprising concern. Threats are ever-evolving just as technology and digital connectivity is. While CISOs strive to keep their defenses up to snuff with the latest technology, there is always a new weakness waiting to be exploited. The recent government shutdown is a perfect example. It pulled many defenders off the frontlines of security, leaving the door wide open for malicious hackers to walk on it and do unimaginable damage. Also, the 2016 election attracted black hat hackers to manipulate public perception of the race via the use of social media. There’s always a new threat, a new vulnerability to be wary of—and CISOs are looking for ways to ensure their teams are always ready, always prepared, and have the proper support they need from machines and fellow colleagues to keep assets and people safe from harm.</p>\n<ol start=\"2\">\n<li>\n<h3><strong>Minimal Agility </strong></h3>\n</li>\n</ol>\n<p>While CISOs desire agile operations and solutions, many still follow a linear “waterfall” model with sprinklings of agile adaptations. Developers, in particular, create security solutions tend to follow prescriptive, step-by-step requirements without always considering how security fits into the bigger solution picture. One can imagine the repercussions of such an approach. Failure to close the widening gap between deployment velocity and security implementation can yield weak security resilience. CISOs wonder if their organizations are strong enough to have both deep security testing in place and remediation plans effective enough to remove any semblance of fear, uncertainty, and doubt. <a href=\"https://www.circadence.com/benefits-of-security-and-devops-working-together/\">DevSecOps</a> spells opportunity for agile security as the approach advocates for the integration of security “checks” during every stage of development from planning to coding to testing and deployment and monitoring.</p>\n<ol start=\"3\">\n<li>\n<h3><strong>IoT and Cloud Security </strong></h3>\n</li>\n</ol>\n<p>As work migrates out of the traditional office, users are moving off the network and accessing the cloud directly. More applications and servers are moving to the cloud to save money, achieve scale, and obtain greater access. However, massive amounts of sensitive data are now stored in the cloud and the “location” of that data and perceived lack of visibility is concerning for CISOs. According to a <a href=\"https://www.kaspersky.com/blog/ciso-report/24288/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=gl_pr-infl_organic&amp;utm_content=link&amp;utm_term=gl_newsletter_organic_link_email_pr-infl\">Kaspersky Lab study</a>, one in three CISOs ranked cloud computing as a top security risk. Part of a CISO’s job is to apply controls to cloud security but when other responsibilities including managing security solutions take priority, concerns of cloud security often go unalleviated.</p>\n<ol start=\"4\">\n<li>\n<h3><strong>Cybersecurity Skills Gap </strong></h3>\n</li>\n</ol>\n<p>This is one of the reoccurring nightmares for CISOs: finding and retaining enough security talent to bolster a capable cyber team with the right skills to address attacks. CISOs need a solution to improve the cyber skills at their company but can’t realistically send everyone away to class. Likewise, CISOs may realize they have skills gaps on their teams and assessing their competencies and hiring the right talent is becoming a growing challenge. Further, every CISO is concerned about their company being the next news headline of a cyberattack, so they are constantly worried about their overall cyber readiness and keeping their teams razor sharp. Looking down the barrel of a 300,000+ security job shortfall in the U.S. alone, CISOs fear their teams, whether large or small and mighty, may not have all the skills they need to effectively top new threats.</p>\n<ol start=\"5\">\n<li>\n<h3><strong>Rebuilding Trust </strong></h3>\n</li>\n</ol>\n<p>It’s been a bad few years for cybersecurity leaders with the growing number of well-publicized hacks of large and small companies. Naturally, such news leaves many consumers and company stakeholders distrusting companies who fall victims to these attacks. What’s worse is trying to rebuild trust after an attack. It’s not a flip of a switch or apologetic PR statement that automatically regains public trust in data security for a company. It can take months or even years for a company to bounce back from a breach of any magnitude. Privacy issues, security and device addiction are all elements that need to be addressed from the beginning in order to take ownership and responsibility of how customer data is stored, used, transferred, and accessed.</p>\n<p>There’s often too much momentum in the way of today’s cyber operations to allow for any kind of change but this is something that MUST change. CISOs and their teams live with cybersecurity worries, threats, and “unknown unknowns” that are simply too scary to block out. Frustrated talented resources and limited budgets perpetuate these cybersecurity nightmares. For CISOs to wake up from these horrible scenarios, they need to consider new ways to develop their teams and foster holistic “security is everyone’s responsibility” cultures in order to move forward. New threats, cloud security issues, and skill gap concerns can be quelled with the proper persistent learning solutions in place to empower and augment cyber teams toward a stronger security infrastructure. Likewise, educating the entire staff, not just the IT department on security issues and best practices ensure everyone will have sweeter dreams.</p>\n<p>Photo by <a href=\"https://unsplash.com/photos/_UeY8aTI6d0?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Sergey Zolkin</a> on <a href=\"https://unsplash.com/search/photos/business-man?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></p>\n","title":"Are you living the CISO nightmare? Five Cyber Concerns Keeping Them Up at Night"}},{"node":{"id":"7b17e150-826d-5bad-a77f-c62a96e4bc46","slug":"on-the-move-cyberattacks-on-the-transportation-industry","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/03/m_v_-777372-unsplash.jpg"},"date":"2019-03-27T14:07:05.000Z","content":"<p>Everything is on the move. People. Agriculture. Water. Power. Materials ranging from home goods to hazardous waste all flow through a massively complex, public/private, interconnected – and increasingly automated – hive of vehicles and transport systems.</p>\n<p>According to the Department of Homeland Security:</p>\n<ul>\n<li>More than 19,000 airports with 780,000 commercial flights a month</li>\n<li>361 ports and 95,000 miles of coastline</li>\n<li>Billions of passenger trips on mass transit (buses, subway, commuter, etc.) annually</li>\n<li>Four million miles of roadway with 600,000 bridges and 400 tunnels</li>\n</ul>\n<p>Via plane, train, or automobile, the transportation sector supports nearly 10 percent of the U.S. GDP and transports nearly 20 billion tons in goods annually. Over the past couple of years, the industry has grown in complexity in logistical chains, production, facility and manufacturing partners, and plant management operations.</p>\n<p>As a result of such growth, the industry has shifted to more automated processes, turning paper documents into digital formats, and using advanced analytics to address customer needs. Those efforts have placed <a href=\"https://www.forbes.com/sites/oliverwyman/2017/06/28/time-for-transportation-logistics-to-up-its-cybersecurity-as-hackers-put-it-on-target-list/#43d718016fb9\">more transportation systems online</a>. With the expansion of the transportation industry into the digital domain, transportation cyber security has become more important than ever before.</p>\n<h2><strong>Historical cyber attacks on transportation systems</strong></h2>\n<ul>\n<li><a href=\"https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/\">Maersk</a>: Petya malware variant infected the IT systems of the world’s largest shipping company with 600 container vessels handling 15% of the world’s seaborne trade in June 2017.</li>\n<li><a href=\"http://securityaffairs.co/wordpress/37997/cyber-crime/hacked-airline-lot.html\">LOT</a>: A Polish airline canceled 10 flights due to an attack against the airline’s ground computer systems at Warsaw’s Okecie airport in June 2015.</li>\n<li><a href=\"http://securityaffairs.co/wordpress/38739/hacking/connected-car-hacking.html\">Jeep Cherokee</a>: A coordinated attack in 2015 by Charlie Miller and Chris Valasek demonstrated the ease by which a connected car can be remotely hacked into, in this case, using Uconnect.</li>\n</ul>\n<p>While many transportation companies understand the importance of keeping data and passengers safe and secure, a few companies have experienced the detrimental effects of an attack similar to other industries like the financial sector and healthcare.</p>\n<p>From ransomware attacks to data breaches, the transportation sector is not immune to malicious hackers. While the industry has been thought of as “less vulnerable,” it also means the industry could be next in line for hackers to target. This is especially true now that automobiles and transit systems are becoming increasingly more connected via IoT, or the Internet of Things. Many cars now come with their own WiFi hotspot, public transportation utilizes apps to help you get around, and specialty lanes on the highway use the internet to charge for driving in things like the express lane.</p>\n<p>Unauthorized users know that such “untapped” industries are indeed at risk because they haven’t been attacked yet, leading industry professionals to believe their systems are secure and not defenseless. A system may appear to be secure, but until the first oversight or staffing shortfall impacts security, it’s hard to be 100% certain. The transportation industry is new territory that can be easily exploited if persistent cyber learning, procedures and processes are not put in place.</p>\n<p>Since most transportation organizations keep cybersecurity responsibilities in-house, building a culture of awareness within the organization that prioritizes education, skill-building, and continual awareness, is crucial to staying on top of threats. Transportation industry cyber teams and CISOs would do well to be proactive in their cybersecurity efforts instead of hoping their systems are secure from hackers. Hope isn’t a strategy.</p>\n<p>So, what is the best strategy? Continuous learning that upskills your cyber teams. It can and should be a part of the transportation sector’s cyber readiness efforts to constantly improve their posture. Because, as we know, the only constant in cybersecurity is change. The transportation industry is dynamic and evolving, just like cyber threats. Cybersecurity is the responsibility of everyone, not just those in IT. All need to take ownership of how they contribute to the security of the company.</p>\n<p>Failure to provide responsible oversight will not only impact everyone personally employed in the company, but it will have a ripple effect that extends out to the great social, political, and economic groups that depend on transportation.</p>\n<p>Transportation’s reach and integration with so many other industries <em>requires and demands </em>a stronger cybersecurity arm. To start strengthening the sector, we’ve prepared four strategies to form an elite cyber team. Without a strong cyber team in place, the newest technologies and tools will only go as far as the skill sets and knowledge base of your cyber team.</p>\n","title":"On the Move: Cyber Attacks on Transportation Systems"}},{"node":{"id":"a8d00707-a06f-5f10-b4a4-58df22aa54e6","slug":"hope-for-cybersecurity-cyber-teaching-challenges-new-horizons-for-cyber-learning","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/03/john-schnobrich-520023-unsplash.jpg"},"date":"2019-03-18T09:30:50.000Z","content":"<p>The statistics are dismal. An estimated <a href=\"https://cybersecurityventures.com/jobs/\">3.5 million unfilled cyber positions by 2021</a> and today, we have over <a href=\"https://www.cyberseek.org/heatmap.html\">300,000 openings in the U.S.</a> alone. According to a <a href=\"https://www.nytimes.com/2018/11/14/opinion/cybersecurity-education-skills.html\">New York Times article</a>, “filling those jobs would mean increasing the country’s current cybersecurity workforce of 715,000 people by more than 40 percent,” according to <a href=\"https://www.nist.gov/news-events/news/2018/11/new-data-show-demand-cybersecurity-professionals-accelerating\">data</a> presented at the National Initiative for Cybersecurity Education Conference. If you’re a student in cyber or are just undeclared, there hasn’t been a better time to consider cybersecurity as a professional career. The field has come a long way from the stereotypical hoodie-wearing, Mountain Dew sipping worker in a dark room performing tedious coding tasks.</p>\n<p>Cybersecurity is so much more than that—and it’s exciting! Don’t believe us? At Divergence Academy, we are preparing the next generation of cyber professionals to enter the workforce and alleviate the skills gap through <a href=\"https://www.circadence.com/guest-blog-embracing-immersive-gamified-cybersecurity-learning-featuring-divergence-academy/\">gamified learning</a>. If more institutions adopted such an approach, we as educators would be more successful at not just engaging our students in teaching relevant concepts and theory, but successful at helping them build skills needed in today’s workforce.</p>\n<h3><strong>Cyber Teaching and Learning Challenges</strong></h3>\n<p>But before we get into the “hopeful” part of this article, we need to understand the challenges in teaching cyber in the first place. The way that cybersecurity has been taught throughout the years often include lectures, PowerPoint presentations or online models that students complete on their own. Inherently there is nothing wrong in teaching new information in this way. However, the opportunity exists to help students learn how to apply this knowledge to a real-world setting. The act of doing and creating the needed experience is the single most important quality job candidates can bring to an employer and this is the gap Divergence Academy is hoping to close.</p>\n<p>When students sit in a classroom, information can be presented in a systematic way, where in real life this may not always be the case, especially in the world of cybersecurity.</p>\n<blockquote><p><strong>When you think of teaching someone how to think like a hacker, you are fundamentally teaching them how to be creative in how they approach a situation. </strong></p></blockquote>\n<p>The concept of teaching someone to think like a hacker is easier said than done, which is why diversifying the way students can process information is crucial. Not every student learns in the way same.</p>\n<h3><strong>There’s Hope for Cybersecurity: Continuous Skills Acquisition and Application</strong></h3>\n<p>As cyber educators and instructors, we know there is no “one-way” to teach and that’s the good news! While certifications and technical degrees are a starting place for cybersecurity readiness and workforce development, instructors must think of new methods that provide persistent access to cyber education.</p>\n<p>This statement can best be described with an analogous story. If an aspiring baseball player was training for the major leagues and went to practice to hone his/her skills, they would certainly learn something. However, if that aspiring baseball player then applied for the major leagues a year or so later, without attending training leading up to that point, he/she would be a little rusty, wouldn’t you say? The same situation can be applied to cybersecurity. You wouldn’t attend a class or even complete a full degree in cybersecurity and then apply for a job and say you were a “seasoned cybersecurity professional,” would you? Of course not. There is no “final inning” in cybersecurity signaling a professional’s peak of learning and skills acquisition.</p>\n<p>Threats evolved day by day and if a student graduates thinking about phishing or malware detection one way and ends up in a work environment where that knowledge isn’t applicable anymore, we won’t be able to help the next generation of cyber pros be successful in their jobs. To keep current students and alumni actively engaged in critical learning, persistent access to cybersecurity training must be employed. In this industry, the only constant in cybersecurity is change, and for that reason (in addition to the multitude of attacks businesses every day), educational institutions can be vigilant in putting learning to work for the businesses and workplaces we rely on to support our daily functions.</p>\n<p>As technology and interconnectivity evolve with each passing day, steps must be taken immediately to adopt a pedagogy that values and emphasizes continuous learning to best prepare our students for the career they want. With gamified learning at the helm of a new teaching approach for cybersecurity, we can be on our way to minimizing the cyber skills gap and empowering today’s students in a more effective way.</p>\n<p>For more information about our gamified learning cyber courses, visit <a href=\"https://divergenceacademy.com/\">https://divergenceacademy.com/</a>.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Hope for Cybersecurity: Cyber Teaching Challenges &#038; New Horizons for Cyber Learning"}},{"node":{"id":"5ebf8610-d040-5a9a-bebf-1c6627daa1eb","slug":"guest-blog-embracing-immersive-gamified-cybersecurity-learning-featuring-divergence-academy","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/03/brooke-cagle-609873-unsplash.jpg"},"date":"2019-03-11T07:25:10.000Z","content":"<p>What is immersive, gamified cybersecurity learning? The term was originally coined in 2002 by a British computer programmer named Nick Pelling. The term hit the mainstream when a location-sharing service called Foursquare emerged in 2009, employing gamification elements like points, badges, and “mayorships” to motivate people to use their mobile app to “check in” to places they visited.  The term hit buzzword fame in 2011 when Gartner officially added it to its <a href=\"https://www.gartner.com/doc/3769145/hype-cycle-education-\">“Hype Cycle” list</a>. But gamification is more than a buzz word. Companies have seen gamification work for them in cyber team training—so we thought it wise to take what is working and apply it at the earlier stages of career development—in the classroom.</p>\n<p>At <a href=\"https://divergenceacademy.com/\">Divergence Academy</a>, we are proud to offer a curriculum that embraces blended cyber learning to cultivate students and transitioning professionals who are ready to enter the workforce and stop today’s cyber threats.</p>\n<p>We offer data science, cybersecurity, and cloud computing immersive learning programs that enable students to gain the knowledge and skills needed to work in any of those fields. Many of our courses offer a mix of concept-driven learning and application-driven learning so that students understand new knowledge and, in turn, apply that knowledge in skill building, project-based activities. Through working with messy, real-world data and scenarios, students gain experience across the entire technology spectrum.</p>\n<p><a href=\"https://cdns3.trainingindustry.com/media/3203537/game%20based%20learning.pdf\">Studies</a> find when learners engage in active learning, hands-on activities, their information retention rates increase from 5% (with traditional, lecture-based methods) to 75%. The millennial generation presents radically different learning preferences than previous generations. Thus, educational institutions across the country should consider gamification as a pedagogical technique in the classroom. <a href=\"https://pdfs.semanticscholar.org/c362/7ebee2c21c9589ed68cb9843b66ba2ec912e.pdf\">A study from the University of Limerick</a> notes:</p>\n<p><em>Gamified learning activities could become an integral part of flipped teaching environments. Their social, asynchronous nature can be used to prompt students to engage with pre-prepared content, while gamified learning activities can be used in the classroom to prompt student interaction and participation.</em></p>\n<p>In watching our students engage with gamified activities, we see team-building blossom before our eyes. We see instant collaboration and problem-solving and critical thinking emerge. Those kinds of soft skills can’t always be taught in a traditional lecture-based setting and because of that, it is critical that we continue to offer a healthy mix of concept-driven learning with gamified learning opportunities to our students so that they can enter the workforce with a more holistic understanding of the industry.</p>\n<p><strong>Cybersecurity has become a captivating and engaging subject matter for students, which is fantastic as those words aren’t typically associated with the technical field. </strong></p>\n<blockquote><p>“Wow, today we were introduced to Project Ares. Captivating is the best description I can think of. It is like ‘Call of Duty’ for cybersecurity.”<br />\n~ Divergence Academy Student, 24 years old</p></blockquote>\n<p>Fellow professors and instructors are looking for ways to make cybersecurity more interesting and attractive to students and we believe at Divergence, the gamified learning approach can help. It is an approachable way for students to engage with a field they may be completely unfamiliar with and it supports instructors by offering a course that students WANT to take.</p>\n<blockquote><p>“We notice an increase in student engagement in the classroom with the introduction of Project Ares. Gamification brings an element of intrigue and satisfaction to the learning experience.”<br />\n~ Beth Lahaie, Program Director</p></blockquote>\n<p>We hope our adoption and proven success of a blended learning approach is the nudge other institutions around the globe need to consider its power in building the next generation of cybersecurity professionals.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Guest Blog: Embracing Immersive, Gamified Cybersecurity Learning, Featuring Divergence Academy"}},{"node":{"id":"206ab4a8-b7c4-5abf-9664-18034f1ea371","slug":"guest-blog-reimagining-cyber-learning-for-students-featuring-divergence-academy","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/02/kids-Ares.jpg"},"date":"2019-03-04T15:08:35.000Z","content":"<p>&nbsp;</p>\n<p>It’s one thing to talk about the importance of teaching cybersecurity in an engaging way, and another thing to actually do it. <a href=\"https://divergenceacademy.com/\">Divergence Academy</a> is proud to partner with Circadence to reimagine how cybersecurity is taught to current and aspiring professionals.</p>\n<h3><strong>About Divergence Academy </strong></h3>\n<p>Divergence Academy is an education institution creating adaptive learning solutions to empower individuals to pursue the work they love on the most relevant skills of the 21st century – from web development to data science to product management. It was established in 2014 as the first Data Science school in the Dallas/Fort Worth area school that used a hybrid approach to learning. It offers immersive and weekend programs for working professionals, college grads and transitioning workers.</p>\n<p>In early 2017, the academy grew to partner with leading cybersecurity organizations including E.C. Council and CompTIA to offer certified learning for students. However, it found that the curriculum was missing something—a “WOW” factor—a platform where learning could be managed and developed using a more hands-on approach, allowing students to level up and reinforce the skills they were learning towards certification.</p>\n<h3><strong>A Gamified Approach to Cyber Learning</strong></h3>\n<p>In realizing that we needed a more robust learning platform that complemented the certifications we offered, we were introduced to Circadence, a market leader in cybersecurity readiness, known for its Project Ares<sup>Ò</sup> cyber range solution. It incorporated gamification into every aspect of the learning process, which encouraged students to progress through real-world exercises at their own pace and with a level of engagement unseen in previous traditional course sessions.</p>\n<h4><strong><em><span style=\"color: #ffffff;\">Finding Project Ares put us on the map as an institution that put learning to work and it showed that we are not just an AI school but a school that teaches what we preach!</span> </em></strong></h4>\n<h3><strong>The Class: Cybersecurity Professional Penetration Tester </strong></h3>\n<p>We launched our <a href=\"https://divergenceacademy.com/events/2-cybersecurity-professional-penetration-tester/\">12-week class using Project Ares</a> in early February 2019. The program is a 400-hour course delivered over 2 weekday evenings and Saturday to prepare students for the role of Certified Ethical Hacker. We have a mix of students from mathematicians to software engineers to IT students all with varying levels of knowledge of cybersecurity, but anxious to learn.</p>\n<p>In Project Ares, students are able to identify “learning moments” where they begin to connect the dots on how a cyber concept is applied to a real scenario. They try to solve problems together, which is exactly what a real cybersecurity job would require.</p>\n<p>Not only are students learning industry-wide technical competencies such as information assurance, risk management and incident detection but also workplace competencies like teamwork, planning and organizing, problem-solving, and more. In preparing for a CEH role, students engage in the battle rooms, learning foundational skill sets and then apply them to a methodology in the missions. Skills like system hacking are learned in Missions 8-10, 12, and 13, and enumeration in Mission 1, and reconnaissance in Mission 1.</p>\n<p>The feedback from them is reassuring that Divergence Academy and Circadence are a powerful partner. We hear they enjoy collaborating with their peers in exercises within the platform and they kind of form their own “tribes” if you will and that’s the beauty of gamified learning. It really teaches these students how to work together, build soft skills, and technical skills needed for today’s workforce.</p>\n<h3><strong>The Impact of Project Ares </strong></h3>\n<p>Project Ares has allowed our instructors to really focus on our student’s performance. The automated, in-game advisor Athena within Project Ares helps students progress from activity to activity and solve problems quicker, which helps instructors prioritize the pace of learning from all students and in using the trainer view in Project Ares, see where the skills gaps are and how to better inform the exercise content to meet the individual needs of the students. Further, the automatic scoring and badging in the platform coupled with the media center allows instructors to easily align course curriculum with the platform’s games, whether it’s in a mission, a battle room, or through a mini-game.</p>\n<h3><strong>A Vision Come to Life </strong></h3>\n<p>Divergence Academy is excited to build a network with local community colleges in the Dallas/Fort Worth area in order to help upcoming graduates and faculty see us as a school that takes student learning to new levels—applied levels—practical levels that are relevant to the workforce. We hope local schools see our trade school as the next step in their learning journey to cybersecurity professionalism and understand that they will be able to get hands-on skill building (or upskilling) and practical experience.</p>\n<p>&nbsp;</p>\n<p>To learn more about Divergence Academy and how they’re using Project Ares to support student learning, visit <a href=\"https://divergenceacademy.com/\">https://divergenceacademy.com/</a>.</p>\n<p><strong> </strong></p>\n","title":"Guest Blog: Reimagining Cyber Learning for Students, Featuring Divergence Academy"}},{"node":{"id":"7b475edc-3111-5e7b-8222-05508de68384","slug":"ten-reasons-to-check-out-san-francisco-while-at-rsa","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/02/ragnar-vorel-311734-unsplash.jpg"},"date":"2019-02-13T09:15:26.000Z","content":"<p><em>Your definitive guide to de-compressing from the tradeshow chaos.</em></p>\n<p>Exhibiting at and attending a tradeshow can be stressful. Packing, getting to your flight on time and finding your way in a “new” city are all trying. Not to mention, once you arrive at the show, the hours are long, the coordination is tedious, and all the coming and going from various conference rooms is tiresome—plus you are “always on.” We think you deserve a break! If you’re gearing up for the <a href=\"https://www.rsaconference.com/\">RSA 2019 Conference</a> in San Francisco, CA this year March 4-8 at the Moscone Center, we’ve compiled the best stress-reducing, fun activities to do and see (after <a href=\"https://marketing.circadence.com/acton/media/36273/circadence-at-2019-rsa-convention\">visiting with us at booth #6583</a>, of course).</p>\n<ol>\n<li><a href=\"https://www.rsaconference.com/events/us19/agenda/rsac-after-hours\">RSAC After Hours Events</a>: These events, hosted by the conference, offer Full Conference and Discover Pass holders the chance to hang out with industry peers and colleagues in a setting of their choice.\n<ul>\n<li>Tuesday, March 5<sup>th</sup> After Hours: Game Night at Moscone Level 2 from 7:00 p.m. to 9:30 p.m.</li>\n<li>Wednesday, March 6<sup>th</sup> After Hours: Whiskey &amp; Wine Tasting at Marriott Marquis Golden Gate B&amp;C from 6:30 p.m. to 8:00 p.m.</li>\n<li>Thursday, March 7<sup>th</sup> After Hours: Comedy Club at Moscone South Esplanade from 6:30 p.m. to 8:30 p.m.</li>\n</ul>\n</li>\n</ol>\n<ol start=\"2\">\n<li>Check out <a href=\"http://www.sfviewlounge.com/\">The View Lounge </a>rooftop at the Marriott Marquis for some delicious cocktails and incomparable views of the city. Only a 6-minute walk from Moscone Center! It’s the perfect place to bring clients and partners, do some networking, or enjoy a little alone time at the end of a long day of networking and meetings.</li>\n<li>Head to the <a href=\"https://www.ferrybuildingmarketplace.com/\">Ferry Building</a> to enjoy the sights and sounds of the city. The expansive marketplace inside is home to wine, coffee, food, and souvenirs. A great spot to grab some lunch or coffee and get out of the conference room.</li>\n<li><a href=\"https://yerbabuenagardens.com/\">Yerba Buena Gardens </a>is a beautiful place to reflect on the tradeshow experience thus far and find some peace after the busyness of the day. Serene waterfalls, sprawling lawns and gorgeous gardens are sure to help you unwind, and it’s right across the street from the conference. Beyond being a great place to relax, a sponsored game of <a href=\"https://www.rsaconference.com/events/us19/agenda/sessions/16675-SANS-Core-NetWars-Experience-%E2%80%93-Intro-to-Capture-the-Flag\">Intro to Capture the Flag</a> will be taking place in the park from 8:00 a.m. to 9:30 a.m. on Thursday, March 7<sup>th</sup>. This is a women’s only game geared toward beginners. You will gain real-life hacking experience while collaborating, game playing, and enjoying coffee and bagels.</li>\n<li>If you’re looking for hot new restaurants to try, look no further than these gems near the tradeshow:\n<ul>\n<li><a href=\"https://www.ayalarestaurant.com/\">Ayala Restaurant</a> – A seafood-centric haven in the bottom of Hotel G in Union Square (another great place to visit).</li>\n<li><a href=\"https://www.zybistro.com/\">Z&amp;Y Bistro</a> – Ramen, hot pot, and skewers with minimal, upscale décor. This “baby brother” of Z&amp;Y Restaurant is located just northwest from the original on Jackson Street.</li>\n<li><a href=\"https://www.michaelmina.net/restaurants/san-francisco-bay-area/trailblazer_tavern/\">Trailblazer Tavern</a> – Located in the SalesForce East Building, unique Hawaiian comfort food abounds in a modern space. Open for lunch, happy hour, and dinner with an indoor dining room, bar, and heated patio.</li>\n</ul>\n</li>\n<li>Visit the <a href=\"https://www.sfmoma.org/\">San Francisco Museum of Modern Art</a>, just around the corner from Moscone. The inspiring art and calm atmosphere are just the ticket for hitting the re-set button. <a href=\"https://www.sftourismtips.com/free-museum-admission-days.html\">Here</a> is a list of museums that offer free days around the city if you find yourself craving more artistic expression!</li>\n<li>If art isn’t your thing, or you’re on the hunt for a very authentic San Francisco experience, be sure to check out the <a href=\"http://www.cablecarmuseum.org/\">Cable Car Museum</a>. It’s a free museum in the Nob Hill neighborhood. It holds historical and explanatory exhibits on the San Francisco cable car system, which can be regarded as a working museum in and of itself. If you’d like to actually ride one, <a href=\"https://freetoursbyfoot.com/cable-cars-san-francisco/\">here</a> is a list of routes, tickets, and schedules.</li>\n<li>After spending the day at the tradeshow, why not visit the <a href=\"https://goldengatefortunecookie.squarespace.com/\">Fortune Cookie Factory</a> and see what the future holds for you? This little bakery offers free tours, delicious fortune cookie flavors and toppings, and makes over 10,000 cookies per day, by-hand, from scratch. You can also get custom fortunes made as a gift for your colleagues and newfound customers and partners!</li>\n<li>Looking for an amazing shopping experience in the city? The <a href=\"https://www.westfield.com/sanfrancisco\">Westfield San Francisco Center</a> has you covered. From top department stores to small, SF-based boutiques, you can get whatever you need here. There’s also a dining hall and many delicious restaurants if you have trouble deciding what to eat.</li>\n<li>Still unsure of how to spend your time away from the Circadence booth #6583? Check out <a href=\"https://www.axonius.com/rsac-2019-parties/\">this</a> list of sponsored parties around town. Keep checking back as this list will continue to get updated!</li>\n</ol>\n<p>We hope you find time to enjoy yourself this year at RSA. Kickstart your city adventures with some fun and be sure to <a href=\"https://marketing.circadence.com/acton/media/36273/circadence-at-2019-rsa-convention\"><strong>visit the Circadence booth #6583</strong></a> for more excitement. We would love to talk shop and hear what you’ve been able to do from our list!</p>\n<p>Photo Credit: https://unsplash.com/@sonuba</p>\n","title":"Ten Reasons to Check Out San Francisco while at RSA"}},{"node":{"id":"a5db9beb-7f4b-5314-8e97-dbabb4334b66","slug":"guest-blog-taking-cybersecurity-learning-to-a-whole-new-level","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/02/MicrosoftTeams-image-9.png"},"date":"2019-02-12T15:47:01.000Z","content":"<p>Last week I was lucky enough to be able to attend <a href=\"https://marketing.circadence.com/acton/media/36273/cyber-learning-tour-with-microsoft\">Circadence’s <em>Cyber Learning Tour</em></a> at the Microsoft Technology Center in Chicago.  This event was hosted by Laura Lee, VP of Rapid Prototyping,  and one of the lead creators of the Project Ares training platform.</p>\n<p>The opportunity to attend this event and hear from the brains behind Project Ares was an eye-opening experience for me.  The passion that Laura spoke with was something that I could relate to.  As someone who personally advocates for introducing more people to information technology and more specifically cybersecurity, it was amazing to hear Laura Lee talk about how she <a href=\"https://www.youtube.com/watch?v=JIqPhJtUGRs&amp;t=35s\">utilizes Project Ares in schools as early as middle school</a> to educate students on not only the importance of cybersecurity but also real-world scenarios.  Hearing Laura talk about kids using Metasploit, Nmap, Wireshark and learning how to defend simulated cyber-attacks or infiltrating networks with Project Ares is taking learning to a whole new level.</p>\n<p>One of the more interesting topics Laura brought up about the platform is the scoring capability and how it works within the learning environment.  She often finds students begin competing against each other on the platform by going through missions and assessments over and over again to see who can get the better score.  This brings another avenue of excitement and energy to cybersecurity that could lead to more exposure with things such as e-sports using Project Ares.</p>\n<p>The fact that Circadence has created a learning environment that brings gamification, cybersecurity, and training to the same platform is ground-breaking to me.  Here is a platform that will simulate real-world scenarios like bank networks, power grids, and other enterprise networks and you either must attack (red team) or defend (blue team) using real-world skills and tools.  If you’re a rookie at cybersecurity, Project Ares offers a variety of battle rooms and assessments that will help get you up to speed.</p>\n<p>To hear more about why gamification and AI-powered cyber learning is the future of cybersecurity skill building, check out one of their other Cyber Learning Tour stops here: <u>https://marketing.circadence.com/acton/media/36273/cyber-learning-tour-with-microsoft</u>.</p>\n<p>Follow Zach’s YouTube Channel I.T. Career Questions for all things cybersecurity learning and development here: <u>https://www.youtube.com/channel/UCt-Pwe2fODjH4Wuwf5VqE7A</u>.</p>\n","title":"Guest Blog: Taking Cybersecurity Learning to a Whole New Level"}},{"node":{"id":"7bf20990-737d-50de-a5d3-725ee2f8928a","slug":"a-call-to-diversify-the-cybersecurity-workforce","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/02/rawpixel-653764-unsplash.jpg"},"date":"2019-02-11T16:19:55.000Z","content":"<p>You’ve read about it, know it well, and can probably instantaneously identify one of today’s top cyber crises: the cybersecurity skills gap. It’s putting enterprises, governments and academic institutions at greater risk than ever because we don’t have enough professionals to mitigate, defend, and analyze incoming attacks and vulnerabilities. According to recent estimates, we are looking at the possibility of having as many as <a href=\"https://cybersecurityventures.com/jobs/\">3.5 million unfilled cybersecurity positions by 2021</a>. The widening career gap is due in part to the lack of diversity in the industry.</p>\n<ul>\n<li><a href=\"https://iamcybersafe.org/wp-content/uploads/2017/03/WomensReport.pdf\">Women only make up 14% of the U.S. cybersecurity workforce</a>.</li>\n<li>A <a href=\"https://www.isc2.org/-/media/Files/Research/Innovation-Through-Inclusion-Report.ashx\">Frost &amp; Sullivan report</a> found that 26% of the cybersecurity workforce are minorities.</li>\n<li>According to <a href=\"https://datausa.io/profile/soc/151122/#demographics\">Data USA</a>, almost three-fourths of information security analysts are white.</li>\n</ul>\n<p>And we’re not just talking about racial and ethnic diversity, we’re also talking about diversity of perspective, experience and skill sets. A recent CSIS survey of IT decisionmakers across eight countries found that 82% of employees reported a shortage of cybersecurity skills and 71% of IT decisionmakers believe this talent gap causes direct damage to their organizations<a href=\"#_ftn1\" name=\"_ftnref1\">[1]</a>. It’s not just the technical skills like computer coding and threat detection that are needed, employers often find today’s cyber graduates are lacking essential soft skills too, like communication, problem-solving, and teamwork capabilities<a href=\"#_ftn2\" name=\"_ftnref2\">[2]</a>.</p>\n<p><a href=\"https://techcrunch.com/2019/01/27/too-few-cybersecurity-professionals-is-a-gigantic-problem-for-2019/amp/\">An ISC<sup>2</sup> study</a> notes, organizations are unable to equip their existing cyber staff with the education and authority needed to develop and enhance their skill sets—leaving us even more deprived of the diversity we desperately need in the cybersecurity sector. The more unique thinking, problem-solving and community representation we have in the cybersecurity space, the better we can tackle the malicious hacker mindset from multiple angles in efforts to get ahead of threats. <em><a href=\"https://www.forbes.com/sites/ciocentral/2017/05/07/improving-cybersecurity-the-diversity-imperative/\">Forbes</a></em> assents, “Combining diverse skills, perspectives and situations is necessary to meet effectively the multi-faceted, dynamic challenges of security.”</p>\n<p>In an <a href=\"https://securityboulevard.com/2018/09/my-take-heres-how-diversity-can-strengthen-cybersecurity-at-many-levels/\">interview with <em>Security Boulevard</em></a>, Circadence’s Vice President of Global Partnerships Keenan Skelly notes that as cybersecurity tools and technology evolve, specifically AI and machine learning, a problem begins to reveal itself as it relates to lack of diversity:</p>\n<p>“The problem is that if you don’t have a diverse group of people training the Artificial Intelligence, then you’re transferring unconscious biases into the AI,” Keenan said. “What we really have to do…is make sure the group of people you have building your AI is diverse enough to be able to recognize these biases and get them out of the AI engineering process,” she added.</p>\n<p>The good news is that is it never too late to build a more diverse workforce. Even if your organization cannot hire more people from different career backgrounds or varying skill sets, existing cyber teams can be further developed as professionals too. With the right <a href=\"https://circadence.com/modern-cyber-ranges/\">learning environments</a> that are both relevant and challenging to their thinking, tactics and techniques, current employees can develop a more diverse set of cyber competencies; all while co-learning with diverse teams around the world.</p>\n<p>Companies can also build relationships with local educational institutions to communicate critical workforce needs to better align talent pipeline with industry needs, recommends a new study from the Center for Strategic and International Studies. Likewise, cyber professionals can be guest speakers or lecturers in local cyber courses and classrooms to communicate the same diversification needs in the industry.</p>\n<p>While some experts say it’s too late to try and diversify the workforce in thinking, skill, and background, we beg to differ. If we give up now in diversifying our workforce, our technology and tools will outpace our ability to use it effectively, efficiently, and innovatively. It’s not too late. It starts with an open mind and “take action” sense of conviction.</p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]</a> CSIS, <em>Hacking the Skills Shortage </em>(Santa Clara, CA: McAfee, July 2016), <a href=\"https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hacking-skills-shortage.pdf.\">https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hacking-skills-shortage.pdf. </a></p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]</a> Crumpler and Lewis, <em>The Cybersecurity Workforce Gap</em>, Center for Strategic and International Studies, January 2019.</p>\n<p>Photo Credit: https://unsplash.com/@rawpixel</p>\n","title":"A Call to Diversify the Cybersecurity Workforce"}},{"node":{"id":"27e5393b-b50c-5c38-9106-e5ddd7417bc3","slug":"making-cybersecurity-better-dan-manson-to-speak-at-rsa-2019","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/01/Ares-Dark-BG-1.jpg"},"date":"2019-01-23T15:44:41.000Z","content":"<p>With the New Year in full swing, we are resolved to improve not only our own products to meet industry shifts but helping improve cyber professional’s skill sets against evolving threats. One of the ways we are doing this is through the help of our team member Dan Manson, Instructional Designer (Level 5) and current Professor of Computer Information Systems at California State Polytechnic University, Pamona.</p>\n<p>Dan is speaking on a panel discussion at the upcoming <a href=\"https://www.rsaconference.com/\">RSA 2019</a> conference, titled <strong><a href=\"https://www.rsaconference.com/events/us19/agenda/sessions/14423-how-to-create-a-truly-diverse-cyber-workforce\">“How to Create a Truly Diverse Cyber Workforce”</a></strong><strong> on Thursday, March 7 from 1:30 p.m. – 2:30 p.m</strong>. alongside panelists Mat Neufield, CISO for Unisys, Jordan Jacobson, California State Polytechnic University, Pomona student. Shelly Westman, principal with EY will moderate.</p>\n<p>It is at events like RSA (<strong><a href=\"https://marketing.circadence.com/acton/fs/blocks/showLandingPage/a/36273/p/p-0095/t/page/fm/0\">Find Circadence and Project Ares at booth 6583</a></strong>), the Circadence team and visitors to our booth share industry perspectives and explore dynamic learning solutions for cybersecurity professionals. The insights from these meetings often influence our advance product capabilities, features, and offerings.</p>\n<p>In addition to sharing his expertise on the ways to diversify the cyber workforce, Dan looks forward to playing an integral part in our Project Ares<span style=\"font-size: 8pt;\">®</span> cyber learning platform evolution alongside the rest of our incredible team.  He is helping integrate proficiency standards and competencies into Project Ares curriculum to improve the overall training value, player scoring, points, badges, etc. He also supports the analysis of how well the training content aligns to the <a href=\"https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework\">NIST NICE Cybersecurity Workforce Framework</a>, identifying the gaps for our Cyber Education and Training department to consider in curriculum design.</p>\n<p>We know the cybersecurity landscape is fluid, in a constant flux of improving security provisions, processes, technology, and the professionals behind it all. Circadence understands that there is no “one-size-fits-all” solution, which is why our solution capabilities ride on the coattails of the frequent industry changes. Our <a href=\"https://www.circadence.com/about/circ-blog/new-developments-for-project-ares-3-6/\">“Living our Mission” blog series</a> keeps customers and interested parties current on the latest updates to our platforms and the benefits of the developments on organizational security posture.</p>\n<h4><span style=\"color: #ffffff;\"><strong>To learn more about how our gamified learning platform Project Ares is supporting a more diversified workforce in the midst of a widening skills gap, </strong></span><strong><a href=\"https://marketing.circadence.com/acton/media/36273/gamified-cyber-security-training?leadsource=OTHER\">download our white paper “The Importance of Gamification in Cybersecurity Training”</a></strong><strong><span style=\"color: #ffffff;\"> now.</span>  </strong></h4>\n<p>&nbsp;</p>\n","title":"Making Cybersecurity BETTER: Dan Manson to Speak at RSA 2019"}},{"node":{"id":"7ada3a91-2488-56be-bca6-9e881e9236c6","slug":"what-weve-learned-from-the-evolving-it-landscape-and-where-cybersecurity-is-headed-in-2019","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-06-25-at-12.07.12-PM.png"},"date":"2019-01-15T16:19:48.000Z","content":"<p>The new year is always a good time for reflection. At Circadence, we look back on how cyber security has evolved and think about the dynamic IT landscape to understand where CISOs and security leaders can direct their attention. To learn more, we tapped into our own cyber security expert Laura Lee, Executive Vice President of Rapid Prototyping, to answer some questions for us.</p>\n<h3><strong>Tell me briefly about your own background in IT security and how the changing landscape has impacted your approach.</strong></h3>\n<p>LL: I’ve been working in Computer Network Operations for over 20 years and have been involved in developing technology for protocol analysis, secure protocol development and defense strategies. I’ve seen tremendous technology evolution in that time as well as a reprioritization of security practices. In the past, we used to be able to rely more on technology (e.g., anti-virus, firewalls and IDS) but now the human cyber defender is critical.  Today, I lead multi-disciplined teams in the persistent development of our immersive cyber learning platform Project Ares, fusing real-world cyber ranges with engaging and gamified learning experiences. Early in my career, my focus was on protecting the networks for large radar and missile systems. For the last decade, I’ve been focused on cybersecurity defense tactics through training and exercises. The shift is a reflection of how cyber security has evolved over time, from being a siloed initiative rooted in government practices to a worldwide business to business effort layered with security complexities and interconnected devices and systems.</p>\n<h3><strong>How has the enterprise cyber security landscape changed in the past 30 years? Are organizations better off now than they were 30 years ago?</strong></h3>\n<p>LL: I have definitely seen improvements in enterprise IT, particularly in the last 10 years. There are now standards, like the <a href=\"https://www.nist.gov/?cpao=1045\">NIST Cybersecurity Framework</a>, which provides security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyberattacks.</p>\n<p>In the beginning of the Internet, we were working more on interoperability and sharing data – security was the last thought. Interoperability, which is the ability of computer systems to exchange and make use of information, was still very difficult when the internet first came into being. People weren’t able to share so much information as quickly, so the need for security systems and secure protocols wasn’t something to be concerned about. As the internet grew, so did the vulnerability of sharing personal data with the wrong people or networks. Online shopping, online banking, social media, etc. made information so easily accessible to hackers, that the focus had to shift to cybersecurity.</p>\n<p>Unfortunately, hackers and attacks have improved more than defenders, so we are far from “winning this cybersecurity war”. Not only are there more advanced tools that cybercriminals are rolling out and utilizing, but these criminals have more to gain and operate their hacks like a business. They use well-designed tools, such as FakeLogin and GM Bot, which make it easy for those who don’t necessarily have a technical background to launch a cyberattack. From data mining techniques to the sheer volume of information that many organizations keep on file, hackers can access more and reap a higher reward than ever before.</p>\n<h3><strong>What have been major cyber security milestones that have altered or shaped this market? Why are these the most significant?</strong></h3>\n<p>LL: I believe two things have made it harder to win the war against hackers. First, many offensive hacking tools (including previously classified government ones) have been released and are freely available online. These tools are the same ones that white hat hackers use, but for different purposes. While cybersecurity professionals use them to find vulnerabilities and deploy defensive mechanisms to prevent the exploitation of the network, hackers can use them to launch cyberattacks.</p>\n<p>While there are many reasons that we need offensive hacking tools, these tools also make it easier for black hat hackers to cause damage by publishing the found weaknesses. Black hat hackers use the information to launch malicious attacks against these networks based on the research gleaned from ethical hacking. This makes the barrier to entry very low for cybercriminals.</p>\n<p>Second, the advent of electronic currencies like Bitcoin have helped monetize cyber-crime. Bitcoin is decentralized, with no bank or single administrator, and can be sent from user to user on the peer-to-peer Bitcoin network without the need for intermediates. Cryptocurrency has made it easy for cybercriminals to monetize hacking. Prior to cryptocurrency, hackers used things like espionage, extortion, and identity theft to make money. Each of these methods came with big risks, which cryptocurrencies have solved by being anonymous, unregulated, and easily converted to cash value.</p>\n<p>These milestones have been a catalyst for the increasing ransomware attacks, such as the <a href=\"https://www.ajc.com/news/cost-city-atlanta-cyber-attack-million-and-rising/nABZ3K1AXQYvY0vxqfO1FI/\">attack on Atlanta in early 2018</a> where ransomware was used to glean sensitive information from multiple applications and devices used by city employees. It has also increased attacks on healthcare and energy industries, and the recent <a href=\"https://www.washingtonpost.com/technology/2018/12/31/what-we-still-dont-know-about-cyberattack-tribune-newspapers/?noredirect=on&amp;utm_term=.b92c265391fd\">attack on the Tribune publishing services</a>, which disrupted printing operations and distribution for newspapers. Criminal organizations are always looking for new ways to build cash and cyber-crime has been lucrative for them.</p>\n<h3><strong>Looking ahead to the next 30 years, or even the next 10, what do you see as the greatest challenges or threats enterprise or IT security professionals will face?</strong></h3>\n<p>LL: We already have a huge gap in the number of trained cybersecurity professionals (with estimates of <a href=\"https://cybersecurityventures.com/jobs/\">over 3.5 million unfilled positions by 2021</a>). Primary and secondary education programs are just rolling out to help teach the next generation of cyber professionals, but the struggle is real since cybersecurity is such a unique and challenging field. To become an expert, you need thousands of hours in a hands-on environment to learn the network fundamentals, attack strategies, defensive tactics and how to adapt to an ever-changing threat. You need to see what an attacker looks like on a realistic network and practice new ways to detect and respond.  Cyber professionals must be both broad and deep with continued learning being a lifelong requirement!</p>\n<p>As the cyber threat surface expands, so do our defensive teams. However, what we are actually seeing is a widening skills gap in the cyber arena, putting us at more risk than ever because we simply don’t have enough people to defend incoming threats. This is why it is imperative that cyber learning becomes more incorporated into academia. Cyber ranges are a great way to learn the ins and outs of cybersecurity. A cyber range is a virtual environment that uses hands-on learning for cyber warfare skills development. By training students to address real-world attack scenarios, we prepare them for the workforce of the future.</p>\n<h3><strong>Recommended Reading: </strong></h3>\n<p><a href=\"https://marketing.circadence.com/acton/media/36273/edu-cyber-range-white-paper\">Faces of Cyber Ranges white paper</a> &#8211; download now!<br />\n<a href=\"https://www.circadence.com/about/circ-blog/cybersecurity-apprenticeships-internships-alternative-pathways-cyberworkforce/\">Alternative solutions to cyber learning </a><br />\n<a href=\"https://www.circadence.com/about/circ-blog/cyber-range-learning-in-academia/\">Cyber range learning in academia </a><br />\n<a href=\"https://www.circadence.com/about/circ-blog/the-benefits-of-active-gamified-learning-in-cyber-training/\">The benefits of active, gamified learning in cybersecurity</a></p>\n<p>&nbsp;</p>\n","title":"What We’ve Learned from the Evolving IT Landscape and Where Cyber Security is Headed in 2019"}},{"node":{"id":"50704da5-c1ab-51b2-bb1e-1f52099928c1","slug":"finding-the-needle-in-the-cybersecurity-haystack-why-gamification-is-the-answer-youve-been-looking-for","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/gamification_design_green.jpg"},"date":"2019-01-09T19:29:50.000Z","content":"<p>To say we’re on an upward trajectory in the cybersecurity space would be an understatement. Cyber threats are increasing. Organizational spending is increasing. And the cost of a data breach is increasing—to somewhere around $3.62 million per breach according to the <a href=\"https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN&amp;\">Ponemon Institute</a>. With such exponential growth across the field, CISOs are actively looking for ways to strengthen their efforts. With the plethora of information available today, it is like finding a needle in a haystack. It’s hard to know whom to believe, what to believe and how often. With so many options available, CISOs are understandably stymied in making educated decisions for an optimal solution. Fortunately, our 20+ years in the gaming industry have led us to a valuable conclusion that can help CISOs professionally develop their teams—and protect their organization. The answer lies in <b>gamification</b>. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>It’s a buzz word floating its way around the technology sphere for quite some time and is gaining momentum. It’s commonly defined as a process of adding games or game-like elements to something. The term was originally coined in 2002 by a British computer programmer named Nick Pelling. The term hit mainstream when a location-sharing service called Foursquare emerged in 2009, employing gamification elements like points, badges, and “mayorships” to motivate people to use their mobile app to “check in” to places they visited. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>The term hit buzzword fame in 2011 when Gartner officially added it to its <a href=\"https://www.gartner.com/doc/3769145/hype-cycle-education-\">“Hype Cycle” list</a>. But we’re not recommending gamification because it is the new, shiny object on the heels of AI. We’ve seen gamification <b>work</b> for companies looking to train their cyber teams.  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><b>How</b><b> does it work</b><b>? </b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>Unlike compliance-driven teaching methods, gamified teaching engages practitioners individually and in teams, through modern learning strategies. It works by deploying connected, interactive, social settings that allow learners to excel in competitive, strategic situations. It allows trainees to apply what they know to simulated environments or “worlds,” creating a natural “flow” that keeps them engaged and focused. And we’re not talking about simple Capture the Flag games, we’re referring to cybersecurity exercises inspired by game-like activities to effectively engage learners.</p>\n<p>According to <a href=\"https://trainingindustry.com/articles/content-development/gamification-of-work/\">Training Industry</a>, gamified training programs are customizable based on an organization’s needs; visually-driven through use of progress bars and milestones; and are usually time-bound to hold employees accountable for task completion. Further, <a href=\"http://elearningmind.com/gamification-training/\">achievements, points, badges, trophies, and rewards/recognition</a> of progress gives users a sense of accomplishment, keeping them motivated and engaged.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><b>Why</b><b> is </b><b>gamification powerful</b><b>?</b> <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>The <a href=\"https://www.digitecinteractive.com/wp-content/uploads/2018/02/gamification_white_paper2017.pdf\">next gen learner</a> (born after 1980) has never known a world without video games so it’s a natural progression that cyber training incorporate a style of teaching that best suits today’s learner. <a href=\"http://elearningmind.com/gamification-training/\">Neuroscientist Eric Marr</a> said the reason it works so well is because when an individual engages with gamified simulations, the brain releases dopamine, a chemical that plays a role in the motivational component of reward-driven behavior. He says “Dopamine helps activate the learning centers in the brain. If your brain releases dopamine while you’re learning something, it helps you remember what you’ve learned at a later date.” <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>Studies like “<a href=\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3906598/\">I Play at Work: Ten Principles for Transforming Work Processes Through Gamification</a>” outline the following benefits: <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Increased engagement, sense of control and self-efficacy  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Adoption of new initiatives <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Increased satisfaction with internal communication <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Development of personal and organizational capabilities and resources  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\">Increased personal satisfaction and employee retention  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"4\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Enhanced productivity, monitoring and decision making   <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p>&nbsp;</p>\n<p>At Circadence<sup style=\"font-size: 9px; line-height: 8px;\">®</sup>, we have taken these learnings and applied them to our own flagship product, our cybersecurity training platform <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">Project Ares<sup style=\"font-size: 9px; line-height: 8px;\">®</sup>.</a> Recognizing the widening cyber skills gap and evolving threats, only the most productive and effective training mechanisms will do—and the latest research tells us that gamified environments are here to stay. An immersive training platform, Project Ares appeals to today’s learner—and gets CISOs and their colleagues excited about training again. In contrast to passive, traditional instructor-led courses, gamification provides an active, continuous learning, people-centric approach to cybersecurity skills development.  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>For a more in-depth look at the Importance of Gamification in Cybersecurity, <a href=\"https://marketing.circadence.com/acton/media/36273/blog-gamified-cybersecurity-training\" target=\"_blank\" rel=\"noopener\">download our white paper here</a>.</p>\n","title":"Finding the needle in the cybersecurity haystack: Why gamification is the answer you’ve been looking for"}},{"node":{"id":"aa7095b0-937b-59cf-b716-1e3458b82c6f","slug":"circadence-takes-a-different-look-at-cybersecurity-on-the-road","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/12/circCorp_logo_stillFrame_v02.jpg"},"date":"2019-01-08T16:17:17.000Z","content":"<p>In partnership with <a href=\"https://www.siriuscom.com/\">Sirius Computer Solutions</a>, <a href=\"https://www.snowflake.com/\">Snowflake Computing</a>, and <a href=\"https://puppet.com/\">Puppet software</a>, Circadence is pleased to participate in the roadshow series,  “A Different Look at Cybersecurity.” In cities across Tennessee, Mississippi, and Alabama, Circadence, and partners will help businesses discover new ways to approach cybersecurity readiness in the wake of imminent and persistent cyberattacks affecting every industry today.</p>\n<p>Attendees will gain meaningful insights into:</p>\n<ul>\n<li>Addressing the cyber skills gap</li>\n<li>Enhancing defense capabilities with AI</li>\n<li>Simplifying cloud data management</li>\n<li>Securely automating and accelerating DevOps processes</li>\n</ul>\n<p>Understanding that enterprises are actively seeking both strategic and technological solutions to solve their cybersecurity challenges, these informative and educational events include in-person conversations that focus on real-world, practical approaches that apply to CISOs and SOC professionals.</p>\n<p>“Connecting with business leaders at events like this is the best way to understand what cybersecurity issues are keeping them up at night,” said Daniel Jaramillo, vice president of sales at Circadence. “By engaging with the cybersecurity community in small groups, we can share ideas that will help them stay protected from attacks and empower their cyber teams with effective learn-by-doing approaches.”</p>\n<p>To learn more about each of the stops for “A Different Look at Cybersecurity” visit our Facebook events pages and register for FREE today:</p>\n<p>“A Different Look at Cybersecurity” in Chattanooga – <a href=\"https://www.facebook.com/events/438374093367001/\">https://www.facebook.com/events/438374093367001/</a></p>\n<p>“A Different Look at Cybersecurity” in Nashville – <a href=\"https://www.facebook.com/events/357315905048895/\">https://www.facebook.com/events/357315905048895/</a></p>\n<p>“A Different Look at Cybersecurity” in Memphis – <a href=\"https://www.facebook.com/events/2291581351131659/\">https://www.facebook.com/events/2291581351131659/</a></p>\n<p>“A Different Look at Cybersecurity” in Jackson – <a href=\"https://www.facebook.com/events/1219009901596924/\">https://www.facebook.com/events/1219009901596924/</a></p>\n<p>“A Different Look at Cybersecurity” in Mountain Brook – <a href=\"https://www.facebook.com/events/223832025193175/\">https://www.facebook.com/events/223832025193175/</a></p>\n<p>If you have any further questions about these roadshow events, please contact <a href=\"mailto:adageenakis@circadence.com?subject=A%20Different%20Look%20at%20Cybersecurity%20roadshows\">Amy Dageenakis</a>.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Circadence Takes “A Different Look at Cybersecurity” on the Road"}},{"node":{"id":"619bd94d-a59a-5e70-bebd-c5d5f89da534","slug":"cybersecurity-learning-through-robotics","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/01/jelleke-vanooteghem-554406-unsplash.jpg"},"date":"2019-01-08T16:13:53.000Z","content":"<p>We sat down with Circadence’s own Chief Technology Officer, Brad Hayes, to delve deeper into the meaning of AI and machine learning as it relates to the cybersecurity field, to discuss how robotics inform best cybersecurity practices, and to learn about new developments that are shaping the future of the field.</p>\n<p>Artificial Intelligence (AI) is a phrase we hear quite often. It’s thrown around in movies and TV shows, listed as a feature in new devices we buy, and is even brought into our homes through voice services like Siri and Alexa. AI is a technology this being positioned to help us, as consumers and professionals perform traditionally complex tasks with ease. The ability to automate and augment responsibilities using robotics continues to gain traction as our digital footprints expand. And surrounding it all, cybersecurity becomes ever more critical as we seek out better ways to protect ourselves, our schools, our businesses, and national security.</p>\n<h3><em>Before we talk about Artificial Intelligence and machine learning, can you tell me a little more about your robotics research?</em></h3>\n<p><strong>BH:</strong> The central theme of my lab’s research is building technology to enable autonomous systems to safely and productively collaborate with humans, improving both human and machine performance. The main goal is developing human-understandable systems and algorithms to create teams that are greater than the sum of their parts, outperforming the state of the art in inferring intent, multi-agent coordination, and learning from demonstration. Robotics is a foundation upon which AI and machine learning technology can be deployed with substantial impact, and it opens doors for skill building and capability expansion when we use these techniques in the context of cybersecurity learning.</p>\n<h3><em>Can robots help humans be more efficient?</em></h3>\n<p><strong>BH:</strong>  Early robotics research focused on creating robots that would primarily occupy a purely physical role: as a force multiplier that adds physical strength, repetition, or precision to a process (like a robotic arm helping to transport material). Within the scope of earlier AI research, decision support systems were designed as cognitive assistants, helping humans make more informed choices. The next evolution of robotics research significantly synthesizes AI advancements and helps engineers and developers understand how to automate and augment processes of cognition and interaction.</p>\n<h3><em>The idea of machines/robots helping professionals automate and augment tasks and decision-making is interesting. Can you explain how machine learning folds into this idea?</em></h3>\n<p><strong>BH:</strong>  Machine learning is a broad concept. It gets confused a lot with artificial intelligence (AI), which is more of an umbrella term.  Machine learning is a term that applies to systems that adapt based on behavior or action, while AI is descriptive of intelligence that doesn’t necessarily need to change as a function of its experiences over time.</p>\n<p>AI and machine learning are ever-present in our lives. Route directions on Google maps, for example, use a combination of AI techniques to find a path between your source and destination while machine learning models estimate factors like traffic, time of day, and weather conditions to get you to your destination as quickly as possible. Netflix uses a tremendous amount of data, processed within their machine learning models, to predict shows that you might like. They also use these models to inform which programs they’re going to manage and create. Likewise, Pandora and Spotify use machine learning to tell you what they think you’d like to listen to. Machine learning is ubiquitous, already telling us where to go, what to see, and what to listen to.<em> </em></p>\n<h3><em>How does robotics relate to cybersecurity?</em></h3>\n<p><strong>BH:</strong> A lot of the problems that we&#8217;re trying to tackle in the human-robot interaction research space are also echoed within the cybersecurity industry. If we want to design a robot teammate for a manufacturing task, that robot will need to be able to infer a human’s goals and intent from observation. This will let the robot perform productive actions, avoid collisions, and generally not be infuriatingly “in the way” during collaboration. Now apply that behavior to cybersecurity: Consider an autonomous agent that can infer the intent of actors on a system on your network, based on their behavior. Once those intentions are known, a defender can take steps to mitigate threats so malicious actors can&#8217;t achieve their goals. That’s a force multiplier for those defenders, making them more powerful and productive!</p>\n<p>The relationship between the autonomous teammate and the human is especially important to cybersecurity education, as we can use learning technologies to assess a learner’s skill set and guide their progress to make them more effective more quickly. Beyond cooperative activities, we can also use these autonomous agents as opponents, providing a cost-effective means of teaching cyber professionals to react and respond to realistic attacks, forcing them to think more strategically and creatively to overcome adversaries.</p>\n<p>Thinking about the relationship between robotics and cybersecurity, an example I often think of is when IBM’s “Deep Blue” beat Garry Kasparov at chess. People were asking: <em>“Does this mean that computers are smarter than people? What does this mean for the future of chess?”</em> My response is that this doesn’t mean we’re going to abandon chess, but rather that we will have new tools to train with and improve. In fact, that advancement helped spur great interest in human-machine teaming within the game of chess.</p>\n<p>To me, the most exciting aspect of these systems is when it’s shown that a team consisting of an expert human and the AI can beat the AI by itself, suggesting that there are still aspects of the game not yet captured by the system. This example is illustrative of the fact that <strong>even in domains widely considered “solved,” the human still brings something valuable to the team.</strong></p>\n<h3><em>Why does cyber learning matter to you and why is cybersecurity so important given advancements in AI and machine learning?</em></h3>\n<p><strong>BH:</strong>  Cybersecurity professionals can engage in a cyber range learning environment against AI-powered adversaries and gain new insights into their approach, positively impacting threat response and mitigation. Further, they can learn to team up with AI-powered agents to accomplish tasks quicker and develop strategies to mitigate threats to defeat increasingly capable, quick, and clever opponents. Cyber learning through AI-powered intelligent tutoring is of paramount importance for providing affordable, effective, and personalized education at scale.</p>\n<p>As we’ve been quick to inject computation into pretty much every aspect of life, the speed at which we&#8217;ve deployed these systems has come at a cost. At this stage, I would consider it a debt, as there is a tendency to deploy systems without properly safeguarding them and/or ensuring that they&#8217;re reliably operational under potentially adversarial operating conditions.</p>\n<p>Further, cybersecurity doesn&#8217;t just mean being able to defend against intentional adversaries, but also against unintentional consequences stemming from benign actions from people we trust. In any case, the attack surface grows rapidly as points of interaction grow in number. Because of this, I don’t foresee a viable strategy that doesn’t heavily involve the use of AI and machine learning for cybersecurity professionals, both in terms of learning and continuing education, but also in terms of effective coordination against increasingly capable adversaries.</p>\n<p>These concepts are important to know and understand as government, enterprise, and academic institutions look to keep pace with the evolving threat-scape and prepare the next generation of cyber professionals. To learn more about how Circadence is at the forefront of cybersecurity learning tools at <a href=\"https://circadence.com/\">https://circadence.com/</a>.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Artificial Intelligence and Learning Through Robotics: An Interview with Circadence CTO Bradley Hayes"}},{"node":{"id":"992ee016-5f00-54f8-9fba-cba170e1fe92","slug":"cybersecurity-artificial-intelligence-trends-from-2018","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/vulnearbility.jpg"},"date":"2018-12-19T16:10:29.000Z","content":"<h3><strong>Worsening employee cybersecurity habits and the need for organization-wide cybersecurity literacy.</strong></h3>\n<p>A study conducted by <a href=\"https://www.sailpoint.com/blog/world-password-day-2018/\">SailPoint reported that nearly 75% of employees engage in password re-use across accounts</a>, as opposed to just over half four years ago. Nearly half of people surveyed admitted to sharing passwords across personal and work accounts. Part of this is being driven by employees seeing IT practices as inconvenient, as they seek circumvention in favor of personal efficiency.</p>\n<h3><strong>Public awareness of cybersecurity issues is increasing.</strong></h3>\n<p>Cybercrime making it into mainstream news headlines has also raised public awareness of its challenges, dangers, and impacts. An increased prevalence of ransomware, such as “cryptojacking” software, has been spurred by the relative ease of orchestrating difficult to trace ransom payments and increasing malware availability.</p>\n<h3><strong>Artificial Intelligence is being used to enable personalized attacks at-scale. </strong></h3>\n<p>Attackers are gaining access to troves of personal data to use for increasing threat effectiveness. By combining increasingly sophisticated AI techniques for language understanding with the scraping of publicly available, indexed data, it is becoming far easier for malicious actors to generate increasingly authentic, personalized attacks. As a result, large-scale personalized threats have a lower barrier to entry than ever before.</p>\n<h3><strong>Artificial Intelligence</strong><strong> provides a force multiplier for offensive capabilities. </strong></h3>\n<p>Machine learning models provide a general mechanism for organization-tailored obscuring of malicious intent, enabling adversaries to disguise their network traffic or even on-system behavior to look more typical to evade detection. In addition to enhancing data exfiltration capabilities, these techniques provide the capability to continually model and adapt to their environment even after deployment, enabling them to persist undetected for longer and potentially infiltrate deeper into organizations.</p>\n<h3><strong>Artificial Intelligence </strong><strong>provides</strong> <strong>a necessary force multiplier for defensive operations. </strong></h3>\n<p>Increasing system complexity, endpoint vulnerability, and attack sophistication have expanded the available attack surface in a manner that has left traditional monitoring techniques ineffective. Particularly in a world of increasingly intelligent threats and well-resourced actors, the only cost-efficient and scalable mechanisms for detection and remediation are quickly becoming artificially intelligent systems with the ability to sift through largely unstructured data, identify malicious behavior over potentially long time horizons, and dynamically respond. We’re seeing proof that applications of AI to both local-machine and organization-wide event monitoring can correlate observations to provide root cause analyses and incident investigations beyond traditional analyst capabilities on superhuman timescales.</p>\n<blockquote><p><strong>Perhaps the most important trend over the past year has been the industry’s continued realization and acceptance of a coming arms race between AI-enhanced dynamic threats and AI-enhanced adaptive defenses. </strong></p></blockquote>\n<h3><strong>Artificial Intelligence</strong><strong> is not a cure-all. </strong></h3>\n<p>While AI has deservedly received substantial hype within the cybersecurity realm and beyond, there still exists a substantial gap between algorithm deployment and successful application. To that end, <a href=\"https://www.circadence.com/about/circ-blog/cybersecurity-apprenticeships-internships-alternative-pathways-cyberworkforce/\">continuing education is still critical for cybersecurity professionals</a> to be able to leverage, collaborate through, and engage with these technologies to form a basis for effective defense: providing AI-enhanced tools with the knowledge and data they need to operate and engaging appropriate levels of trust and reliance in their capability (both in terms of detection and response) to make them a formidable component of a modern defensive cybersecurity strategy.</p>\n","title":"Cybersecurity &#038; Artificial Intelligence Trends from 2018"}},{"node":{"id":"b78e0018-7d50-5cf1-b622-d94f76366b06","slug":"cyber-range-learning-in-academia","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/customer_education_splash.jpg"},"date":"2018-12-14T16:06:29.000Z","content":"<p>Cyber ranges are virtual learning environments used for cyber warfare skills development.  A cyber range offers hands-on learning opportunities for cybersecurity professionals by marrying traditional classroom concepts with more ‘sticky’ experiential learning techniques.</p>\n<p>By effectively preparing students to address real-world cyberattack scenarios now, academic institutions will increase their success rate of achieving learning outcomes pertinent to the cybersecurity profession. Further, the students benefit by applying what they’ve learned to realistic cyber situations they’d experience in the workplace.</p>\n<p>While there are many cyber range solutions on the market today, there are several key learning capabilities missing on their platforms. Some examples of this are:</p>\n<ul>\n<li>Game-inspired exercises for fundamental concept learning and skill-building with repetitive, hands-on activities.</li>\n<li>Defense strategy teaching, which involves engaging in multiple cybersecurity job roles to problem-solve challenges.</li>\n<li>Limited or non-existent scoring methods for learners to assess skills performance.</li>\n<li>Lack of team play for collaborative learning and greater strategic work.</li>\n<li>Infrastructure-only ranges with no pre-programmed learning curriculum.</li>\n<li>Prescriptive, “check the box” approaches with fixed content (that, over time, will become irrelative and disengage learners).</li>\n<li>The limited number of virtual environments.</li>\n</ul>\n<h3 style=\"text-align: center;\">To read more about cyber range learning environments for student skill building, download: <strong><br />\n<a href=\"https://marketing.circadence.com/acton/media/36273/edu-cyber-range-white-paper\" target=\"_blank\" rel=\"noopener\">&#8220;The Faces of Cyber Ranges: Tapping into Experiential Skill Building for Cybersecurity Teaching and Learning.&#8221;</a></strong></h3>\n<p>&nbsp;</p>\n<p>To ensure your academic institution gets the most out of its cyber range investment, the following features and capabilities should be considered to best maximize student learning and skill building:</p>\n<ul>\n<li>Ensure the cyber range comes installed with pre-existing content that is informed by real-threat scenarios and attack methods.</li>\n<li>Look for cyber range content that is diverse, offering a mix of both concept-driven exercises and real-world, team-based activities for holistic learning.</li>\n<li>Consider custom mission builders (like Circadence’s Orion<sup>Ô</sup> Mission Builder) to create scenarios that mirror the latest threats happening today. This can ensure the learning material is constantly evolving, just as threats are.</li>\n<li>Assess instructor capabilities for reviewing and grading student performance to prevent tedious log review work.</li>\n<li>Confirm that course syllabi and other learning materials can be integrated into the cyber range platform to tie learning objectives to actual student performance.</li>\n<li>Consider gamified activities that encourage students to “learn by doing,” individually and in teams.</li>\n</ul>\n<p>In order to address these glaring needs, Circadence created Project Ares<sup>Ò</sup>, the face of the next generation of cyber ranges. Project Ares delivers learning and assessment opportunities to anyone from cyber newbies to cyber ninjas, with both individual and team-based engagements. It can be adapted to students in undergraduate and graduate university programs as well as Middle/High/Primary level schools. High engagement in cybersecurity education is critical because if students are not interested in learning new skills, and aren’t encouraged to think outside of the box, they won’t be adequately prepared to handle threats that are always changing and evolving in the workplace.</p>\n<p>Academic institutions have an exciting opportunity in front of them – to lead the way with progressive, next-generation learning approaches that utilize cyber ranges to prepare students for the cybersecurity workplace. Don’t fall behind the times, look into learning through this exciting platform in order to better serve the future workforce.</p>\n","title":"Utilizing Cyber Range Learning in Academia"}},{"node":{"id":"ad950fc3-13c0-5cf1-9ce9-6bdca49c2f9b","slug":"new-developments-for-project-ares-3-6","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/ares_splash_no_logo.jpg"},"date":"2018-12-10T16:00:22.000Z","content":"<p>From new training content to Intelligent Cloud-based hosting options, our immersive, gamified Project Ares cybersecurity learning platform continues to evolve to meet the changing needs of our customers. Enterprise, government, and academic institutions are looking for scalable, diversified, results-driven cybersecurity readiness solutions that allow their organization to flex based on ever-evolving cyber threats. We are pleased to share the latest developments with you.</p>\n<h3><strong>We’re on Microsoft Azure </strong></h3>\n<p>Circadence is pleased to announce it is bringing Project Ares cyber ranges to Microsoft Azure cloud service. This arrangement will allow enterprise, government, and academic institutions the opportunity to further scale and grow their cyber range spaces based on ever-evolving cybersecurity goals and objectives. Circadence’s cyber range learning environment will be hosted in the Azure cloud to give further experiential opportunity to clients who seek access to public and private virtual environments for their cyber workforce. This revolutionary combination transforms learning by taking traditional lecture-based training out of the classroom and into interactive real-world environments anytime, anywhere.</p>\n<h3><strong>Battle Room Alignment to NIST/NICE </strong></h3>\n<p>All Project Ares battle room exercises and activities have been aligned to <a href=\"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf\">NIST/NICE workforce frameworks</a>. Now clients can measure training ROI against industry-standard cybersecurity knowledge-bases, skills, and abilities. The seven NIST/NICE work roles include: operate and maintain, protect and defend, investigate, collect and operate, analyze, securely provision, and oversee and govern.</p>\n<h3><strong><em>Scripting Fundamentals a new battle room</em></strong></h3>\n<p>Scripting Fundamentals, new Battle Room #10, focuses on scripting fundamentals using Python 2.7 to create loops, functions, user input, casting, data structures, conditions, and modules. There are easy and medium levels of difficulty to adapt to student skill level.</p>\n<blockquote>\n<h4><span style=\"color: #ffffff;\"><em><strong>“If you understand the concepts of one language, they oftentimes transfer to many others, such that you can pick them up more quickly,” said Lisa Perdelwitz, Director of Cyber Education and Training at Circadence. </strong></em></span></h4>\n</blockquote>\n<p>Scripting skills are critical to any assessment team in order to enable them to perform at the next level and yet it continues to be under-taught in the cyber training community. This battle room will provide all users with a basic understanding of scripting and its value in the cybersecurity world and support them with this subject matter, which is proven challenging for learners.</p>\n<h3><strong>New!  Fast-Paced Mini-Game </strong><strong>called <em>RegEXile</em></strong></h3>\n<p><img class=\"size-medium wp-image-3675\" src=\"https://www.circadence.com/wp-content/uploads/2018/12/MicrosoftTeams-image-3-300x200.png\" alt=\"RegExile game\" width=\"300\" height=\"200\" /></p>\n<p><em>RegEXile </em>is an exciting pattern-recognition game that teaches the concepts of regular expressions while exercising trainee’s muscle memory and reaction time.  With an immersive, futuristic scenario, the game challenges players to form the correct expression to select or exclude data in order to save-the-world.</p>\n<ul>\n<li>Players type in regular expressions to identify the robots to attack, while not hurting fellow humans.</li>\n<li>Players must recognize patterns in the enemy names and enter proper RegEX techniques to eliminate robots before they destroy the last of humankind.</li>\n</ul>\n<h3><strong><em>Operation Black Dragon:  </em>Defend the power grid within Project Ares</strong></h3>\n<p>Mission 13, focused on defending the power grid, will be introduced soon as “Operation Black Dragon” with an initial ‘easy’ level.</p>\n<p>The mission scenario is as follows:</p>\n<ul>\n<li>Conduct a cyber defense assessment mission on a power distribution plant.</li>\n<li>The end state of the assessment will be a defensible power grid with user ability to detect attempts to compromise the grid, attribute any attacks, and respond accordingly.</li>\n</ul>\n<p><strong>Mission Objectives:</strong></p>\n<ul>\n<li>Evaluate the risks to the plant.</li>\n<li>Determine if there are any indicators of compromise to the network.</li>\n<li>Improve monitoring of network behavior.</li>\n<li>Be prepared to mitigate an attack if necessary</li>\n</ul>\n<p><strong>Core Competencies Required:</strong></p>\n<ul>\n<li>Digital Forensics</li>\n<li>Computer Languages</li>\n<li>Computer Network Defense</li>\n<li>Computers and Electronics</li>\n<li>Cybersecurity Law</li>\n<li>Cryptography</li>\n<li>Enterprise Architecture</li>\n<li>Identity Management</li>\n<li>Incident Response Management</li>\n<li>Information Assurance</li>\n<li>Information Systems and Network Security</li>\n<li>Infrastructure (Network) Design</li>\n<li>Network Management</li>\n<li>Operating Systems</li>\n<li>Risk Management</li>\n<li>Vulnerability Assessment</li>\n<li>Hacking Methodologies</li>\n<li>Web Technology</li>\n</ul>\n<h3><strong>Project Ares Platform Enhancements</strong></h3>\n<p>In addition to new content, the Circadence engineering team also made additional updates to the user interface in this 3.6 version, including highlighting actionable buttons and various performance improvements, bug, and color fixes.</p>\n<h3><strong>Stay tuned for our next release update 3.7! </strong></h3>\n<p>We strive to enhance and expand Project Ares to keep it current and relevant.  We use our customer feedback to help prioritize new content releases and feature evolutions.  And, we constantly stay on the pulse of the threat landscape across all industries to inspire and inform our battle room and mission exercises.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"Living Our Mission Blog Series #2: New Developments for Project Ares 3.6"}},{"node":{"id":"d01f06ad-1301-5659-9f7e-f99172eae675","slug":"2019-cybersecurity-predictions","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/generic_man.jpg"},"date":"2018-12-06T15:43:24.000Z","content":"<p>Well, it’s safe to say that 2018 for the cybersecurity industry has been a little doom and gloom. And rightly so. More than 3.5 million unfilled job positions expected by 2021, 90 percent of cyberattacks caused by human error, and what we thought were once effective learning methods prove to only yield a 5 percent information retention rate. The financial sector, governments, and healthcare organizations continue to rank in the top most attacked industries. Cybersecurity spending keeps increasing and phishing, insider threats, and malware keep infiltrating enterprise systems. It appears in 2018, cyber professionals just couldn’t keep pace with evolving threats!</p>\n<p>So what does 2019 have in store for the cybersecurity industry? We asked our own Laura Lee, Executive Vice President of Rapid Prototyping to find out: Is there a light at the end of what appears to be a VERY dark (cyber) tunnel?</p>\n<h3>Increase in Supply Chain Cyber Risk</h3>\n<p>Supply chain cyber risk will be one of the biggest issues in 2019 and will require a coordinated effort to address. Risks from third party service providers with physical or virtual access to information systems, poor information security practices, compromised software or hardware components, are only a few of the vulnerabilities that stem from this issue. Since breaches tend to be less about technology and more about human error, IT security systems best practices for critical information won’t be foolproof unless employees throughout the supply chain use secure cyber practices.</p>\n<h3>Increase in Social Media Infiltration</h3>\n<p>The Facebook breach in 2018 made it apparent that social media platforms are equally vulnerable to sophisticated hackers. In fact, we will likely see an increase in black market vendors moving their businesses to social media channels for added “secrecy.” This will make it harder for law enforcement to track and monitor their activities.</p>\n<h3>Exploitation of Fear</h3>\n<p>Attackers will leverage a company’s fear of reputational damage and data loss with extortion tactics. Recent threats to our own election system, healthcare, critical infrastructure tell hackers that organizations are willing to pay more to not have a breach released to the public, rather than pay for them to relinquish their compromised data. This will be a way for hackers to get more money.</p>\n<h3>Cloud Migration</h3>\n<p>In an effort to harden security posture, enterprises and government entities will keep moving on-prem software to the cloud for a more seamless, scalable, and elastic data-privacy/sharing/usage experience. There will continue to be a strong appetite for modeling the digital footprint of enterprises in cloud environments.</p>\n<h3>Better Alignment between the CISO and C-Suite</h3>\n<p>While it’s important to know what’s likely on the horizon in terms of threats, not all cybersecurity “stuff” is going to be bad.  On the flip side, we will see better alignment between the CISO and the C-Suite as more and more businesses understand cybersecurity isn’t just an “IT issue” but a larger business risk issue that impacts all facets of successful business operations and reputation.</p>\n<h3>Integration of IT and OT Cyber Infrastructure</h3>\n<p>Industries like critical infrastructure and manufacturing have a lot of physical (and digital) assets to manage. Operational technology (OT) are the systems (e.g., SCADA, ICS) used to monitor and control infrastructure like power, pipelines, water distribution, and now many things in your house and car. With changing technologies and a drive toward “data-driven and remote operations,  the two technology environments are starting to converge” notes <a href=\"https://ro.ecu.edu.au/cgi/viewcontent.cgi?referer=https://www.google.com/&amp;httpsredir=1&amp;article=1217&amp;context=ism\">a study from Edith Cowan University</a>. OT data is now accessible via cloud environments for ease of quantitative management reporting and the potential to increase productivity of such systems.</p>\n<p>These predictions are really just the tipping point of what’s to come for the cybersecurity industry. Companies will have to keep hardening their security postures, upgrading technologies, upskilling and educating all staff members, and driving a holistic cyber readiness strategy that leverages machine learning and other Artificial Intelligence technologies to automate and augment the workforce.</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n","title":"2019 Cybersecurity Predictions"}},{"node":{"id":"bd87a15a-1b88-5108-b7c4-716d746feaaf","slug":"oil-and-gas-cybersecurity","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/critical_oilgas_splash_b.jpg"},"date":"2018-11-27T13:47:34.000Z","content":"<p>The oil and gas sector is susceptible to security vulnerabilities as it adopts digital communication methods that help power energy production and distribution. To understand the cyber threats to the oil and gas industry, there exist approximately 1,793 natural gas-powered electricity plants in the U.S. and <a href=\"https://cybersecurityci.iqpc.com/downloads/the-threat-of-cyber-attacks-on-critical-infrastructure\">they generated 34% of the nation’s electricity</a> in 2018. Much of how we live and work is dependent upon the energy produced from oil and gas production, including everyday cooking, heating/cooling, communication, and use of electronic devices and appliances. Therefore, even the smallest cyber attack on one of the thousands of interconnected and digital systems can pose a serious cyber risk to oil and gas production.</p>\n<p>A company that goes through an attack can experience a plant shutdown, equipment damage, utility interruptions, production shutdown, inappropriate product quality, undetected spills, and safety measure violations—to name a few. Recently, <a href=\"https://www.kroll.com/en-us/intelligence-center/reports/global-fraud-risk-report\">87% of surveyed oil and gas senior executives have reported being affected by cyber incident</a>s in the past 12 months. Further, <a href=\"https://oilandgascybersecurity.iqpc.com/downloads/best-practices-for-cultivating-a-culture-of-security?-ty-m\">46% of attacks in </a>Operational Technology go undetected.</p>\n<h2><strong>Cyber Attacks on Oil and Gas, Energy, Utilities Companies in History</strong></h2>\n<p>Security threats to the oil and gas industry have already manifested across facilities worldwide with no signs of slowing down.</p>\n<ul>\n<li>In 2010, <a href=\"http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11\">Stuxnet, a malicious computer worm</a>, was used to hijack industrial control systems around the globe, including computers used to manage oil refineries, gas pipelines, and power plants. It reportedly destroyed a fifth of Iran’s nuclear centrifuges. The worm was delivered through a worker’s thumb drive.</li>\n<li>In August 2012, a person with privileged access to one of the world’s leading National Oil Companies’ (NOCs’) computers unleashed a computer virus called <a href=\"http://www.ey.com/Publication/vwLUAssets/ey-wpc-digitization-and-cyber/$FILE/ey-wpc-digitization-and-cyber.pdf\">Shamoon (disk-wiping malware)</a>. This virus erased three quarters (30,000) of the company’s corporate personal computers and resulted in an immediate shutdown of the company’s internal network.</li>\n<li>National Security Authority Norway said <a href=\"https://www.foxbusiness.com/markets/combatting-cyber-attacks-in-the-oil-and-gas-industry\">50 companies in the oil sector</a> were hacked and 250 more were warned to check their systems, in one of the biggest hacks in Norway’s history.</li>\n<li><a href=\"https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/realspin/2014/11/11/americas-critical-infrastructure-is-vulnerable-to-cyber-attacks/&amp;refURL=&amp;referrer=#415e4a0c5f39\">Ugly Gorilla, a Chinese</a> attacker who invaded the control systems of utilities in the United States, gained cyber keys necessary to access systems that regulate flow of natural gas. In January 2015, a <a href=\"http://arstechnica.com/security/2015/01/internet-attack-could-shut-down-us-gasoline-stations/\">device</a> used to monitor the gasoline levels at refueling stations across the United States—known as an automated tank gauge or ATG—could be remotely accessed by online attackers, manipulated to cause alerts, and even set to shut down the flow of fuel. Several Guardian AST gas-tank-monitoring systems have suffered electronic attacks possibly instigated by hacktivist groups.</li>\n<li>In December 2018, <a href=\"https://www.rigzone.com/news/saipem_reveals_extent_of_cyber_attack-13-dec-2018-157711-article/\">Saipem fell victim to a cyber attack</a> that hit servers based in the Middle East, India, Aberdeen and Italy.</li>\n</ul>\n<p>These examples show other oil and gas companies the consequences that arise from insecure cyber environments, vulnerable systems, and cyber teams that lack the latest skills to stay ahead of attackers.</p>\n<h2><strong>How Circadence Can Help</strong></h2>\n<p>To manage security risks in the oil and gas sector while lessening the attack surface, cyber security teams need to be prepared to address all possible scenarios that can occur in order to effectively protect and defend infrastructures.</p>\n<p><a href=\"https://www.circadence.com/products/project-ares/\">Project Ares<sup>®</sup> cyber security learning platform</a> can prepare cyber teams with the right skills in immersive environments that emulate their own oil and gas networks to be most effective. It is designed for continuous learning, meaning it is constantly evolving with new missions rapidly added to address the latest threats in the oil and gas industry. Further, targeted training can be achieved from the library of mission scenarios to work on specific skill sets.</p>\n<p>Training in cyber ranges is a great way to foster collaboration, accountability, and communication skills among your cyber team as well as cross-departmentally. Persistent and hands-on learning will help take your cyber team to the next level. Benefits of this kind of learning include:</p>\n<ul>\n<li><strong>Increased engagement</strong> – by keeping learners engaged they are able to stay focused on the subject matter at hand</li>\n<li><strong>Opportunities to close skills gaps immediately</strong> – instant feedback, instruction, and critique make it easy for learners to benefit from interaction with the instructor and peers and immediately implement this feedback to improve</li>\n<li><strong>Risk mitigation and improved problem-solving</strong> – hands-on training allows learners to master skills prior to working in real-world environments. People can work through tough scenarios in a safe training environment – developing problem-solving skills without risk.</li>\n</ul>\n<p>By placing the power of security in human hands, cybersecurity teams can proactively improve a company’s ability to detect cyber-related security breaches or anomalous behavior, resulting in earlier detection and less impact of such incidence on energy delivery, thereby lowering overall business risk. Users are the last line of defense against threat actors so prioritizing gamified training for teams will foster the level of collaboration, transparency, and expertise needed to connect the dots for cybersecurity in oil and gas sectors.</p>\n<p>This solution coupled with proper collaboration between IT and OT divisions to share real-time threat intelligence information will do wonders for companies looking to stay out of the negative news headlines and stay safe against an attack.</p>\n<h3><a href=\"https://marketing.circadence.com/acton/attachment/36273/f-eee46ccf-5c08-4db6-95ce-d411b6851500/1/-/-/-/-/Oil%20and%20Gas%20Infographic%20%231.pdf\">Download our Infographic &#8220;oil and gas cybersecurity&#8221;</a> for more details on cyber readiness and training.</h3>\n<p><img class=\"aligncenter\" src=\"https://www.circadence.com/wp-content/uploads/2019/06/Oil-and-Gas-Infographic-1.png\" alt=\"oil_gas_infographic\" /></p>\n<p style=\"text-align: center;\"><a style=\"border: 1px solid #333333; border-color: #FF9E1B; border-radius: 1px; border-width: 3px; color: #ff9e1b; display: inline-block; font-family: helvetica,arial,sans-serif; font-size: 14px; font-weight: 300; letter-spacing: 1px; line-height: 14px; padding: 12px 10px 12px 10px; text-align: center; text-decoration: none; width: 60%;\" href=\"https://marketing.circadence.com/acton/attachment/36273/f-eee46ccf-5c08-4db6-95ce-d411b6851500/1/-/-/-/-/Oil%20and%20Gas%20Infographic%20%231.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DOWNLOAD INFOGRAPHIC</a></p>\n","title":"Oil and Gas Cyber Security: Understanding Risks, Consequences, and Proactive Measures"}},{"node":{"id":"778a8c96-44ca-5627-b9b5-6f0982b6fc21","slug":"cybersecurity-apprenticeships-internships-alternative-pathways-cyberworkforce","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/server_rrom.jpg"},"date":"2018-11-14T14:23:58.000Z","content":"<p>We’ve all heard by now that the cyber workforce gap has reached a level of desperation that puts all of us, and our country, at risk. It’s time we start moving the conversation away from the problem and towards innovative solutions.</p>\n<p>To truly narrow this cyber workforce gap, it’s crucial to solicit the collaboration and support of the “golden trifecta” – academia, commercial industries, and government. And while educating and training high school and university students is important, this should not be our only focus; re-skilling and upskilling populations such as Veterans, minorities, career changers, women, persons with disabilities and learning differences, and others, have tremendous potential to both shrink the gap and contribute much needed diversity to the cyber workforce.</p>\n<p>Recognizing <strong>National Cybersecurity Career Awareness Week (Nov. 12-17)</strong>, we thought it prudent to share three tools that can help prepare the next generation of cybersecurity professionals to address ever-evolving threats and the aforementioned challenges.</p>\n<h3><strong>Apprenticeships</strong></h3>\n<p>Compared to other professions, cybersecurity apprenticeship programs are scarce.  Yet, there is hardly a better way for an organization to fill its pipeline with well-qualified cybersecurity talent than by building an apprenticeship model into existing recruiting strategies. By integrating an “earn while they learn” model, employers can leverage a unique opportunity to grow their own talented pool of cyber professionals who have the highly desired combination of hands-on skills and foundational, academic knowledge.</p>\n<p>“This is absolutely fundamental, and a key plan in meeting the workforce needs. <a href=\"http://start-engineering.com/start-engineering-now/2018/11/7/not-just-for-tech-heads-how-to-swell-the-ranks-of-the-cybersecurity-workforce\">Our solution to the gap will be about skills and technical ability</a>,” says Eric Iversen, VP of Learning &amp; Communications, <a href=\"http://start-engineering.com/cybersecurity-career-guide/\">Start Engineering</a>. “And the most successful of apprenticeship programs offer student benefits (e.g., real-world job skills, active income, mentorship, industry-recognized credentials, an inside track to full-time employment, etc.) and employer benefits (i.e., developed talent that matches specific needs and skill sets, reduced hiring costs and a high return on investment, low turnover rates and employee retention, etc.)”</p>\n<p>These types of opportunities are especially beneficial for recruiting individuals who may be switching careers, may not have advanced degrees, or are looking to re-enter the field. The <a href=\"https://www.dol.gov/apprenticeship/\">U.S. Department of Labor</a>, provides guidance on starting apprenticeship programs.</p>\n<h3><strong>Internships</strong></h3>\n<p>The hardest part of being a young professional is finding that first career opportunity. However, that is a particular challenge for aspiring cyber professionals when just about every job posting they find asks for some level of relevant, industry experience. The problem is, not many organizations are willing to give it! For organizations looking to bring fresh ideas, perspectives and talent through the door, internship partnerships with local academic institutions can be a great workforce development tool. Many community colleges, technical colleges, and universities have well-oiled practices of connecting their students with local companies. In fact, it’s not uncommon for most students, both undergraduate and graduate, to be required to complete an internship in their field of study before graduation. Much like a successful apprenticeship program, a strategic internship program enables a situation where everyone involved, wins.</p>\n<h3><strong>Alternative Pathways </strong></h3>\n<p>While there are many models to be considered here, the following two are typically the most accessible and well-received for both students and employers.</p>\n<ul>\n<li><strong>“Stackable” Courses, Credits &amp; Certificates:</strong> Simply put, “stackable” learning opportunities allow students to quickly build their knowledgebase and achieve industry-relevant experience that leads directly to employment. The idea here is two-fold.</li>\n</ul>\n<p style=\"padding-left: 30px;\">a). High school students can enroll in college-level coursework and/or earn cybersecurity-focused certificates while completing their high school career.</p>\n<p style=\"padding-left: 30px;\">b). College-level students can leave higher education for a job, and later return with credits that count toward the next certificate or degree.</p>\n<p>This approach continues to gain traction as high school counselors and college administrators respond to the rapidly evolving nature of our economy.</p>\n<ul>\n<li><strong>Cyber Competitions &amp; Hackathons:</strong> There is hardly a better vehicle for the practical application of one’s skillset than participating in a cyber competition or hackathon. These types of opportunities are becoming more and more common, and many times, cyber enthusiasts of all proficiency levels view cyber competitions and hackathons as the “latest and greatest” in extra-curricular activities. While numerous studies can be cited to support the significant traction cyber competitions and hackathons have gained, the fact is they’re changing the landscape in important ways. For example, cyber competitions and hackathons are often cited as positively impacting one’s exposure to the industry. Cyber competitions:\n<ul>\n<li>Support exposure to new and emerging technologies</li>\n<li>Enable networking opportunities with like-minded folks</li>\n<li>Offer environments for learners to demonstrate their abilities</li>\n<li>Provide opportunity for new talent recruitment</li>\n</ul>\n</li>\n</ul>\n<p>Circadence is proud to lend its platform Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">® </sup>for many local and national cyber competitions including the cyberBUFFS, <a href=\"https://ca-cyberhub.org/news/106-socal-cyber-cup-challenge-invites-collaboration-to-solve-cybersecurity-workforce-needs\">SoCal Cyber Cup</a>, and Paranoia Challenge so students can engage in healthy competition and skill-building among peers. For more information on cyber competitions and hackathons, check out the <a href=\"https://www.uscyberpatriot.org/\">Air Force Association’s CyberPatriot</a>, <a href=\"https://picoctf.com/\">Carnegie Mellon’s picoCTF</a>, <a href=\"https://mlh.io/\">Major League Hacking</a>, and the <a href=\"https://www.nationalcyberleague.org/\">National Cyber League</a>.</p>\n<p>Closing the cyber workforce gap will take diversification in all sense of the word.</p>\n<ul>\n<li>Diversity from supporting organizations, institutions, and companies.</li>\n<li>Diversity in learning approaches and experiences.</li>\n<li>Diversity in learners themselves.</li>\n</ul>\n<p>Enterprise, government and academic institutions must pursue innovative and engaging ways new to attract underrepresented professionals to apprenticeships, internships and alternative pathways to add diversity to the cybersecurity workforce. And based on the current state of our cyber workforce, this suggestion is not just important, it is essential.</p>\n<p>Many desired outcomes become a reality when we emphasize these efforts. It’s the unique perspectives, the inspired teamwork, the widened pool of well-qualified talent, the creativity and the “all-hands-on-desk” (see what we did there?) mentality that will help strengthen the cybersecurity industry not just for students, but for all agencies and businesses. Let’s embrace all of it!</p>\n","title":"Close the Cybersecurity Workforce Gap with Apprenticeships, Internships, and Other Alternative Pathways"}},{"node":{"id":"5ac18625-8908-5383-af16-9ae0d8600559","slug":"modern-cyber-ranges","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/CyRaaS_04_wallpaper_1920x1080.jpg"},"date":"2018-11-13T20:44:20.000Z","content":"<p>Cyber ranges were initially developed for government entities looking to better train their workforce with new skills and techniques. Cyber ranges provide representations of actual networks, systems, and tools for novice and seasoned cyber professionals to safely train in virtual environments without compromising the safety and security of their own networks.</p>\n<p>Today, cyber ranges are known to effectively train the cyber workforce across industries. As technology advances, ranges gain in their training scope and potential. The National Initiative for Cybersecurity Education reports cyber ranges provide:</p>\n<ul>\n<li>Performance-based learning and assessment</li>\n<li>A simulated environment where teams can work together to improve teamwork and team capabilities</li>\n<li>Real-time feedback</li>\n<li>Simulate on-the-job experience</li>\n<li>An environment where new ideas can be tested and teams and work to solve complex cyber problems</li>\n</ul>\n<p><iframe src=\"https://www.youtube.com/embed/YR2-XX4GrJA\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<p>In order to upskill cybersecurity professionals, commercial, academic, and government institutions have to gracefully fuse the technicalities of the field with the strategic thinking and problem-solving “soft skills” required to defeat sophisticated attacks. Cyber ranges can help do that.</p>\n<p>Currently, cyber ranges come in two forms: Bare environments without pre-programmed content; or prescriptive content that may or may not be relevant to a user’s industry. Either form limits the learner’s ability to develop many skill sets, not just what their work role requires.</p>\n<h3>Six Components of Modern Cyber Ranges</h3>\n<p>Modern cyber ranges need <strong>realistic, industry-relevant content </strong>to help trainees practice offense and defense and governance activities in emulated networks. Further cyber ranges need to <strong>allow learners to use their own tools and emulated network traffic</strong> in order to expand the realism of the training exercise. By using tools in safe replicated networks, learners will have a better understanding of how to address a threat when the real-life scenario hits.</p>\n<p>We also know that cybersecurity attacks require teams to combat them, not just one or two individuals. So, in addition to individual training, cyber ranges should also <strong>allow for team training</strong> and engagement for professionals to learn from one another and gain a bigger picture understanding of what it REALLY takes to stop evolving threats.</p>\n<p>With advances in Artificial Intelligence (AI), we know cyber ranges can now support such technology. In the case of our own Project Ares<sup>Ò</sup>, we are able to <strong>leverage AI and machine learning</strong> to gather user data and activity happening in the platform. As more users play Project Ares, patterns in the data reveal commonalities and anomalies of how missions are completed with minimal human intervention. Those patterns are used to inform the recommendations of an in-game advisor with “chat bot-esque” features available for users to contact if help is needed on a certain activity or level. Further, layering AI and machine learning gives cyber professionals better predictive capabilities and, according to Microsoft, even  “<a href=\"https://cloudblogs.microsoft.com/microsoftsecure/2018/09/05/practical-application-of-artificial-intelligence-that-can-transform-cybersecurity/\">improve the efficacy of cybersecurity</a>, the detection of hackers, and even prevent attacks before they occur.”</p>\n<p>With many studies touting the <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\">benefits of gamification in learning</a>, it only makes sense that <strong>modern ranges come equipped with a gamified element</strong>. Project Ares has a series of mini-games, battle rooms, and missions that help engage users in task completion—all while learning new techniques and strategies for defeating modern-day attacks. The mini-games help explain cyber technical and/or operational fundamentals with the goal of providing fun and instructional ways to learn a new concept or stay current on perishable skills. The battle rooms are environments used for training and assessing an individual on a set of specific tasks based on current offensive and defensive tactics, techniques and procedures. The missions are used for training and assessing an individual or team on their practical application of knowledge, skills and abilities in order to solve a given cybersecurity problem set, each with its own unique set of mission orders, rules of engagement and objectives.</p>\n<p>There is a lot of sensitive data that can be housed in a cyber range so security is the final piece to comprising a modern cyber range. The cloud is quickly recognized as one of the most secure spaces to house network components (and physical infrastructure). To ensure the cyber ranges are operating quickly with the latest updates and to increase visibility of how users are engaging in the cyber ranges across the company, security in the cloud is the latest and greatest approach for users training in test environments.</p>\n<p>There you have it. The next generation cyber range should have:</p>\n<ul>\n<li>Industry-relevant content</li>\n<li>Emulated network capabilities</li>\n<li>Single and multi-player engagement</li>\n<li>AI and machine learning</li>\n<li>Gamification</li>\n<li>Cloud-compatibility</li>\n</ul>\n<p>We are proud to have pioneered such a next generation cyber range manifest in many of our platforms including (as mentioned above), Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup>, and CyRaaS<sup style=\"font-weight: 300; font-size: 9px;\">TM</sup>. We hope this post helped you understand the true potential of cyber ranges and how they are evolving today to automate and augment the cyber workforce.</p>\n","title":"Modernizing Cyber Ranges"}},{"node":{"id":"8d6f39f6-530d-5d56-a4ac-2352c438b04d","slug":"penetration-testing-challenges-solutions","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/vulnearbility.jpg"},"date":"2018-11-07T20:23:07.000Z","content":"<p>It’s one of the most direct and proactive cyber security activities organizations can do to protect themselves from an attack, penetration testing.</p>\n<p>Also known as ethical hacking, it involves legally breaking into computers to test an organization’s defenses. Companies make it a part of their overall security process to know if their systems are strong or not. It&#8217;s kind of like preventative maintenance. If a hired penetration tester can get into their system, it’s relatively reassuring because penetration testing teams can take steps to resolve weaknesses in their computer systems before a malicious hacker does.</p>\n<p>So how does penetration testing work? What roadblocks are professionals in this field facing? How are companies using penetration testing today? What innovations in penetration testing are available today? All these questions will be answered in this article. And if you have questions about any of it, <a href=\"https://www.circadence.com/contact-us/\" target=\"_blank\" rel=\"noopener noreferrer\">please contact us</a> for more information.</p>\n<h2>What is Penetration Testing?</h2>\n<p>Now that we understand why penetration testers exist and how critical they are to companies security posture, let&#8217;s review how they work. The ethical hacking process usually involves working with the client to establish goals and define what systems can be tested, when and how often without service interruptions. In addition, penetration testers will need to gather a lot of information about your organization including IP addresses, applications, number of users who access the systems, and patch levels. These things are considered “targets” and are typically vulnerable areas.</p>\n<p>Next, the pen tester will perform the “attack” and exploit a vulnerability (or denial of service if that’s the case). They use tools like<a href=\"https://www.circadence.com/blog/kickstarting-your-cyber-security-career-path/\" target=\"_blank\" rel=\"noopener noreferrer\"> Kali Linux</a>, Metasploit, Nmap, and Wireshark (<a href=\"https://www.csoonline.com/article/2943524/17-penetration-testing-tools-the-pros-use.html\" target=\"_blank\" rel=\"noopener noreferrer\">plus many others</a>) to help paid professionals work like hackers. They will move “<a href=\"https://www.csoonline.com/article/3238128/hacking/what-is-ethical-hacking-penetration-testing-basics.html\" target=\"_blank\" rel=\"noopener noreferrer\">horizontally or vertically</a>,” depending on whether the attacker moves within the same class of system or outward to non-related systems, CSO Online notes.<iframe src=\"https://www.youtube.com/embed/-AswDH6Hq5c\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<h2>Penetration Testing Career and Company Challenges</h2>\n<p>As you can imagine, being an ethical hacker naturally requires continuous learning of the latest attack methods and breaches to stay ahead of the “black hatters” and other unauthorized users. That alone can present pentesting challenges because it requires a huge time commitment and lots of continual research. In addition, the following penetration testing challenges are keeping organizations up at night:</p>\n<ul>\n<li>There were <a href=\"https://www.cyberseek.org/pathway.html\" target=\"_blank\" rel=\"noopener noreferrer\">more than 9,800 unfilled penetration testing jobs in the U.S.</a> alone. With all these jobs open, businesses are challenged to find these professionals for hire, leaving them without resources to harden their potential security vulnerabilities.</li>\n<li>High costs prohibit hiring dedicated and skilled CPTs. Not all CPTs are created equal, while some third parties only perform vulnerability analysis as opposed to thorough pen tests.</li>\n<li>Most tests are conducted via downloaded tools or as one-off engagements focused on known threats and vulnerabilities.</li>\n<li>Many third-party engagements have to be scheduled well in advance and run sporadically throughout the year.</li>\n</ul>\n<h2>A New Penetration Testing Training Solution</h2>\n<p>Recent reports note that <a href=\"https://www.darkreading.com/vulnerabilities---threats/the-state-of-application-penetration-testing/d/d-id/1331161\" target=\"_blank\" rel=\"noopener noreferrer\">31% of pen testers test anywhere from 24-66% of their client’s apps</a> and operating systems, leaving many untouched by professionals and open to vulnerability. In the face of these penetration testing challenges, government, enterprise, and academic institutions are turning to technology and persistent training methods for current staff to help. Automated penetration testing tools can augment the security testing process from asset discovery to scanning to exploitation, much like today’s malicious hacker would.</p>\n<p>Circadence is proud to have developed a solution (available soon) that automates and augments penetration testing security professionals with a platform called <a href=\"https://www.circadence.com/strikeset/\" target=\"_blank\" rel=\"noopener noreferrer\">StrikeSetTM</a>. StrikeSet is designed to increase the efficiency and thoroughness by which pen testing is performed. Specifically, the platform can help professionals perform hacks and simulated attacks on systems while machine learning capabilities provide session analysis and create unique threat playbooks for operators. It also monitors and tracks tool behavior for classification.</p>\n<p>In addition, data is gathered from distributed operators who can remotely collaborate on how to gain access to a system and exploit development, perform SQL injections, forensics analysis, phishing campaign orchestration, and much more. That data analyzes Red Team’s TTPs with the aim of mimicking approaches to save on resources and time.</p>\n<p>With cyber attacks becoming the norm for enterprises and governments, regular scans and pen testing of application security is key to protecting sensitive data in the real world. Coupled with <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\" target=\"_blank\" rel=\"noopener noreferrer\">holistic cyber training</a> for offense, defense, and governing professionals and enterprise-wide <a href=\"https://www.circadence.com/incyt/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber hygiene education</a>, enterprises and governments will be better prepared to handle the latest and greatest threats. It’s time for organizations to leverage tools that automate and augment the cyber workforce in the wake of an ever-evolving and complex threat landscape.</p>\n<p>&nbsp;</p>\n","title":"Penetration Testing Challenges and Solutions"}},{"node":{"id":"7b8c13e7-22b9-5ac9-b107-7c18592e2322","slug":"keeping-critical-infrastructure-strong","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/critical_cyber_splash.jpg"},"date":"2018-11-01T18:05:27.000Z","content":"<p>November is <strong>Critical Infrastructure Security and Resilience Month</strong>, a nationwide effort to raise awareness and reaffirm the commitment to protect our Nation’s critical infrastructure.  Circadence’s mission is to build awareness about how next-generation cybersecurity education and training can improve cyber preparedness. This month is an excellent time to talk about that in relation to critical infrastructure.</p>\n<p>“We are seeing government agencies and companies work to make systematic, holistic, and cultural changes through improved cybersecurity standards, best practices, processes, technology, and workforce,” said Josh Davis, Director of Channels. “The massive, distributed, and legacy infrastructure we have today demands a layered security approach that focuses on building a true understanding of what’s at risk within critical infrastructure systems —and that requires a targeted focus on the people who operate these systems both digitally and physically.”</p>\n<p>We know critical infrastructure as the power we use in our homes and businesses, the water we drink, the transportation systems that get us from place to place, the first responders and hospitals in our communities, the farms that grow and raise our food, the stores we shop in, and the communication systems we rely on for business as well as staying connected to friends and family. The security and resilience of this critical infrastructure is vital not only to public confidence, but also to the Nation’s safety, prosperity, and well-being.</p>\n<p>During November (and year-round), Circadence focuses on engaging and educating public and private sector partners to raise awareness about the security posture of the systems and resources that support our daily lives, underpin our society, and sustain our way of life. Safeguarding both the physical and cyber aspects of critical infrastructure is a national priority that requires public-private partnerships at all levels of government and industry.</p>\n<p>Managing risks to critical infrastructure involves preparing for all hazards and reinforces the resilience of our assets and networks.</p>\n<p>This November, help promote Critical Infrastructure Security and Resilience Month by:</p>\n<ul>\n<li>Training your cyber teams on realistic cyber ranges like <a href=\"https://www.circadence.com/cyraas/\">CyRaaS™ to train on platforms like </a><a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup></a></li>\n<li>Educate employees on cyber awareness best practices using our solution <a href=\"https://www.circadence.com/incyt/\">inCyt™</a></li>\n<li>Take part in the <a href=\"https://www.dhs.gov/hometown-security\">Hometown Security</a> effort</li>\n<li>Engage with your community partners or support long term investments in critical infrastructure.</li>\n</ul>\n<p>Our virtualized cyber ranges-as-a-service (CyRaaS<sup style=\"font-weight: 300; font-size: 9px;\">TM</sup>) provide public/private entities the opportunity to train in realistic cyber environments that mirror their actual interconnected, internet-of-things networks. These virtualized ranges can model the digital footprints of companies, agencies, entire city networks and even Nation State operation exercises, into living physical and fifth domain environments. Teams can collaborate and train together to test and improve their cyber skills in protected environments that can scale and flex as their organizations’ inter-connected structure does, but without impacting live systems and networks.</p>\n<p>By combining Circadence’s Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup>, Orion Mission Builder™, and StrikeSet™, your organization can learn and grow without impacting your operations. This next-generation combination transforms traditional lecture-based learning, taking it out of the classroom and into interactive real-world environments, at any scale, anytime, anywhere.</p>\n<p>We all need to play a role in keeping infrastructure strong, secure, and resilient. We can do our part at home, at work, and in our community by being vigilant, incorporating basic safety practices and cybersecurity behaviors into our daily routines, and making sure that if we see something, we say something by reporting suspicious activities to local law enforcement.</p>\n<p>To learn more, visit <a href=\"http://www.dhs.gov/cisr-month\">www.dhs.gov/cisr-month</a>.</p>\n","title":"Keeping Critical Infrastructure Strong and Secure"}},{"node":{"id":"b1828fe6-b588-5fb4-b8c3-f947e2e8a134","slug":"national-cybersecurity-awareness-month","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-11-13-at-2.24.28-PM.png"},"date":"2018-10-30T20:51:44.000Z","content":"<p>National Cybersecurity Awareness Month (NCAM) in October reminds us of the importance of being safer online, in both our professional and personal lives. Easier said than done, eh? Who’s to say the majority of us even know what makes us “safer” online, or for that matter what makes us vulnerable or should raise a red flag?</p>\n<p>It all starts with awareness. I’d like to suggest that “IT Literacy” is no longer enough. Now, in 2018 and beyond, “Cyber Literacy” needs to be a year-round, all-encompassing movement. And regardless of whether or not “Cyber-” or “IT-”anything is or will be in your title, cybersecurity must matter to you.</p>\n<p>During a recent workshop presentation I delivered to attendees at the <a href=\"https://flcybercon.com/\">Florida CyberCon 2018</a> in Tampa, I likened our cybersecurity practices to the idea of personal hygiene. Because let’s face it, one’s personal hygiene is something that,<br />\na.) you are personally aware of and educated on how to maintain<br />\nb.) is attended to routinely<br />\nc.) is well understood in terms its impact on your overall health<br />\nd.) has a relative impact on everyone around you regardless of direct contact</p>\n<p>Cybersecurity can be thought of much in the same way. We must all begin to realize that cybersecurity demands the same kind of personal awareness and attention – it not only impacts us as individuals but also our family, colleagues, department, agency, company.</p>\n<p>I believe that part of the disconnect around cybersecurity best practices comes from the assumptions we make as consumers in general – that what we’re buying is designed and sold with our best interests, and security, in mind. For example, you buy a new car and it comes equipped with seatbelts, turn signals, airbags, automatic brakes and locks, etc. The food you buy and eat is certified by the Food &amp; Drug Administration to indicate it has been safely grown/ raised and suitable for human consumption. When making technology purchases, we cannot take these same conveniences for granted.</p>\n<p>Now, that’s not to say that all technology is inherently unsafe, but my point is, we can’t settle with pre-installed safety protocols because, as we know, technology is ever evolving and failure to frequently update it and use it safely results in vulnerabilities that hackers will exploit for financial, reputational, or economic gain. Just like with personal hygiene, healthy practices and regular routines are necessary for optimal cyber literacy and performance.</p>\n<p>The goal behind NCAM is to encourage us take some time to understand the problems resulting from poor cybersecurity practices. Those behaviors will not start to diminish until school counselors, parents, teachers, administrative assistants, nurses, athletes, and everyone become more aware of their cyber posture. There’s a reason why the laptop or PC you’re reading this on asks you to update its internet browser and operating system. And those push notifications you get on your phone to update your apps aren’t coming through to annoy you and eat up your battery and data. These simple practices and others &#8212; like resetting passwords and activating double-verification – will improve your cyber hygiene and protect you against ongoing threats to infiltrate the devices and exploit the data of our everyday lives.</p>\n<p>So, did you shower today?<br />\nDid you check your computer updates today?</p>\n<p>Ready to learn more? Checkout our new short, fun education videos on the <strong>“Cybersecurity Whiteboards” video playlist</strong>, here: <a href=\"https://www.youtube.com/playlist?list=PLUdKZUJquY1hn2EwlBJ90MyunBYcAaXRk\">https://www.youtube.com/playlist?list=PLUdKZUJquY1hn2EwlBJ90MyunBYcAaXRk</a>.</p>\n<p>As National Cybersecurity Awareness Month comes to a close, it’s important that the efforts put forth do not end. The reality is this: as the cost of compute power continues to be driven down by advancements in manufacturing and technology, the resources used by malicious hackers become more accessible. This, combined with the fact that a successful cyber breach gets more and more newsworthy and profitable by the day, means the problem isn’t going anywhere anytime soon. When we take steps together to be stronger individually, we become stronger collectively. We can prove the saying, “A rising tide lifts all boats.” Together, we can lift the intellectual property, national security and private data “boats” if we all commit to be more cyber conscientious and cautious.</p>\n","title":"A Rising Tide Lifts all Boats: Celebrating National Cybersecurity Awareness Month"}},{"node":{"id":"043c13a2-bb32-5f47-bc08-1fdca7fd0932","slug":"how-to-tell-if-you-cybersecurity-strategy-is-prone-to-cyberattack","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/StrikeSet_01_wallpaper_1440x900.jpg"},"date":"2018-10-26T20:45:57.000Z","content":"<p><span class=\"TextRun SCXW56339345\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW56339345\">What does your current InfoSec </span></span>environment look like? Are teams prepared to tackle evolving threats? Is your cybersecurity strategy aligned with business objectives? Do you and your team undergo regular training to stay ahead of hackers? If you’re not sure, this blog is for you. Today, we’re outlining some of the most common, overlooked, unrecognized, and “I-just-don’t-have-time” aspects that comprise an insecure InfoSec culture so CISOs can cross reference these items against their own cyber environment. <span data-ccp-props=\"{}\"> </span></p>\n<h3><b>Lack of Executive Level Threat Intelligence &amp; Communication </b><span data-ccp-props=\"{}\"> </span></h3>\n<p>Board members are looking to CISOs to report on the latest threats hitting their organization coupled with an explanation of WHY they’re being attacked. If CISOs aren’t regularly positioning themselves in front of their board communicating the company’s vulnerabilities and business risk, what happens is a lack of intel across the organization. If key stakeholders don’t have a general understanding of the latest threat intelligence happenings, a culture that values a “data privacy first” mentality cannot thrive. Skip the technical jargon and explanations of malware variants—a high level view of hacker profiles, new techniques, and new methods of hacking as it relates to the organization is sufficient.  <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<h3><b>Inconsistent (or Absence of) Cyber Team Training </b><span data-ccp-props=\"{}\"> </span></h3>\n<p>If your cyber team isn’t regularly training to upskill, they will not be prepared to tackle the latest threats. <a href=\"https://www.csoonline.com/article/3237674/ransomware/ransomware-damage-costs-predicted-to-hit-115b-by-2019.html\">Businesses fall victim to a ransomware attack every 14 seconds</a>. So, you can bet that those methods of infiltration only get more advanced as sophisticated threats convert to successful attacks and breaches. With this threat evolution comes the dire need for cyber teams to stay on top of the latest threats—and the only way to do that successfully is through immersive, gamified training. The <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\">benefits of gamification for cybersecurity training</a> are numerous, and far outpace traditional classroom learning.<span data-ccp-props=\"{}\"> </span></p>\n<h3><b>Irregular System Updates, Monitoring, and Auditing </b><span data-ccp-props=\"{}\"> </span></h3>\n<p>Performing regular system updates seems like a no-brainer, but you’d be surprised how many people let it slip through the cracks. Systems that aren’t regularly updated and assessed against current licenses/requirements will certainly be the demise of any secure cyber environment. Even little things like updating passwords monthly or installing the latest software updates can put companies at great risk. In the healthcare industry alone, about <a href=\"https://www.hipaajournal.com/lack-of-security-awareness-training-healthcare-cyberattacks/\">78 percent of medical devices were breached</a> because they weren’t properly locked. Continuous monitoring and auditing the system’s lifecycle—coupled with enterprise-wide system protection usage and authorization—will keep organization’s systems strong against threats. <span data-ccp-props=\"{}\"> </span></p>\n<p>These are just a few of the cybersecurity insecurities we see emerge in our conversations with new customers. They’re seeking InfoSec solutions that strengthen their security posture, so they can enable their team and be a trusted, visible source and security support system for the business.</p>\n","title":"How To Tell If Your Cybersecurity Strategy Is Prone to a Cyberattack"}},{"node":{"id":"0a300a3d-0056-5df2-97d8-86b6f9e0122f","slug":"new-developments-for-project-ares","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/ares_splash_no_logo.jpg"},"date":"2018-10-17T19:00:18.000Z","content":"<p>The only constant in cybersecurity is change. To best serve our customers’ needs and equip them with the latest technology, tools, and best practices that help them successfully combat evolving threats, Circadence regularly updates its cybersecurity solutions. This is the first of a regular blog post series where we will share platform news about our cybersecurity solutions.</p>\n<p>To that end, our talented engineering department recently upgraded our flagship Project Ares cybersecurity training and assessment platform.</p>\n<h3>Security</h3>\n<p>Security is not only our business but also our foremost concern for our own software. New security updates strengthen Project Ares and shrink possible vulnerabilities that today’s sophisticated hackers could take advantage of. For example, accounts now lock out after 11 unsuccessful password attempts.</p>\n<h3>Graphics</h3>\n<p>Visual improvements to Project Ares marry form and function to ease the player into a streamlined user experience throughout the mission system. This new graphic style pushes Project Ares past the industry standards of other training platforms.</p>\n<h3>Ease of Use</h3>\n<p>Administration is more streamlined. With new capability to batch reset users in the administrative panel, it is easier than ever to onboard trainees to the system. Previously, users had to upload trainees one-by-one.</p>\n<h3>Branding</h3>\n<p>Customers can now brand the log in screen with their own company logo and messaging. Personalizing the platform helps companies and agencies embrace the Project Ares platform as a core training tool for their cybersecurity team.</p>\n<h3>Content and Reporting (Project Ares for Government platform only)</h3>\n<p>Enhanced trainee reporting features and upgraded Mission content now meets Government agency performance needs and supports their stringent skills evaluation processes.</p>\n<h3>More Exciting Features Coming Soon</h3>\n<p>To keep exercises relevant and fresh for all users, the engineering team is working on exciting new battle room and mission content for future upgrades of Project Ares. For more information about Project Ares and scheduling a demo of the platform with these updates, visit <a href=\"https://www.circadence.com/project-ares\">https://www.circadence.com/project-ares</a>. Existing customers: Make sure to check out the new changes to your platform and let us know your feedback at <a href=\"mailto:info@circadence.com\">info@circadence.com</a></p>\n","title":"Living Our Mission Blog Series: New Developments for Project Ares"}},{"node":{"id":"a02fc884-8fc0-565c-a9d3-b23299f3c066","slug":"cultivating-the-next-generation-of-cyber-professionals","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/circadence_splash_no_logo.jpg"},"date":"2018-10-12T18:31:39.000Z","content":"<p>Circadence<sup style=\"font-weight: 300; font-size: 9px;\">®</sup> is proud to live out its mission to continuously educate and upskill the next generation of cyber professionals. We had the pleasure of hosting several interns over the Summer season who showed us firsthand the promise and potential they have for the industry. We had more than 20 interns spread across our offices in Tupelo, MS, San Diego, CA, and Boulder, CO. Students were placed departments pursuant to their degree programs or learning interests. <span data-ccp-props=\"{}\"> </span></p>\n<p>Interns are provided on the job experience and assist teams (both technical and administrative) with current work, while contributing to current projects and products. Each intern was assigned a specific mentor in which they were to meet with weekly for performance evaluation and learning monitoring. At the conclusion of the internship, students presented their project results and takeaways in a capstone brief, which they presented to their respective Circadence teams. All our interns did an amazing job learning new aspects of the cybersecurity industry from programming and app development to marketing and research. In this post, we feature the work of our interns in Tupelo who developed two web applications that focused on cybersecurity awareness training using trivia concepts. <span data-ccp-props=\"{}\"> </span></p>\n<p><img class=\"alignnone size-medium wp-image-3550\" src=\"https://www.circadence.com/wp-content/uploads/2018/10/Interns-with-staffs-at-Tupelo-300x188.jpg\" alt=\"Circadence interns in Tupelo\" width=\"300\" height=\"188\" /></p>\n<h3><b>Cypher</b></h3>\n<p>Tupelo interns created a mock mobile app inspired by the concept of Alberti Cipher (a code that requires a movable circle to decipher text using a cipher algorithm). In the game, the player gets an encrypted or decrypted message in a quiz-like format that requires them to use the cypher code-breaker to figure out the answer. The app is designed for “on the go” playing and learning, which supports today’s learners who want a more accessible learning platform. The interns created it as an educational tool so new and seasoned professionals alike could learn more about cybersecurity and the technical side of the industry. The interns utilized the latest technologies of HTML, CSS, JavaScript and Bootstrap 4 to develop the app, levels had different themes to keep engagement high and scoring systems help players see where they rank against other players. <span data-ccp-props=\"{}\"> </span></p>\n<p>“I see a lot of promise in them and they were all very talented and very committed to their work; their work ethic was extremely strong, and they learned a lot and made a valuable contribution to Circadence’s work,” said Lauryn Pregoni, Human Resources Business Partner in Circadence’s San Diego office. <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<h3><b>Perplex</b></h3>\n<p>Interns also developed a multiplayer trivia loot game inspired by the many mobile app games we may play today. It is based off a client-server model with two types of client modes: host and controller. The host is the interface of the game projected on a main screen like a TV or projector. Players join in a queue on their mobile devices and start the game—kind of like how you’d join in <a href=\"https://itunes.apple.com/us/app/hq-live-trivia-game-show/id1232278996?mt=8\">HQ trivia</a>. After the game has been initiated, a question pops up on a central screen and players race to select the correct answer. Players are timed to choose an answer and points are awarded based on correctness and time taken to answer. The game would be ideal for cybersecurity events or academic cyber competitions.<span data-ccp-props=\"{}\"> </span></p>\n<p>“It’s visual, multi-sensory, team-oriented, and brings everyone together in any genre to share and communicate and learn about cybersecurity,” said Katie McCustion, Human Resources Manager in Circadence’s Tupelo office.<span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<p>All projects the interns worked on were a part of the everyday work that the professionals performed. This hands-on learning allowed the interns to develop and grow their technical prowess while working together as a team on real-world projects. Interns learned new skills in coding, research, frontend and backend development, and graphic design and overall communication skills that will support their future professional pursuits. We look forward to our next batch of interns in Summer 2019 and are excited for the future of these hard working and bright individuals! <span data-ccp-props=\"{}\"> </span></p>\n<p><i>Special thanks to Circadence</i><i>’s</i><i> Jerry Camp, Lauryn </i><i>Pregoni</i><i>, </i><i>Katie </i><i>McCustion</i><i>, Wes Knee, and </i><i>Maria </i><i>Ko</i><i>-Lee</i><i> for their collaboration on this blog post. </i></p>\n","title":"Cultivating the Next Generation of Cyber Professionals: Recapping Summer Internship Projects"}},{"node":{"id":"c077eba8-9e55-5d86-ad71-4426f6b65d68","slug":"bridging-the-cybersecurity-skills-gap-with-ai","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/outro_network_highRes_v01_02.jpg"},"date":"2018-10-10T19:35:49.000Z","content":"<p>You know it and we know it. We cannot train our way out of the widening cybersecurity skills gap (<a href=\"https://cybersecurityventures.com/jobs/\">expected to reach 3.5 million by 2021</a>). We’ve discussed at length <a href=\"https://www.circadence.com/about/circ-blog/why-gamification-is-the-answer-youve-been-looking-for/\">why traditional, passive learning models in training classroom settings are ineffective</a> (not to mention boring), but at Circadence<sup style=\"font-weight: 300; font-size: 9px;\">®</sup>, we are optimists and innovators, dedicated to finding a solution—and for now, in the industry’s current state of affairs, we’ve found what works. It lies in leveraging artificial intelligence (AI) and machine learning. <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">Types of AI <span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>AI is a broad field so for the sake of simplifying, there are two types of AI that we distinguish: Narrow and General. Narrow AI refers to AI that is used for a specific function like self-driving cars. General AI tends to be a feared concept (e.g. robots taking over the world). For this post, we are focusing on Narrow AI and how it informs the cybersecurity space.<span data-ccp-props=\"{}\"> </span></p>\n<p>Within Narrow AI, we are focusing on two sub-sets of the field: Natural Language Processing (NLP) and machine learning. Together, they can provide automated and augmented relief to weary cybersecurity workers who are stretched beyond their limits. <span data-ccp-props=\"{}\"> </span></p>\n<p>NLP is present in our cybersecurity training platform Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup>. The in-game advisor Athena uses NLP to communicate with trainees in “chat-bot” format to answer questions and provide hints to players. The data that comes from those conversations with Athena (in addition to how a user progresses through exercises) is processed by machine learning, the technique where data is used to learn about a user’s actions, so it can generate a response. <span data-ccp-props=\"{}\"> </span></p>\n<p>This becomes particularly valuable when machine learning has lots of data to process in order to create different pathways to solving a problem. It’s kind of like the “two heads are better than one” motto, but machine learning needs lots of “heads” (aka, data) to generate the best solution for the problem at hand. Uber uses machine learning to understand the various routes drivers are taking to transport people from point A to point B. It then takes all those routes together and finds the most efficient route, so current and future Uber drivers can better serve their passengers. <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">How AI can work for cybersecurity pros <span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>Now, one can imagine how these two sub-fields of AI can be of value in the cybersecurity industry. With attacks getting more advanced by the minute and the frequency of attacks occurring at alarming rates (<a href=\"https://blog.barkly.com/cyber-security-statistics-2017\">an average of 200,000 malware attacks per day per company</a>), the more information we can equip machine learning and NLP with, the better it can function for us. Particularly when it comes to understanding how to defeat sophisticated cyberattacks and the appropriate steps to take for risk mitigation. <span data-ccp-props=\"{}\"> </span></p>\n<p>The more cybersecurity professionals engage with the Project Ares platform and its content, the better information data scientists have to draw conclusions on the best ways to solve the missions (and remember, the missions and battle rooms are developed from real-world threats and methods of attack, emulated on real networks). <b>The more efficiently we solve missions, the closer we are to defeating incoming threats quicker, and the more we contribute to protecting enterprises from cyberattacks and closing the skills gap.</b> <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">AI: Augmenting the cyber workforce<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>One of the exciting outcomes of AI is in its ability to augment the cyber workforce. Since there has been a staffing shortage, AI can be used to bridge the gap by scoring or ranking individuals and teams based on mission performance. The data that is collected and used to generate pathways for attack strategies and mission completion, can also inform the score or skill level a person is at. This can augment evaluation and assessment protocols, helping CISOs better evaluate the capabilities of their teams and identify areas for improvement. <span data-ccp-props=\"{}\"> </span></p>\n<p>AI can also augment cyber team task performance. For example, if an enterprise company wanted to create its own custom missions/exercises within Project Ares for its teams to train on (so they are not engaging with the same redundant exercises), designers/engineers can use AI to collect existing performance data from similar missions to create variability in another mission. Instead of the mission designer spending time creating different pathways in the mission, AI can use the data it already has to inform what and how those variabilities are developed, saving time and resources.  <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">All about the data <span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>The relationship between AI and cybersecurity comes down to how it is used within the solution and the quantity and quality of data it has available to work with. With our solutions, we leverage NLP and machine learning to automate administrative tasks currently performed by professionals and augment where staffing falls short. In the case of Project Ares, AI helps guide and teach trainees during game play, giving them new threat vectors, scenarios and tasks based on past performance and behavior. In other words, the ecosystem feeds threat data to improve training, augmenting cyber actions to ensure trainees are learning best practices to combat evolving threats. <span data-ccp-props=\"{}\"> </span></p>\n<p>What we’ve learned from the power of AI is that when it has a large corpus of data to work from, it is the most productive way to ensure systems take the best actions for the player’s learning advantage—and players, too, make informed decisions that help them defeat emerging threats.</p>\n","title":"Bridging the Cybersecurity Skills Gap with Artificial Intelligence"}},{"node":{"id":"5383c2a9-6007-59d3-b54d-9b0a86632863","slug":"3-ways-prevent-election-cyberattack","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/infrastructure_government_splash2.jpg"},"date":"2018-10-03T21:11:15.000Z","content":"<p>Voting is the crux of what we refer to as an American Democracy. Since the 2016 elections in the United States, numerous reports have cited concerns of vulnerabilities in the voting ecosystem, detailing attempts of foreign interference by organizations such as the Russian government to exploit election results with pervasive cyber attacks.</p>\n<p>To assist in securing critical infrastructure and preventing cyber attacks, Congress provided federal funding under the recent 2018 Consolidated Appropriations Act Election Reform Program, authorized by the <a href=\"https://www.eac.gov/2018-hava-election-security-funds/\">2002 Help America Vote Act (HAVA)</a>. This funding grants states additional resources to make improvements in election cyber security.  Failure to negate election interference will only perpetuate future cyber attacks, which will lower voter confidence in the democratic process and impact on voter turnout.</p>\n<p>Now more than ever, election security officials need to revisit their voting systems to leverage this newfound funding and better secure the human element that often causes cyberattacks. While the cyber attack surface of election systems is extensive due to the more than 8,000 jurisdictions in counties, states, and cities that maintain election infrastructure, there is one constant in the elections security system that can be leveraged—humans. With individuals and teams informing the entire voting process from voter registration to casting votes to reporting outcomes and auditing, humans are a key part in managing and directing both digital and manual processes.</p>\n<blockquote><p>If election security professionals can be better trained to understand how to stop cyber attacks using their own tools in emulated environments, the state of election cyber security will be greatly improved.</p></blockquote>\n<p>We’ve detailed three ways for election security officials to upskill their cyber security teams in spite of the variability in equipment and process.</p>\n<h2><strong>1. ADOPT A CONTINUOUS LEARNING APPROACH TO ELECTION CYBER SECURITY </strong><strong> </strong></h2>\n<p>In previous Circadence blogs, we’ve shared the <a href=\"https://www.circadence.com/about/circ-blog/continuous-learning-key-strengthening-cyber-teams/\">benefits of a continuous learning approach</a>, and there’s a reason for it—if cyber teams cannot keep pace with evolving adversary techniques and tactics, they won’t know how to stop them from causing mass damage. Learning basic cyber skills as well as how adversaries are using social engineering to influence election campaigns will help state, local and government election officials be better prepared to identify and respond to cyber attacks on voting systems.</p>\n<p>Unfortunately, there have been documented instances of untrained personnel who have knowingly and unknowingly jeopardized the security of elections thus far. Notably, one of the first cryptic signs of cyberespionage came when a Democratic National Committee (DNC) help desk contractor ignored repeated calls from the FBI who were reporting a cyber threat from a computer system hack conducted by a Russian group referred to as “the Dukes28.” The article notes the contractor “was no expert in cyber attacks,” and couldn’t differentiate the call from a prank call.</p>\n<p>Fortunately, with the passing of the Election Reform Program, now is the time for election cyber security professionals to dedicate the resources necessary to address all aspects of cyber security that affect a strong cyber posture. This includes:</p>\n<ul>\n<li>having the proper equipment and security protocols in place</li>\n<li>employing a trained team who can identify and combat threats quickly</li>\n<li>deployment of cyber resilience when attacks do occur, and much more.</li>\n</ul>\n<h2><strong>2. ANALYZE PREVIOUS ATTACKS TO UNDERSTAND ADVERSARY TECHNIQUES </strong><strong> </strong></h2>\n<p>It is insufficient to solely analyze the specific cyber attacks from the past few years, but it is still important to see and understand the tactics and vulnerabilities exploited, particularly since electronic voting machines are not upgraded often. Two cyber attack groups, <a href=\"https://assets.documentcloud.org/documents/3254237/Russia-Hack-Report.pdf\">Fancy Bear and Cozy Bear</a> are worth investigating further since their methods have been analyzed in detail already. From using fake personas to deliver stolen emails and documents to journalists, to the use of malware and spear-phishing, adversaries were able to access an operational infrastructure, implant the agent and encrypt communication to silently exfiltrate data remotely.</p>\n<p>Understanding adversary techniques like this can inform how cyber teams train for future cyber attacks. Election officials can begin to assess the skill level of their teams and all involved in the election process to get a sense of their capabilities and how they would approach a “Cozy Bear 2.0” for instance.</p>\n<h2><strong>3. PARTICIPATE IN OR HOST TABLETOP AND LIFE FIRE EXERCISES </strong><strong> </strong></h2>\n<p>Recently, Circadence used its Project Ares platform to help the City of Houston simulate a realistic cyber attack exercise to help public and private entities better prepare for an attack scenario. Emergency response <a href=\"https://www.circadence.com/about/circ-blog/recapping-jack-voltaic-2-0-cyber-research-project/\">simulated a </a>cyber attack on transportation, energy, water, and government sectors while senior leaders worked directly with technical professionals to develop timely responses.  This type of collaborative approach could be undertaken in every voting jurisdiction to test election systems.</p>\n<p>There will always be risks, but cities and counties are realizing that the key is getting ahead of the cyber attack and to develop effective cyber readiness policies and procedures, realistic virtual training environments can help. Running through these cyber exercises with multiple players helps leaders see apparent gaps in offensive and defensive techniques while reaffirming the practices that must take place to secure any type of infrastructure.</p>\n<p>As election security officials plan for new ways to leverage the HAVA Election Security Fund to improve processes, they will be pressed with justifying expenditures while also demonstrating that said security measures have indeed improved. The above recommendations will make elections safer and likely contribute to the restoration of public confidence in our democratic process.</p>\n<blockquote><p>The more focus election security officials place on upskilling their cyber teams with 1) continuous learning approaches, 2) analyzing past cyber attack methods, and 3) participating in realistic training events, the more effectively they reduce human error as a dominant source of cyber attacks.</p></blockquote>\n<p>To learn more ways to prevent election cyberattacks<span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> </span><a href=\"http://bit.ly/2NpCsl2\" target=\"_blank\" rel=\"noopener noreferrer\"><b>download our whitepaper “Protecting Democracy from Election Hacking.”</b></a></p>\n<p style=\"text-align: center;\"><a style=\"border: 1px solid #333333; border-color: #FF9E1B; border-radius: 1px; border-width: 3px; color: #ff9e1b; display: inline-block; font-family: helvetica,arial,sans-serif; font-size: 14px; font-weight: 300; letter-spacing: 1px; line-height: 14px; padding: 12px 10px 12px 10px; text-align: center; text-decoration: none; width: 60%;\" href=\"https://marketing.circadence.com/acton/attachment/36273/f-00b5/1/-/-/-/-/Election%20Security%20Whitepaper_master_screen.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DOWNLOAD WHITEPAPER</a></p>\n","title":"3 Ways to Prevent Cyber Security Election Interference"}},{"node":{"id":"e8c4ead1-80ae-5b9a-8874-f46d32115954","slug":"national-cybersecurity-awareness-month-year-round","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/08/Bg02.jpg"},"date":"2018-10-01T20:39:16.000Z","content":"<p><a href=\"https://www.dhs.gov/national-cyber-security-awareness-month\">National Cybersecurity Awareness Month</a> (NCAM) in October reminds us of the importance of being safer online in both our professional and personal lives. By employing fundamental cybersecurity best practices, ALL professionals from the C-Suite to the Administrator can better safeguard against ongoing threats infiltrating and exploiting systems and data every day. <span data-ccp-props=\"{}\"> </span></p>\n<p>The overarching theme of NCAM includes having a “shared responsibility [of cybersecurity] and we all must work together to improve our Nation&#8217;s cybersecurity.” Circadence couldn’t agree more. We are excited for the future of cybersecurity given the advancements in AI and machine learning and Natural Language Processing, all of which are features available in our cyber solutions focused on workforce readiness, cyber training and assessment, cyber ranges, cybersecurity awareness, and cyber competition/event support. <span data-ccp-props=\"{}\"> </span></p>\n<h3><b>Turning awareness into action </b><span data-ccp-props=\"{}\"> </span></h3>\n<p>During this month of awareness, Circadence is hyper-focused on its commitment to continue providing resources and tools to automate and augment the cyber workforce to accomplish the goal of increasing cyber resiliency across all organizations. <span data-ccp-props=\"{}\"> </span></p>\n<p>While NCSAM is entering its 15<span data-fontsize=\"11\">th</span> year as an annual initiative, Circadence has been using its history in online gaming to develop innovative solutions that help businesses defeat evolving cyber threats. We’re proud to contribute to the cybersecurity of our nation through unique training, assessment and education platforms that together, help non-cyber professionals and seasoned cyber managers become better offenders, defenders, and governance leaders. <span data-ccp-props=\"{}\"> </span></p>\n<p>It’s not just about raising awareness of cybersecurity practices; we are at a time where it’s equally important to take that awareness and use it to ACT. In the current state of cybersecurity, every business, academic institution and government organization is and continues to be vulnerable. Regardless of how many cyber teams are on the frontlines protecting your organization, regardless of the stringency of policy and procedures in place; regardless of frequency of system updates and access controls, hackers are determined, intentional, strategic and leveraging technology to manipulate a company’s data, liquidate valuable assets or finances, and ruin their reputation and public trust. Therefore, we, as cyber and non-cyber professionals, too, must be determined, intentional, strategic and continue to leverage technology to automate and augment the cyber workforce so they can stay one or two steps ahead of hackers. <span data-ccp-props=\"{}\"> </span></p>\n<h3><b>Educating and upskilling professionals to improve cybersecurity awareness </b><span data-ccp-props=\"{}\"> </span></h3>\n<p>We understand the challenges facing cybersecurity experts are insurmountable. From staffing shortages to skill deficits to budget constraints and overworked cyber teams, it can appear there’s minimal hope for improvement. We are changing that with our suite of solutions designed to place PEOPLE at the forefront of cybersecurity readiness. We believe the experts who control the advancing technologies used to prevent cyberattacks are the key to strong infosecurity environments. <span data-ccp-props=\"{}\"> </span></p>\n<p>This month is a time for cyber professionals and CISOs to explore new ways to modernize their cyber readiness strategy and upskill their cyber teams and non-cyber professionals. Circadence has two solutions to help: Its gamified training and assessment platform <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\"><b>Project Ares</b><sup style=\"font-weight: 300; font-size: 9px;\">®</sup></a> is one solution that CISOs can leverage cost-effectively to better prepare their organizations to protect against cyberattacks and elevate visibility to the C-Suite of the value of building and sustaining a strong cybersecurity posture. <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<p>Likewise, the new<a href=\"https://www.circadence.com/incyt/\"><b> inCyt</b><sup style=\"font-weight: 300; font-size: 9px;\">®</sup></a> mobile application is a game-based concept designed to educate non-cyber professionals on fundamental cyber offense and defense strategies in a fun and engaging way. The first of its kind, inCyt’s ability to educate the entire workforce through gamified activities that challenge opposing colleague’s infrastructure using phishing, botnets, and spyware disrupts the stale learning approach in the marketplace. <span data-ccp-props=\"{}\"> </span></p>\n<p>Finally, we are actively producing a <b>series of whiteboard videos</b> focused on the fundamental concepts of cybersecurity, both demystifying terminology and debunking processes to further our mission of cultivating an “all hands on deck” cyber culture. <a href=\"https://www.youtube.com/channel/UCqClEnMZakSu6IUawrHeJ2g\"><b>Subscribe to our YouTube channel</b></a> to receive updates as new videos are added to the library.<span data-ccp-props=\"{}\"> </span></p>\n<p>While National Cybersecurity Awareness Month is in October, the awareness and application of modern practices should continue throughout the entire year, so we don’t forget the value of a strong cybersecurity posture AND keep pace with imminent threats. <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<p>Let’s celebrate, educate, assess, and adopt modern cyber training practices year-round! <span data-ccp-props=\"{}\"> </span></p>\n","title":"Celebrate “National Cybersecurity Awareness Month” Year-Round"}},{"node":{"id":"23811fb9-c01d-5ddf-85bd-dd580d64a22f","slug":"do-more-with-less-strengthen-cybersecurity-posture","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/server_rrom.jpg"},"date":"2018-09-24T16:25:25.000Z","content":"<p>There is a hacker attack <a href=\"https://www.securitymagazine.com/articles/87787-hackers-attack-every-39-seconds\">every 39 seconds</a>. The average cost of a data breach in 2020 is expected to exceed <a href=\"https://www.ibm.com/security/data-breach?S_PKG=-&amp;cm_mmc=Search_Google-_-Security_Optimize+the+Security+Program-_-WW_NA-_-+costs+of+a++data++breach_Broad_-&amp;cm_mmca1=000000NJ&amp;cm_mmca2=10000253&amp;cm_mmca7=9028708&amp;cm_mmca8=aud-322234322584:kwd-417449383128&amp;cm_mmca9=976ce89f-0227-4b34-8121-4e625ce37d12&amp;cm_mmca10=253508236955&amp;cm_mmca11=b&amp;mkwid=976ce89f-0227-4b34-8121-4e625ce37d12|467|1123545&amp;cvosrc=ppc.google.%2Bcosts%20of%20a%20%2Bdata%20%2Bbreach&amp;cvo_campaign=000000NJ&amp;cvo_crid=253508236955&amp;Matchtype=b&amp;gclid=CjwKCAjwzqPcBRAnEiwAzKRgS_xfUkNmmb-fPYzLr7fZuiLI3NUyCWSI3vmtHWdOKQYMPtzMcECqVRoCsxQQAvD_BwE\">$150 million</a>. And by 2021, there will be more than <a href=\"https://cybersecurityventures.com/jobs/\">3.5 million unfilled cybersecurity jobs</a> worldwide. No enterprise is safe from an attack. <span data-ccp-props=\"{}\"> </span></p>\n<p>Because of that, CISOs realize as they evolve business operations to better serve customers, such progression has unintended security consequences and compromises. With strapped resources (both human and financial), how can CISOs in commercial sectors DO MORE to up their cybersecurity posture WITH LESS? The answer lies in the human-power to control systems, processes, and technologies.  <span data-ccp-props=\"{}\"> </span></p>\n<p>CISOs in every industry realize technologies and “one-and-done traditional training” cannot keep companies safe—but with the properly skilled individuals taking the reins to leverage those technologies optimally, the <i>human-side of cybersecurity</i> can minimize the skills gap and frequent attacks. <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">Resource Roundup<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>We’ve taken the liberty of publishing several articles to help CISOs “do more with less” to strengthen their cybersecurity posture. We understand you’ve spent lots of time and resources developing your teams. And they’re doing the best they can with the resources they have. Still, to amplify their success, ongoing training can help—and we hope these articles help, too. <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<ol>\n<li><a href=\"https://www.circadence.com/help-wanted-combating-cybersecurity-skills-shortage/\">Help wanted: Combatting the Cybersecurity Skills Shortage</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;335559740&quot;:360}\"> </span></li>\n<li><a href=\"https://www.circadence.com/modern-cyber-ranges/\">Modernizing Cyber Ranges for Professional Learning </a></li>\n<li><a href=\"https://www.circadence.com/how-to-tell-if-you-cybersecurity-strategy-is-prone-to-cyberattack/\">How to Tell if your Cyber Posture is Prone to an Attack</a></li>\n<li><a href=\"https://www.circadence.com/lessons-learned-cybercrime-incidences-financial-services-industry-can-learn/\">Cybercrime Incidents in the Financial Services Sector</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;335559740&quot;:360}\"> </span></li>\n<li><a href=\"https://www.circadence.com/cant-keep-ignoring-cyber-fatigue/\">Why We Can’t Keep Ignoring Cyber Fatigue</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;335559740&quot;:360}\"> </span></li>\n<li><a href=\"https://www.circadence.com/continuous-learning-key-strengthening-cyber-teams/\">How Continuous Learning Can Help Upskill Cyber Teams</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;335559740&quot;:360}\"> </span></li>\n<li><a href=\"https://www.circadence.com/why-gamification-is-the-answer-youve-been-looking-for/\">Why Gamification is the Answer You’ve Been Looking For</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;335559740&quot;:360}\"> </span></li>\n<li><a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\">The Benefits of Active Learning in Cyber Training</a> <span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;335559740&quot;:360}\"> </span></li>\n</ol>\n<h3 aria-level=\"2\">Growing Cybersecurity Challenges <span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>CISOs and their teams are challenged to keep pace with evolving cyber threats due to staffing shortages, resource constraints, strategy misalignment. Not to mention the continuous threat of attacks on industries with interconnected technologies. In fact, <a href=\"http://www.esg-global.com/esg-issa-research-report-2017\">70% of cybersecurity professionals</a> claim their organization is impacted by the skills shortage; With spending expected to exceed <a href=\"https://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics.html\">$1 trillion between 2017 and 2021</a> and <a href=\"https://www2.deloitte.com/insights/us/en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.html\">74% of C-suite executives</a> failing to involve CISOs the leadership table, this makes the job of the CISO incredibly difficult. That is why Circadence is dedicated to helping CISOs <b>DO MORE WITH LESS</b>—because we understand the arduous uphill climb they face (and will continue to face) if something is not done.  <span data-ccp-props=\"{}\"> </span></p>\n<p>&nbsp;</p>\n<h4><span style=\"color: #ffffff;\">Hungry for more help?</span> <strong><a href=\"https://marketing.circadence.com/acton/attachment/36273/f-48570a81-2cbb-488a-9042-a689dc0b897a/1/-/-/-/-/3as%20infographic%20%283%29.pdf\">Download our 3 A&#8217;s INFOGRAPHIC</a></strong> <span style=\"color: #ffffff;\">to learn more ways to support your cyber team against imminent threats.</span></h4>\n<p>&nbsp;</p>\n<h3 aria-level=\"2\">There’s Still Time to Up Your Cybersecurity Posture<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>If cyber teams cannot upskill and keep pace with evolving threats, commercial sectors will continue to be hacked. Customers will not only lose trust in these institutions that aim to protect them and make their daily lives functional, but they simply won’t be able to operate efficiently, economies will suffer, and more.  <span data-ccp-props=\"{}\"> </span></p>\n<p>However, for enterprises that have experienced an attack, it’s not too late to invest in cyber training to prevent another. Doing nothing after an attack is the worst possible response. With failure comes opportunity to enhance resiliency on both a company-wide level, as well as at an employee-specific level. Investing in training tells hackers the attack attempt stops at its people first. <span data-ccp-props=\"{}\"> </span></p>\n<p>For enterprises that have not experienced an attack, it’s not a matter of “if” but “when” it will occur. Digitalization and limited human resources make company’s front lines vulnerable and appealing to hackers. Now is the time to be proactive and empower cyber teams to train against hackers in a way that doesn’t require time-consuming travel, expenses, and other resources—simply a willingness to learn, grow, and upskill to better the company and themselves.  <span data-ccp-props=\"{}\"> </span></p>\n<p>Circadence wants to change how cyber professionals prepare for, protect, and defend against evolving cyber threats. We hope these, and future resources will help CISOs and cybersecurity leaders take proactive steps to strengthen their cybersecurity posture by training their teams and their entire organization, without the costly burden of traditional training courses.  <span data-ccp-props=\"{}\"> </span></p>\n","title":"CISOs, Strengthen Your Cybersecurity Posture with These Resources"}},{"node":{"id":"4aca901e-aa27-5381-959b-662c97e499da","slug":"enhanced-cyber-awareness","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/projAres_office_03_wallpaper_2560x1440.jpg"},"date":"2018-09-13T21:56:32.000Z","content":"<p>We’re constantly learning at Circadence. Learning what’s new and effective in cyber training. Understanding what our customers need and want in a cyber training platform. Discovering the issues that still keep them up at night. Learning how to improve our products to meet demands of a dynamic industry. What continues to emerge in our research are three pieces of advice (below) that direct CISOs to a place where they’re confident in their level of cyber awareness, which allows for better collaboration with their team and business stakeholders, and creates stronger protection for their organization against evolving cyber threats. <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<h3><b>ASSESS</b><span data-ccp-props=\"{&quot;335559740&quot;:259}\"> </span></h3>\n<p>CISOs know the first step in having better cyber awareness requires an understanding of how to <a href=\"https://www.circadence.com/measuring-security/\">measure security</a>. There is a need for the ability to assess the current state of cybersecurity in the organization. Now, this may not include a need to “assess” their current staffing quantity (especially if it’s just plain lean). However, they can assess other things that keep them up at night. Things like unpatched systems, outdated applications, BYOD security and IoT threats, etc. Or they can look at current access controls to see who’s using what and when and how. They can assess past breaches (if applicable) to understand what happened and how it was resolved. Or assess how digital and physical security policies are being followed by taking informational polls or facilitating interviews with authorized personnel. All of these things will help CISOs understand the basic warning signs and best practices for keeping the company safe.<span data-ccp-props=\"{}\"> </span></p>\n<h3><b>ALIGN</b><span data-ccp-props=\"{&quot;335559740&quot;:259}\"> </span></h3>\n<p>Your infosecurity vision, mission, and goals should align with the company’s overall business objectives. The goal is to support the business, not stand separate from it. Currently, CISOs spend most of their time responding to threats instead of taking a “big picture” view of their department. As a result, it becomes difficult to collaborate with business leaders to define and assess their level of cyber awareness. Not to mention report and communicate the overall effectiveness of the strategy. This lack of visibility to the C-Suite stifles the perception of organizational risk and security. To expand perceptions, CISOs can begin aligning with the C-suite by providing 1) practical knowledge of the current threat environment, 2) demonstrating how their cybersecurity strategy reflects business objectives and 3) working with stakeholders to build out a data risk dashboard that reports on progress.<span data-ccp-props=\"{}\"> </span></p>\n<h3><b>ACTIVE LEARNING</b><span data-ccp-props=\"{}\"> </span></h3>\n<p><i>Active</i> or <i>adaptive learning</i> is when individuals learn by doing. Research shows it helps learners be more engaged, empowered, excited, and shows they possess deep, conceptual understandings of topics learned. <a href=\"https://www.openlearning.com/blog/HowPeopleLearnActiveVsPassiveLearning\">Active learning</a> may involve collaborating with teams and applying concepts to real-world exercises/scenarios, which studies show <a href=\"https://cdns3.trainingindustry.com/media/3203537/game%20based%20learning.pdf\">improve retention rates by 75%,</a> compared to 5% through traditional learning methods. As a result, organizations are finding ways to use active learning to cultivate a successful workforce. In fact, the Association for Talent Development’s <a href=\"https://www.td.org/research-reports/personalized-and-adaptive-learning-shaping-employee-development-for-engagement-and-performance\">“Personalized and Adaptive Learning” whitepaper</a> reported that 83% of its respondents used some degree of personalized learning among their staff. In particular, cyber pros have begun implementing this method in the form of <a href=\"https://www.circadence.com/the-benefits-of-active-gamified-learning-in-cyber-training/\" target=\"_blank\" rel=\"noopener\">gamified cybersecurity training</a>.</p>\n<h3>CYBER AWARENESS CONTINUED</h3>\n<p>These three action-items are just the tip of the cyber awareness iceberg, but, when faced with a challenge, the hardest part is getting started. <span data-ccp-props=\"{}\"> </span></p>\n<p>We hope our research saves you time in identifying strategic next steps so you can focus on finding <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">the right tools and technology</a> to help you create a culture of cyber awareness that thrives in the face of evolving threats.  <span data-ccp-props=\"{}\"> </span></p>\n","title":"Learn the Three A’s for Enhanced Cyber Awareness"}},{"node":{"id":"4a5fe4d6-973a-5a45-8c5f-b296f1ecdcaf","slug":"understanding-the-dark-web","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/08/Dark_Web.jpg"},"date":"2018-08-22T23:20:41.000Z","content":"<p>If you are familiar with recent news reports about security incidents and threats, you&#8217;ve probably heard of the &#8216;dark web&#8217; or the &#8216;darknet.&#8217; In fact, you don&#8217;t even need to pay attention to the news. TV shows, movies and even social networking sites will introduce the terms to you. The problem is, there often isn&#8217;t any explanation about what those terms mean. Likely, the people using them have no idea what they mean. Understanding what they mean can help you better protect yourself, as well as having an idea of what is going on in these news reports. To get there, though, we&#8217;re going to take a quick journey through history.<span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">A Brief History of the Internet<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>In the beginning was the Advanced Research Projects Agency (ARPA), along with its companion organization Defense Advanced Research Projects Agency (DARPA). These organizations were federal agencies that used money from the federal budget (tax dollars) to distribute to companies to conduct research and advance our capabilities as a country, as well as a military power. In the 60s, several people and organizations discussed the idea of connecting computers together so they could communicate, including communicating over long distances. Keep in mind that at that time, “computers” were very large devices that cost millions of dollars. The idea was to make better use of those devices by letting researchers anywhere access resources where research was being done. <span data-ccp-props=\"{}\"> </span> <span data-ccp-props=\"{}\"> </span></p>\n<p>In the late 1960s, two computers were connected together to create the start of the ARPANET. The ARPAnet was where TCP/IP was eventually developed. In the 1970s and then the 1980s, several other networks were developed by other organizations &#8212; CSNET, BITNET, THEORYNET, JANET and many others around the world. Eventually, the U.S. created the NSFnet, sponsored by the National Science Foundation. The NSFnet became a backbone network with very fast connections. As a side note, this is where the misquote of Al Gore originates. He didn&#8217;t say he invented the Internet. He said he took the initiative while in Congress to create the Internet. He&#8217;s correct, in that he was a driving force behind legislation creating the NSFnet, which became the Internet over time, as all other research networks were folded into the NSFnet. Additionally, Gore was involved in legislation allowing businesses to connect to the NSFnet, truly creating what we know today as the Internet.<span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">The Connected Internet<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>The Internet isn&#8217;t a single network. It&#8217;s a large collection of networks, all interconnected. Every business and organization connect their own network to a service provider. The service provider connects to other service providers, sharing information about how to deliver information to businesses and organizations, where all the users live. The Web is an overlay on top of the Internet and refers to a specific service &#8212; servers that communicate using the Hypertext Transfer Protocol (HTTP). <span data-ccp-props=\"{}\"> </span></p>\n<p>Search engines like Google, Bing and others, make navigating the Internet possible. Not everything is searchable, though. If Google doesn&#8217;t know anything about the site, Google&#8217;s robots that are used to index sites can&#8217;t look through the site and deliver it in search results. <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">The Dark Web<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>Any site that has no connections to other sites and no other sites have connections to it is completely isolated from the search engines. The collection of sites like this, which may be web sites but may also be systems that use other protocols to serve up content to users, is a subset of the overall Internet and is sometimes referred to as an overlay. This overlay is sometimes called the “darknet” or the “dark web,” because the systems and services are not searchable by traditional search engines and you&#8217;d have to know they are there to make use of them. <span data-ccp-props=\"{}\"> </span></p>\n<p>More commonly, though, is another network overlay that was developed by the U.S. Navy. U.S. Naval Research Laboratory employees developed the concept of “onion routing” in the 1990s. Today, you may know this better as The Onion Router (TOR). TOR is a way of routing to sites through peer-to-peer connections, meaning system-to-system rather than site-or-network to site-or-network. When you hear about data being on the dark web or darknet, they are likely referring to TOR sites. They may, though, also be referring to other sites that are also connected to the Internet but can&#8217;t be found unless someone specifically knows about the site.<span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">The Implications for Cybersecurity<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>It’s important to understand what the Dark Web is because it is intimately tied to the work conducted in cybersecurity. As hackers continue to evolve in their tactics and breach practices, stealing records including medical records and people’s personal data, that information is treated as currency, sold on the Dark Web. Beyond a profit motive, according to The Independent (a U.K. newspaper), “cyber <a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/hackers-dead-people-medical-records-dark-web-cyber-security-data-a8444851.html\">criminals could exploit the healthcare records for other purposes</a> like redirecting medication to different addresses, or request doctor appointments on other people&#8217;s health plans.” <span data-ccp-props=\"{}\"> </span></p>\n<p>Healthcare is just an example of how the Dark Web informs cybersecurity efforts but as we continue to understand the intricacies of the Dark Web, its activity, and see the damaging repercussions of its mere existence, we need to take our cybersecurity efforts that much more seriously. The possibilities of exploitation are endless when hackers are motivated by financial gain, insinuating social chaos, and/or manipulating data for power and status.  <span data-ccp-props=\"{}\"> </span></p>\n","title":"Understanding the Dark Web"}},{"node":{"id":"1609c5dc-95c5-5692-9890-2cc00f15ffe0","slug":"the-benefits-of-active-gamified-learning-in-cyber-training","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/gamification_design_green.jpg"},"date":"2018-08-21T21:06:02.000Z","content":"<p>What is gamified learning? Before we dive into that question, let&#8217;s discuss some of the ways we currently learn about cyber today. Traditional cyber training has been conducted in the same way for years, comprised of static, classroom-style settings complete with a teacher lecturing and passive listeners. <a href=\"https://trainingmag.com/trgmag-article/strategies-make-learning-stick\" target=\"_blank\" rel=\"noopener noreferrer\">This model causes people to forget</a>: <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">40% of what they’ve learned after 20 minutes<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Between 50-80% of what they’ve learned after one day  <span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">77% of what they’ve learned after six days</li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">90% of what they’ve learned after one month <span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p>In addition to forgetting material learned, there’s minimal opportunity for the student to proactively solve problems, think critically, and analyze material. Instead, they superficially understand concepts without truly learning their application to real-world situations. This leaves the trainees disengaged, disempowered, bored, and unmotivated. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>We believe there’s a better way to deliver information security training—a way that engages teams in healthy competition and in critical thinking and problem-solving activity. Through active learning, studies show learners are more engaged, empowered, excited, and possess deep, conceptual understandings of topics learned. <a href=\"https://www.openlearning.com/blog/HowPeopleLearnActiveVsPassiveLearning\" target=\"_blank\" rel=\"noopener noreferrer\">Active learning</a> involves collaborating with teams and applying concepts to real-world exercises and scenarios, which <a href=\"https://cdns3.trainingindustry.com/media/3203537/game%20based%20learning.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">improves retention rates to 75%,</a> compared to 5% through traditional learning methods.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h3><b>So </b><b>why is active learning so important for cybersecurity professionals?</b></h3>\n<p>Because the undeniable <a href=\"https://cybersecurityventures.com/jobs/\" target=\"_blank\" rel=\"noopener noreferrer\">jobs shortage</a> affecting the industry is prompting CISOs to take a closer look at ways in which they can close the skills gap. The first step involves leveling up existing cyber teams by equipping them with the tools and skills they need to do their jobs better. Without proper cyber training and skills development, professionals can’t keep pace with evolving cyber threats, causing teams, organizations, and companies to succumb to hacker attacks. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>How significant is this issue? According to a recent <a href=\"http://www.esg-global.com/esg-issa-research-report-2017\" target=\"_blank\" rel=\"noopener noreferrer\">ESG/ISSA study</a>, 70% of cybersecurity professionals claimed their organization was impacted by the cybersecurity skills shortage, with ramifications such as an increasing staff workload, hiring and training junior personnel rather than experienced professionals, and situations where teams spend most of their time dealing with the emergency du jour, leaving little time for training, planning, strategy, etc. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>So what can we do about this? <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h3><b>Consider gamified cyber training </b></h3>\n<p>Not only is hands-on, active learning important but we believe that gamification is the natural, logical step in training the <a href=\"https://www.digitecinteractive.com/wp-content/uploads/2018/02/gamification_white_paper2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">next gen learner</a> (born after 1980), who has never known a world without video games. Gamification is often defined as the process of adding games or game-like elements to something. The term was originally coined in 2002 by a British computer programmer named Nick Pelling. When we think about the benefits of gamification of cyber security training, it is a learning style best suited for today’s learner who grew up playing video games and being motivated by elements like leaderboards, competition, collaboration, and social proof/progression.</p>\n<p>Even academic institutions across cyber schools are exploring <a href=\"https://www.circadence.com/wp-content/uploads/2019/07/EDU-Testimonial-Infographic-v3_final_March2020.pdf\">cyber security games for students</a> to complement their classroom learning. Some institutions like CU Boulder have even <a href=\"https://marketing.circadence.com/acton/attachment/36273/f-5214c34c-f9b3-4b15-b7e4-cb9eec2ba305/1/-/-/-/-/Building%20a%20Immersive%20Cyber%20Curriculum%20with%20Project%20Ares%20FINAL.pdf\">crafted an entire class around gamified cyber training</a> using Project Ares in their syllabus.</p>\n<p>Unlike compliance-driven teaching methods, gamified teaching engages practitioners individually and in teams, through modern learning strategies. It works by deploying connected, interactive, social settings that allow learners to excel in competitive, strategic situations. Further, it enables learners to apply what they know to simulated environments or “worlds,” creating a natural flow that keeps learners engaged and focused. Organizations that offer gamified exercises to teams report that <a href=\"https://www.computerweekly.com/news/252437833/Automation-and-gamification-key-to-cyber-security\" target=\"_blank\" rel=\"noopener noreferrer\">96% of workers see benefits</a> including increased awareness of weaknesses, knowledge of how breaches occur, improved teamwork and response times, and enhanced self-efficacy.  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>In gamified environments, trainees are typically: <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https://www.csoonline.com/article/3069948/security/7-reasons-to-gamify-your-cybersecurity-strategy.html\" target=\"_blank\" rel=\"noopener noreferrer\"><b>rewarded</b> for good behavior</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>incentivized</b> to maintain good behavior<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>encouraged</b> to dialogue about their lessons learned with peers<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>reminded</b> of what they don’t yet know and held accountable<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>engaged</b> in their progress thanks to leaderboards<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>prepared</b> to participate in simulated threat situations that further prepare them when real-world situations occur<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p>Active, gamified cyber training is only effective if employees apply their skills learned and acquired to real-world scenarios. For this reason, cybersecurity leaders are encouraged to measure the effectiveness of training efforts through regular audits and assessments to determine which employees may still pose a risk to the overall security posture of the organization. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><i>“Keeping our workforce engaged, educated and satisfied at work is critical to ensuring </i><i>organisations</i><i> do not increase complexity in the already high-stakes game against </i><i>cyber crime</i><i>,” </i><i>Grant </i><i>Bourzikas</i><i>, chief information security officer at McAfee</i><i>.</i><i> (</i><i>ComputerWeekly</i><i>)</i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:864,&quot;335559737&quot;:864,&quot;335559738&quot;:200,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h3><b>Great, there are clear benefits. Now what?</b></h3>\n<p>Now it’s time to reflect on how your organization can <a href=\"https://marketing.circadence.com/acton/media/36273/blog-gamified-cybersecurity-training\" target=\"_blank\" rel=\"noopener noreferrer\">benefit from gamification in cybersecurity training</a>. First, look at what training (if any) is currently occurring. Then, speak with teams about where they’d like to improve and draw clear parallels between the investment in training and desired business outcomes. And of course, when you&#8217;re ready to learn more, <a href=\"https://www.circadence.com/contact-2/\">contact us</a> to see how gamified training actually works through our Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup> platform.</p>\n","title":"Game On: The Benefits of Hands-On, Gamified Learning in Cyber Training"}},{"node":{"id":"31dae1cb-7249-506d-9e2b-f6f5134f0997","slug":"game-of-titans-cyber-challenge-raises-awareness-of-gamified-training-and-assessment-solution","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/08/Bg02.jpg"},"date":"2018-08-14T22:09:18.000Z","content":"<p>We hosted our first-ever “Game of Titans” Cybersecurity Challenge in Las Vegas recently, gathering security professionals together to compete on our Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup> cybersecurity platform for a chance to win several prizes.</p>\n<p>The event did not disappoint! Between the amazing Esports Arena venue, which offered enticing views of the game play, combined with the presence and engagement from celebrity hacker Vinny Troia, who provided colorful commentary and judging, and enthusiastic YouTube sensation Zach Hill of <a href=\"https://twitter.com/TalkTechDaily\" target=\"_blank\" rel=\"noopener\">TalkTechDaily</a>, who graciously live streamed the event, it was a success!</p>\n<p>Competitors had the opportunity to practice on the Project Ares platform for up to 11 days in July before entering the qualifiers and then attending the live final round in Vegas. For the CISOs and other tech leaders who wanted a more intimate view of the platform, we also hosted several private demonstrations of Project Ares in-suite at Mandalay Bay. We enjoyed conversations with leading cybersecurity influencers who were looking for a better way to solve their cybersecurity challenges in the face of staffing shortfalls and skills deficits.</p>\n<p>The inaugural Game of Titans competition culminated with three winners including best defensive player, offensive player, and MVP (pictured here). Congrats to the night’s MVP Monique Moreno with Ellucian, to Tim Nary with Booz Allen Hamilton who was the Red Team winner and Jordan Scott with Boecore as the competition’s Blue Team winner.</p>\n<p>We hope the event inspired these individuals and others to keep on strengthening the cybersecurity profession and gave interested cybersecurity professionals the opportunity to see how gamified cyber training and assessments can benefit their professional portfolio and organizational security position.</p>\n<p>&nbsp;</p>\n","title":"Game of Titans Cyber Challenge Attracts Top Professionals, Raises Awareness of Gamified Training and Assessment Solutions"}},{"node":{"id":"fe012ba9-eaef-5518-8363-61686963ddda","slug":"recapping-jack-voltaic-2-0-cyber-research-project","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/05/critical_cyber_splash-1.jpg"},"date":"2018-08-02T22:32:09.000Z","content":"<p>Late last week, Circadence<sup style=\"font-weight: 300; font-size: 8px;\">®</sup> participated in the <a href=\"https://www.aecom.com/press-releases/aecom-launches-new-infrastructure-resilience-national-preparedness-framework/\">Jack Voltaic 2.0 Cyber Research Project</a> held in Houston, Texas. The event was described as a “bottom-up approach to critical infrastructure resilience,” where the City of Houston, in partnership with AECOM and the Army Cyber Institute (ACI) gathered with critical infrastructure partners to study cybersecurity preparedness gaps. <span data-ccp-props=\"{}\"> </span></p>\n<p>Developed by the ACI at West Point, Jack Voltaic 2.0 took place July 24–26 at the Houston Emergency Center and results from the activity will be published in a technical report from the Army Cyber Institute in November 2018. <span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<p>Our own Laura Lee, executive vice president of rapid prototyping, attended the exercise and shared her experience in a quick Q &amp; A. <span data-ccp-props=\"{}\"> </span></p>\n<p><b>What made this event special?</b><b> </b><span data-ccp-props=\"{}\"> </span></p>\n<p><b>LL</b><b>:</b> This truly was a first of its kind event where a major city brought together both public and private entities across many different critical infrastructure sectors to prepare for a cyber event. It involved energy, healthcare, transportation, water and government services all working together to resolve an attack. The <a href=\"https://www.ajc.com/news/cost-city-atlanta-cyber-attack-million-and-rising/nABZ3K1AXQYvY0vxqfO1FI/\">City of Atlanta suffered a cyberattack</a> in early 2018 that caused millions of dollars and interrupted services in the city for weeks. The goal of this event was to avoid that type of situation and prepare, just like Houston does for hurricanes or the Super Bowl. There are always risks but the key is getting ahead of an event and developing policies and procedures to handle it.<span data-ccp-props=\"{}\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<p><b>What was the environment of the event like</b><b>? </b><span data-ccp-props=\"{}\"> </span></p>\n<p><b>LL: </b>During service restoration and when determining what was happening during the simulation, technical experts were serious in their pursuits to remediate the issues. Each team chose a leader and immediately and got to work. Harris County (where Houston resides) were quietly discussing what they were seeing for web attacks in their network, while the Port of Houston Authority were dealing with ransomware. Each team reported up to the Houston Emergency Center, with some teams reporting live via an online conferencing system. The activity was taken very seriously, and it felt like a real-world response. <span data-ccp-props=\"{}\"> </span></p>\n<p><b>What was </b><b>one of the </b><b>highlight</b><b>s</b><b> of the event?</b>  <span data-ccp-props=\"{}\"> </span></p>\n<p><b>LL: </b>The team from Memorial Hermann Health was asked to brief what they saw in ransomware and how they handled it. It was a Webex broadcasted to the 150 people in the Houston Emergency Center. All the teams were listening carefully to the report, trying to understand if they were seeing similar things. At this point, the hospital had successfully handled the attack, and everyone was gaining confidence and excitement. <span data-ccp-props=\"{}\"> </span></p>\n<p><b>Why did Circadence participate in this research exercise?</b><b> </b><span data-ccp-props=\"{}\"> </span></p>\n<p><b>LL: </b>Circadence is in a unique position to support city and state-wide cyber exercises because the company’s cybersecurity training and assessment platform, Project Ares®, offers virtual worlds that represent businesses and agencies in the real world. We have a synthetic internet with simulated users performing normal day-to-day jobs all in a closed, safe environment. For the event, it allowed key users to see and test what happens with the latest malware or cyber tactic. By using the Project Ares platform, we can select multiple environments that make up a city and then bring in real people, as if it was the actual city under attack. This gives a new dimension and real-world feeling to traditional “table top” exercises that are typically used for disaster preparedness. It’s a way to bring all the people required (government, industry, academia) together and includes the technical and policy personnel so everyone learns how to work together. We are passionate about helping every critical industry sector, every state, and every city learn to successfully mitigate cyber risk. <span data-ccp-props=\"{}\"> </span></p>\n<p><b>Circadence – Contributing to Critical Infrastructure </b><b>Cybersecurity </b><span data-ccp-props=\"{}\"> </span></p>\n<p>Circadence supported the 6-month event planning process for the Jack Voltaic 2.0 Cyber Research Project. &#8220;We met almost monthly and created a realistic scenario within Project Ares, which resulted in a coordinated attack on the city,” said Laura. “We worked together to create events that would challenge each participant and then during the event, we ran the Live Fire exercise portion for the technical team players. We also displayed the results and analysis in real time within the large Emergency Center area so the policy makers could understand what was happening technically.”  <span data-ccp-props=\"{}\"> </span></p>\n<p>Cyberattacks rarely affect a single target. Instead, unanticipated effects could ripple across interconnected infrastructure sectors, which is why infrastructure resilience is more critical than ever. Varying defensive capabilities and authorities complicate the response. If exploited by a determined adversary, these unidentified gaps leave our nation vulnerable. Circadence was proud to participate in this exercise and help close gaps in critical infrastructure cybersecurity through its Project Ares platform. <span data-ccp-props=\"{}\"> </span></p>\n<p>Watch the full press briefing from the City of Houston <a href=\"https://twitter.com/HoustonTX/status/1022161613606907905\" target=\"_blank\" rel=\"noopener\">here</a>. <span data-ccp-props=\"{}\"> </span></p>\n","title":"Recapping Jack Voltaic 2.0 Cyber Research Project: A Q&#038;A with Laura Lee"}},{"node":{"id":"258fac48-b9f1-5f3b-860e-4f6fa47be089","slug":"benefits-of-security-and-devops-working-together","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/07/Screen-Shot-2018-11-28-at-9.20.54-AM.png"},"date":"2018-07-31T23:07:32.000Z","content":"<p>For years, security professionals, including myself, have advocated for security to be part of the development process. Recently, development has been undergoing a big shift &#8220;to the left&#8221; so that security is part of a more integrated process in development. You may be aware of this change as DevOps. DevOps means that development and operations, the team responsible for deployment and management, work closely together rather than having cold hand-offs. One of the ways this works is by automating as much as possible, including building, packaging, testing and deployment. The integration came at an opportune time when shifts in software development started in the late 1990s, now called Agile.<span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">What is Agile?<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>Agile is about rapid development that produces a releasable product at the end of each iteration. Most importantly, Agile is about focusing on customer needs and not big, over-developed software. DevOps provides the ability to take the idea of Agile several steps further. Beyond just having a product that the customer can use, DevOps opens the door to deployment and delivery. As more applications and functions become enabled through web technologies, there are more frequent deployments that the customer can use. Pinterest, as an example, deploys up to 50 times a day to their platform.<span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">Where Security Comes In<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>You may be wondering where exactly the security comes in here. Security professionals may be concerned about what DevOps means for them. As it is, when a development process is complete, security gets tossed a product to do testing and assessment. How bad could that be if development and deployment is happening at least once every couple of weeks? Fortunately, there are answers to this question and the good news is, it helps from a security perspective, and this is where “shifting left” comes in. <span data-ccp-props=\"{}\"> </span></p>\n<p><iframe src=\"https://www.youtube.com/embed/4DlzJbNcqIc\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe></p>\n<p>When we talk about “shifting left,” we mean that we are pushing things earlier into development process. Like the operations team, the security team can provide their needs and requirements to development early on. This can mean ensuring that security tests are built into the test automation. It should also mean that security is working closely with developers so developers understand what secure development looks like &#8212; appropriate practices and frameworks, for instance. <span data-ccp-props=\"{}\"> </span></p>\n<h3 aria-level=\"2\">Implications for the Customer<span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h3>\n<p>If security and its requirements are incorporated earlier in the process and security professionals become a more prominent stakeholder, the customer benefits. Each development cycle has to factor in security and if there is anything required of the security team, they get tasks just like any of the developers or operations staff. This may include changes to intrusion detection systems, firewalls or web application firewalls if it&#8217;s a web application being developed. <span data-ccp-props=\"{}\"> </span></p>\n<p>An enormous advantage to regular deployments is the time to repair shrinks. If development teams are releasing even every two weeks, customers have a better chance of getting updates that fix security issues much faster. This helps the company and it helps the customer. It is a win-win. <span data-ccp-props=\"{}\"> </span></p>\n<p>Similarly, if processes are automated, the security team is in an even better position because there is less chance of human error that may result from botched installs or configurations.<span data-ccp-props=\"{}\"> </span> Security work has its benefits in this instance.</p>\n<p>In the end, the blend of DevOps with Security, now referred to as DevSecOps, has enormous potential to improve application security. If you aren&#8217;t looking into it for your teams, you should be. Move security left!<span data-ccp-props=\"{}\"> </span></p>\n","title":"DevSecOps: The Benefits of Security and DevOps Working Together"}},{"node":{"id":"f404e834-a2ed-5340-b2b5-7739bd7ad44d","slug":"circadences-laura-lee-mentors-young-women-cybersecurity-badge-program-launch-event-girl-scouts-partnership-palo-alto-networks","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/08/Bg02.jpg"},"date":"2018-07-24T18:51:32.000Z","content":"<p>Our own Laura Lee, executive vice president of rapid prototyping, recently mentored young girls at a Girl Scouts event on Wednesday, June 27, that celebrated the launch of <a href=\"https://www.girlscouts.org/en/about-girl-scouts/our-partners/palo-alto-networks.html\" target=\"_blank\" rel=\"noopener\">a new cybersecurity badge program.</a></p>\n<p>The program is the brainchild and joint partnership between Palo Alto Networks and Girl Scouts of the USA (GSUSA). It is a national effort aimed at eliminating traditional barriers to technology industry access, such as gender and geography. According to the Girl Scouts, the programming will target girls as young as five years old, helping ensure that even the youngest girls have a foundation primed for STEM careers.</p>\n<p>Laura, along with a group of nine other cybersecurity industry leaders, mentored six girls at a time in a roundtable format and answered questions about cybersecurity careers. While each mentor shared their own professional journey in cybersecurity, three common themes emerged: 1) no one started out thinking they wanted to be in cybersecurity but rather fell into it; (2) cybersecurity requires curiosity, life-long learning and diversity; (3) not many women are in the field (and the girls can change that!).</p>\n<p>Laura shared how she started out as an aerospace engineer building Missile Defense systems, a 15-year career path that prepared her for a transition into cybersecurity defense. She shared how Circadence® participates in many cybersecurity education events including the SoCal Cyber Cup, a challenge for middle and high school students, where a female won the entire competition. The story of the young girl winning such a notable competition was a strong proof point to the potential for more women to enter the cybersecurity field. The example brought an enthusiastic round of applause among the Girl Scouts.</p>\n<p>“I told them to think broadly about cybersecurity – it isn’t just computer science. In every field (medical, law, economics), there are cybersecurity aspects, so [I said they] should learn about it no matter what [they] want to pursue,” said Laura.</p>\n<p>The mentorship event reflected Circadence’s commitment to educate and train everyone interested or involved in cybersecurity, from aspiring professionals to seasoned experts. Further, the event was an opportunity to show the Girl Scouts how engaging and fun cybersecurity jobs can be, especially with the introduction of platforms like Circadence’s Project Ares®, a gamified teaching and training tool for cybersecurity professionals. “Being involved in this is another fundamental way to explain how a serious game [like Project Ares] can help teach concepts,” said Laura.</p>\n<p>While Laura’s stories and insight proved invaluable to the girls, Laura left the event equally impressed with the girls&#8217; level of engagement and interest in cybersecurity. Circadence is proud to have Laura represent the company and use her expertise to inspire and educate the next generation of cybersecurity professionals.</p>\n","title":"Circadence’s Laura Lee Mentors Young Women at Cybersecurity Badge Program Launch Event for Girl Scouts in Partnership with Palo Alto Networks"}},{"node":{"id":"f7b8ff22-c1cc-5159-bdf8-8400b8b926f1","slug":"play-watch-experience-circadence-host-first-ever-game-titans-cyber-challenge-las-vegas","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/08/JV2.jpg"},"date":"2018-07-20T01:43:54.000Z","content":"<p>As the New York Times points out, “Video games are beginning their takeover of the real world,” and with the popularity of Fortnite and other events gaining traction, Circadence® is jumping on the voyeuristic video game bandwagon hosting its first “Game of Titans” Cyber Challenge–a unique event that will demonstrate the power of its immersive, online cybersecurity training platform Project Ares®.</p>\n<p>The “Game of Titans” competition is one of THREE ways cybersecurity warriors can experience the power of gamification within cybersecurity training in Las Vegas from August 6 through August 9.</p>\n<p>We’ve detailed the three opportunities for cybersecurity experts and enthusiasts to get involved below—and we look forward to seeing and meeting everyone in Las Vegas!</p>\n<p>Cyber Battle Competition – Play to Win!<br />\nCelebrity cybersecurity expert and ethical hacker Vinny Troia will oversee and judge the competition providing commentary of gamers’ progress for non-competitors watching the action.</p>\n<p>Qualifying rounds take place July 27-28 and finals will be held on-site at the new Esports Arena inside the Luxor Hotel and Casino in Las Vegas. Finalists will then compete live on-stage on August 7 from 6 to 10 p.m. in front of an audience using the Project Ares platform to show off their cybersecurity skills and talents.</p>\n<p>Interested competitors need to register online by July 26 or early bird entrants can <a href=\"https://marketing.circadence.com/acton/media/36273/blog-project-ares-cyber-challenge-2018\">register before July 22</a> for early access to Project Ares in order to practice. Prizes will be awarded for best offensive and defensive players as well as an MVP. Details to register can be found here.</p>\n<p>Competition Attendance – Watch the Action!<br />\nWhile the Esports Arena Las Vegas is open to the public, the competition is a true VIP experience where invited attendees enjoy food and drinks and a close-up view to the action. Audiences can watch the top players compete live on-stage for the inaugural “Project Ares Titan” crown and title.</p>\n<p>Viewers will be able to see up-close footage, live-action play, and instant replays—just like watching a football game. Audiences can jump aboard the popular game watching movement that’s inspiring a new generation of mainstream entertainment.</p>\n<p>Private Demos – Experience the Platform!<br />\nCircadence will be hosting private in-suite demonstrations at the Mandalay Bay Hotel and Casino <a href=\"https://marketing.circadence.com/acton/media/36273/blog-project-ares-demo-aug2018\">Monday, August 6 through Thursday, August 9 from 10 a.m. – 4 p.m.</a> for those interested in learning more about the platform’s capabilities for cyber teams.</p>\n<p>Demo registrants can speak one-on-one with Circadence representatives about their specific cybersecurity challenges and needs to find the best solution for them. Food and drink will be available in the suite. Interested parties can sign up for a 30-minute demonstration <a href=\"https://marketing.circadence.com/acton/media/36273/blog-project-ares-demo-aug2018\">here</a>.</p>\n<p>“We are excited to host the first Project Ares ‘Game of Titans’ Cyber Challenge for both novice and experienced cyber professionals, and the Esports Arena is the perfect space for attendees to experience the power and capabilities of the platform up close,” said Keenan Skelly, Circadence VP of Global Partnerships and Security Evangelist. “We hope the competition will inspire curiosity in using gamification in training as well as help people see for themselves how the platform can aid in their professional development, so they can keep pace with evolving cyber threats.”</p>\n<p>If you still need more information about getting involved in any of these opportunities, please contact <a href=\"mailto:adageenakis@circadence.com\">Amy Dageenakis</a>.</p>\n","title":"Play, Watch, Experience: Circadence to Host First-Ever “Game of Titans” Cyber Challenge in Las Vegas"}},{"node":{"id":"d1312341-8bb6-52b6-bf9e-97cd272ddcf6","slug":"guis-are-evil","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/PLC.jpg"},"date":"2018-07-18T01:40:31.000Z","content":"<p>Graphical User Interfaces (GUIs) are evil. Or in the words of a friend of mine – “the work of the devil.” I know people generally like shiny windows and icons and that’s fine for a lot of work. But, when it comes to being an info security professional, GUIs are just wrong in many cases. Stick with me. You will want to rethink your position on “just give me a shiny GUI over white letters in a stark, black window any day.” Here are a few reasons why GUIs aren’t necessary.</p>\n<p><strong>Minimize distractions</strong></p>\n<p>One of the biggest issues with a GUI is that it is designed to take away the onerous drudgery and work from performing computing tasks. If I’m writing a document, such as this one, give me a few bells and whistles so I can more easily manipulate text using a mouse. However, if I’m honest, I’m writing this in as close to a text editor as you can get. No frills. No clutter. Just a visual representation of a sheet of paper. Sometimes you need to shove everything off your desk and get to work without the distractions.</p>\n<p><strong>Don’t bury the details</strong></p>\n<p>When a GUI appears to be doing a lot of the work for you, it is. At the same time, it’s hiding a lot from you. The developers believe, sometimes rightly, that the details are clutter that will get in the way of you doing your job. You should be focused on the work and not the minutiae of how the work is done. However, the very things the GUI is hiding from you are often the details that you really need to see as a technology professional. Without the details, it can be hard to learn how everything fits together. As an example, if you were doing forensics work using one of the GUI tools like EnCase or FTK, you either wouldn’t get some of the low-level details or it would be harder to see them, as you’d get from tools like SleuthKit. Using the SleuthKit, you really need to understand how the filesystem is put together to be able to understand the output.</p>\n<p>Beyond that, there are cases where the tools you need for a task are just command-line based. As an example, if I to want to see whether another system was available and responsive on the network, I would use the program ping. There is no GUI alternative, at least installed by default on most operating systems, for ping. The same is true for traceroute/tracert. If you needed to do some troubleshooting for problems with your domain name server, it’s easiest to use a program like nslookup or dig. There are no other tools that are GUI-based that are available by default.</p>\n<p><strong>Automatic task completion</strong></p>\n<p>The last case I will put to you, though there are several others, is the ability to complete complex tasks automatically. When we use command line programs, we can put a list of those commands together into a file and have the entire list executed. On Windows, this would be called a batch file or a PowerShell script. On Linux, it would be called a shell script. This means you can have a complete process that can be repeated verbatim, over and over again. On Linux and other Unix-like operating systems, including macOS, you can chain several commands together to perform complex operations. The ability to take the output from one command and use it as an input to another program is called piping.</p>\n<p>Let’s take an example. The following command sequence takes the idea of piping beyond just output -&gt; input.</p>\n<p>ps auxww | tr -s ” ” | cut -d ” ” -f 2 | sort</p>\n<p>This command sequence gets you a process list, which has a lot of space characters between columns, and sends the output to a program that translates characters. This particular command removes extra space characters. The output, without all the extraneous characters, goes to the program cut. This program cuts the second column (field) from the output with the space character as the delimiter between the fields. Finally, the output of that, which is the process ID, is sent to the program sort. What we end up with is a sorted list of all the process IDs.</p>\n<p>Command line programs give you a lot of control over the information you get and how it’s presented. You can enjoy your GUI programs if you like but I will tell you that if you really want to become a knowledgeable security professional, you should get comfortable with the command line. It will be your friend and give you a lot of power while minimizing your dependence on fancy GUIs.</p>\n","title":"GUIs Are Evil"}},{"node":{"id":"f14fe621-81ef-5a4f-b8c4-d9ad2244a188","slug":"continuous-learning-key-strengthening-cyber-teams","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/08/Way-Too-Happy-People-HD.png"},"date":"2018-06-19T22:48:31.000Z","content":"<p>There is a lot out there about the benefits of continuous learning—or continuous professional development—and what we’re gleaning from research is how POWERFUL the approach can be when applied to cyber team training.</p>\n<p>Like most industries, the only constant in cybersecurity is change. It’s not enough for cyber professionals to get technical degrees and certifications to call themselves experts. Ever-evolving cyber threats are a constant thorn in the sides of cyber professionals. They are responsible for finding new ways to stay ahead of the game to swiftly and efficiently defeat threats before they do damage to their company. CISOs in particular have the unrelenting challenge of identifying opportunities to assess, enable, train, and retain their cyber teams, which usually requires time they don’t have. To assist with this challenge, a simple and effective solution is continuous learning.</p>\n<p>Continuous learning is exactly what it sounds like: the ability to continually develop skills and knowledge to perform effectively in the workplace. When it comes to cyber teams, they must be “students of the business,” willing to stay current with the latest news and industry developments to grow their understanding and apply any new knowledge gained to their jobs.</p>\n<p>Practicing continuous learning within your cybersecurity team delivers the following benefits:</p>\n<ul>\n<li>Protects your company against evolving cyber threats</li>\n<li>Enables and empowers cyber teams to perform optimally and efficiently</li>\n<li>Increases productivity</li>\n<li>Expands knowledge of current hacker methods and understanding of ways to stop attacks</li>\n<li>Improves decision making</li>\n<li>Stimulates cognitive activity, keeping teams actively engaged and passionate about what they do</li>\n</ul>\n<p>Due to the widespread skills shortage of cybersecurity professionals (<a href=\"https://iamcybersafe.org/wp-content/uploads/2017/07/N-America-GISWS-Report.pdf\">projected 1.8 million open and unfilled positions by 2022</a>), organizations need ways to develop skilled teams to fight ever-evolving cyber threats.</p>\n<p>Many leaders are addressing this problem by adopting a continuous learning philosophy that involves consistent training and up-skilling their teams. In fact, 60% of companies use training to build security expertise (<a href=\"https://blog.coursera.org/continuous-training-can-close-cybersecurity-skills-gap/\">Coursera</a>) and 96% of cybersecurity professionals agree that they must keep up with their skills or the organizations they work for will be at a significant disadvantage (<a href=\"http://c.ymcdn.com/sites/www.issa.org/resource/resmgr/surveyes/ESG-ISSA-Research-Report-Lif.pdf\">ESG Research</a>).</p>\n<p>However, preconceived notions of cost and time prevent lots of companies from offering continuous development opportunities for their employees (<a href=\"https://www.csoonline.com/article/3240245/security/cybersecurity-professionals-arent-keeping-up-with-training.html\">only 38% of cybersecurity pros say their organizations provide the right level of training and education</a>). Fortunately, there are training platforms out there (such as our very own <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">Project Ares<sup>®</sup></a>) that are both cost-conscious and time-saving in the sense that they don’t require time away from the office to train.</p>\n<p>We recommend CISOs adopt continuous learning by:</p>\n<ol>\n<li>Interviewing and assessing cyber teams to identify skills deficits and, therefore, understand what team members need to learn/develop.</li>\n<li>Address large workloads via automation and augmentation so that cyber teams can move away from data handling tasks and into higher-level reasoning and analysis.</li>\n<li>Providing ample opportunities for skills development through <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">persistent, gamified training</a>, mentoring, networking, and continuing education.</li>\n<li>Developing teams incrementally and continuously via a “day-by-day, month-by-month” mindset – as the job is never done in this field.</li>\n<li>Dedicating resources, setting expectations, and aligning corporate culture with the goal of enabling employees to get the learning they need to protect and defend the organization at every stage of their careers.</li>\n</ol>\n<p><strong>Continuous learning will up-skill and strengthen your cyber teams so that they are prepared to defend your organization against ever-increasing cyber threats.</strong></p>\n<p>Increased understanding, skill and application of offensive and defensive strategies, will greatly improve your organization’s security posture and help keep the hackers at bay.  As technology and connectivity strengthen with each passing day, steps must be taken immediately to adopt a culture that values and emphasizes continuous learning to help avoid your organization being featured as the victim in the next cybersecurity attack headline.</p>\n","title":"Why Continuous Learning is Key to Strengthening Cyber Teams"}},{"node":{"id":"b992a772-9762-5c9f-a8f7-ca63079de217","slug":"the-illusion-of-security","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-06-19-at-1.24.41-PM.png"},"date":"2018-06-12T14:57:17.000Z","content":"<p>When you fly, you are subjected to a lot of requirements when passing through a security checkpoint. You have to take off your belt and jacket, remove everything from your pockets, you can&#8217;t carry in liquids more than 3 ounces and on and on. When someone, many years ago, devised a way to carry a bomb in their shoes, we were all required to take our shoes off when we passed through security. Of course, there are ways around these things by getting a background check and giving up your fingerprints. However, even after doing all that, you still have to pass through metal detectors and you still can&#8217;t bring in liquids. Despite all these restrictions, people still manage to get knives, liquids and other supposedly banned items through security.</p>\n<p>When I was in college, many years ago, I had a job doing physical security. What I knew then was that being visible, so everyone was aware there was a security presence who would step in if it was necessary, was often adequate to keep incidents from happening. Does either the Transportation Security Administration (TSA) or my own presence completely keep bad things from happening? Of course not. In security circles, what the TSA does is called security theater. It provides the illusion of security. This sounds derogatory and dismissive. The fact of the matter is that just having that presence keeps random people from doing stupid things on a spur of the moment. Will it keep determined people out? No, but that&#8217;s not really the point anyway.</p>\n<p>While the illusion of security can often have benefits, there are also a lot of downsides. Where it is especially an issue is when it comes to information security. Too many times when I did security consulting, I was asked by clients to provide a security assessment that was primarily focused on making them compliant with some set of requirements, whether for payment card processing, health care or maybe regulations or laws. Often, the most sensitive or vulnerable parts of the organization were out of scope. There is rarely enough time to do a thorough analysis of an entire network. Getting a report indicating that very little was found can provide some executives and other leadership the belief that they can&#8217;t be compromised.</p>\n<p>This is where the illusion of security is very dangerous. Anytime someone gives you the sense that you are safe from attack or compromise, you are potentially in an even more dangerous situation. If you get a good &#8220;health check&#8221; from a security assessment or penetration test, take it for what it is &#8212; a snapshot with a very limited view.</p>\n<p>These tests are not the only place where you can start to get the illusion that you are safe and protected. Vendors often sell elaborate, end-to-end solutions. Without any intention to impugn such vendors, what you are buying into there is the lens of a single company. Everyone has a bias because everyone sees things differently. Getting multiple views into what&#8217;s happening in your organization from the standpoint of information security can be very valuable. However, that&#8217;s not to say more is necessarily better. More information can be a good way to blind yourself because it takes so much time and effort to sift through all the data you have acquired.</p>\n<p>Perhaps even worse than a single vendor, end-to-end solution, though, is having multiple vendors whose products can&#8217;t communicate effectively. You may have the latest and greatest in information security technology but if the different pieces can&#8217;t play nicely together, you&#8217;re in a far worse position because you believe all the components will &#8220;do the right thing.&#8221; Modern attacks, though, are complex and far-ranging. You need to be able to correlate events across multiple devices to get a broader sense of an attacker&#8217;s actions. If you aren&#8217;t getting all the details from all the devices, you&#8217;re going to miss when the bad guys get in.</p>\n<p>This sounds bleak, for sure. It&#8217;s complicated. There aren&#8217;t perfect answers to these challenges. The important thing is to bring it back to basics &#8212; understand what the problems you have are, what resources you want to protect, and what adversaries you are most concerned about. All of this should be done rationally and realistically and not motivated by fear, uncertainty or doubt. It’s better to make decisions from a position of knowledge and awareness.</p>\n","title":"THE ILLUSION OF SECURITY"}},{"node":{"id":"f259e0b1-534a-5eec-98fa-3574695eb81a","slug":"project-ares-featured-on-computer-america-radio","status":"publish","template":"","format":"standard","featured_media":null,"date":"2018-06-11T16:51:21.000Z","content":"<p>Recently, our own Keenan Skelly, VP of Global Partnerships and Security Evangelist with Circadence<sup style=\"font-weight: 300; font-size: 9px;\">®</sup>, was interviewed by Computer America’s Ben Crossman regarding Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup>, our flagship training and assessment platform for cybersecurity professionals. Keenan shared how Project Ares works, what it can be used for and the benefits of gamified training.</p>\n<p>The top 5 key takeaways from the interview include:</p>\n<p>1. The next generation way to cyber train is through gamification, allowing participants to train in a scalable way while improving information retention.</p>\n<p>2. A benefit to using the Project Ares platform is having access to its virtual cyber ranges that emulate enterprise networks, putting real-life tools in the hands of trainees, mirroring what they would be doing in the real world. 3. Increased diversity helps program AI technology to better account for “<a href=\"https://www.scmagazine.com/diversity-and-ai/article/777429/\" target=\"_blank\" rel=\"noopener\">every-person’s AI</a>.” We should consider how programming of these systems is unintentionally informed by our own personal biases.</p>\n<p>4. We need to adjust our messaging around what it means to be a woman in cybersecurity and introduce young women and girls to the different roles that exist in the field today to spark interest.</p>\n<p>5. It is critical to remain aware of how data privacy legislation will affect offensive and defensive work (not to mention personal cybersecurity practices) so companies remain compliant with industry regulations while staying vigilant against evolving threats.</p>\n<p>Keenan concluded that while the negative effects of cyberattacks are in the headlines every day, we have an opportunity to change the paradigm of cybersecurity for the better. Cybersecurity is not just an IT challenge, it’s everyone’s responsibility to stay vigilant in today’s interconnected world.</p>\n<p>To listen to the interview in full, visit <a href=\"https://computeramerica.com/2018/06/11/circadence-interview-us-super-computer-bitcoin-value-apple-bans-cryptomining/\" target=\"_blank\" rel=\"noopener\">https://computeramerica.com/2018/06/11/circadence-interview-us-super-computer-bitcoin-value-apple-bans-cryptomining/</a>.</p>\n","title":"Project Ares Featured on Computer America Radio"}},{"node":{"id":"0ca0e534-20c0-570a-9218-14693982663d","slug":"cant-keep-ignoring-cyber-fatigue","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/geneic_team.jpg"},"date":"2018-06-07T15:40:17.000Z","content":"<p>The ever-present threat of cyber attacks is taking its toll on info sec newcomers and veterans alike who are struggling to keep pace and can lead to cyber fatigue, which is a growing concern among both cyber professionals and consumers.</p>\n<p>But just WHAT exactly is it? Most resources associate it with users who <a href=\"https://www.techrepublic.com/article/cybersecuritys-biggest-challenge-trust/\">“just can’t be bothered with using a new password,”</a> prompting users to make poor decisions with regard to their security efforts. In our experience working with government, academic, and commercial enterprises, cyber fatigue affects cyber professionals who are overworked, under-resourced, and lack proper training—leaving professionals throwing up their hands in fatigue and frustration.</p>\n<p>Many organizations do not have the right sized cyber teams to alleviate workloads and effectively combat attacks; cybersecurity employees are fatigued from long hours, lots of pressure, and unreasonable workloads. This leads to dissatisfied employees and high attrition rates. This is a serious problem because organizations that are trusting their data security to a fatigued cyber team is ultimately, a threat to us all.</p>\n<p><strong>According to a new KPMG report, “<a href=\"https://advisory.kpmg.us/content/dam/kpmg-advisory/risk-consulting/pdfs/2016/cyber-fatigue-web.pdf?utm_source=CIOsponsorshipCyberFatigue&amp;utm_medium=blog&amp;utm_campaign=%20C-00033068&amp;cid=%20C-00033068\">How to Bounce Back from Cyber Fatigue</a>,” a new model is needed to transform cybersecurity strategy from one that is draining and reactive to one that is energized and proactive.</strong></p>\n<h2>A Five-Pronged Approach to Combat Cyber Fatigue</h2>\n<p>The <a href=\"https://advisory.kpmg.us/content/dam/kpmg-advisory/risk-consulting/pdfs/2016/cyber-fatigue-web.pdf?utm_source=CIOsponsorshipCyberFatigue&amp;utm_medium=blog&amp;utm_campaign=%20C-00033068&amp;cid=%20C-00033068\">KPMG report</a> offers a five-pronged approach for organizations to combat the symptoms of cyber fatigue:</p>\n<ul>\n<li><u>Make measured investments in cyber capabilities based on risk</u>: Quantify the risk by understanding its impact and effect on overall business objectives. How will a threat actor interrupt the achievement of a core business goal? Then look at the risk in terms of monetary cost to the company compared to likelihood of the risk occurring based on current circumstances.</li>\n<li><u>Regularly measure the effectiveness of your info security investments</u>: Info security costs include the expected physical hardware and software costs in addition to more intangible elements like supply chain services, training, etc. Listing out all current allocations of resources and spending will allow info sec pros to compare the cost of cybersecurity to their overall risk tolerance and make adjustments in investments to best meet the organization’s needs.</li>\n<li><u>Develop/align the right cyber risk management model</u>: Communicate on an enterprise-wide level the significance of a “protect data first” mentality across the organization and set expectations that breaches are not an “if” but “when” occurrence. Ensure all stakeholders understand what is needed to manage today’s risk and how the cyber team is preparing to protect and defend the company.</li>\n<li><u>Continually update your model to reflect emerging threats</u>: Continued vigilance is key to managing cyber threats. They’re a moving target and companies need systems or platforms to help prepare cyber teams to combat the latest attacks. Immersive training platforms like our own Project Ares® can help teams and leaders make continued investments in their skills development to keep pace with evolving cyber threats.</li>\n<li><u>Build and promote a risk-aligned security organization</u>: Cybersecurity isn’t just the responsibility of the info sec department or the CISO. It’s an enterprise-wide responsibility. It needs to be treated as a strategic priority with a top-down focus. A cybersecurity readiness program that includes a <em>skill assessment</em> and <em>skills development</em> component will help keep cyber teams prepared to manage the latest cyber threats and attacks.</li>\n</ul>\n<p>Instead of a “spend more, more, more” mentality, organizations would benefit from taking these approaches and starting collaborative, C-suite involved conversations that advance them toward a culture of cyber awareness and proactivity.</p>\n<p>Cyber threats are only getting more sophisticated and intelligent and cyber teams need to do the same in their cyber workforce preparedness. By maximizing info security investments and protecting the firm’s assets with robust staff training and skills development, CISOs can sleep a little easier at night—and more readily tackle tomorrow’s cyber threats.</p>\n","title":"Why We Can&#8217;t Keep Ignoring Cyber Fatigue"}},{"node":{"id":"813c273f-56d6-5b7a-af68-28879d49467b","slug":"circadence-ranks-top-10-cybersecurity-training-firms-black-book-market-research","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/server_rrom.jpg"},"date":"2018-06-05T14:00:16.000Z","content":"<p>Black Book Market Research, the parent group for Black Book Rankings, recently ranked Circadence<sup>®</sup> among the <a href=\"https://www.prnewswire.com/news-releases/knowbe4-ranks-top-cybersecurity-training-solutions-2018-black-book-market-research-user-survey-300647471.html\">top 10 cybersecurity training firms for 2018</a>.</p>\n<p>Circadence’s premier cybersecurity training platform, <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">Project Ares<sup>®</sup>,</a> is an immersive, gamified, AI-powered platform designed to help cyber professionals hone their skills and knowledge to defeat evolving cyber threats.</p>\n<p>Black Book conducts an annual poll of cybersecurity clients across 17 functional areas of cybersecurity from training and education to blockchain to endpoint solutions. Firms were rated by industry client satisfaction and loyalty scores via independent key performance indicators. A total of 2,464 cybersecurity system users and senior level managers participated in the seven-month crowdsourced survey. Black Book collects ballot results on 18 performance areas of operational excellence to rank vendors by software, systems, products, equipment and outsourced service lines.</p>\n<p>Circadence is proud to be recognized within the top 10 list of companies making impressive strides in bettering the cybersecurity industry as a whole. We believe with the right training and continuous learning, enterprise, government, and academic institutions will be better positioned to defeat attacks so that we can all continue to enjoy the benefits of being connected without being compromised. It is this belief that drives our commitment to helping companies combat evolving cyber threats with persistent training and assessment tools customized to our customer’s industry and cybersecurity needs.</p>\n","title":"Circadence ranks in top 10 cybersecurity training firms by Black Book Market Research"}},{"node":{"id":"915bdd9b-739a-5e8a-8d91-2d10ad8182af","slug":"youre-not-alone-common-cybersecurity-challanges","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-06-19-at-2.20.25-PM.png"},"date":"2018-05-31T19:29:15.000Z","content":"<p>We’re taking a 30,000-foot view of cyber security to understand the state of the industry from an enterprise perspective and share some common challenges faced by diverse industries. Doing so provides infosec leaders insight into how challenges emerge in their workplace and potentially a sense of relief knowing their industry (and themselves, as professionals) are not alone in this struggle.</p>\n<p>Cyber security remains dynamic and turbulent as businesses and technologies grow in complexity and hackers become more sophisticated. There is much discussion regarding the need to increase cyber security spending to expand cyber teams to cover more ground. And, we know that many businesses lack confidence in their current cyber readiness, due in part to many of these common challenges detailed below.</p>\n<h2><strong>Lack of qualified cyber security experts</strong></h2>\n<p>Finding cyber security professionals who possess specific technical skill sets is an uphill battle for many infosec leaders who are trying to grow and expand their cyber teams. According to <a href=\"https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it\">Harvard Business Review</a>, one of the main reasons is that businesses tend to look for people with traditional technology credentials instead of individuals possessing a wide variety of professional and technical skills. As attacks get more sophisticated varied skill sets of both technical (forensics, network analysis, malware detection) and professional (communication, problem-solving, analysis) will be required to combat them effectively, so leaders would be wise to expand their talent searches to include more diverse skill sets moving forward.</p>\n<h2><strong>Lack of structured upskilling among talent</strong></h2>\n<p>Senior staff often have a significant advantage over newer hires because they understand the ins and outs of their company. However, simply because they have advanced in their careers, they are not necessarily the most effective when trying to teach junior staff new skills and approaches to cyber security since conducting effective training is often a full-time job itself. Concurrently, it is difficult for IT professionals to consistently remain up-to-date on best practices across all aspects of cyber security. The <a href=\"https://www.esecurityplanet.com/network-security/2019-it-security-employment-outlook.html\">2019 IT Security Employment Outlook report</a> and many other resources note a 3 million staffing gap in cyber positions. Skills needed include the ability to <strong>identify</strong> key cyber terrain and risks, <strong>protect</strong> organizational assets and data, <strong>detect</strong> unauthorized access and data breaches, <strong>respond</strong> to cybersecurity events and attacks, and <strong>recover</strong> normal operations and services. Investing in consistent, structured, measurable training to upskill existing team members is an effective way to assess and combat these deficiencies.<strong> </strong></p>\n<h2><strong>Staff retention and fatigue</strong></h2>\n<p>Since many organizations do not have the proper resources to alleviate heavy workloads and to effectively combat cyber threats, information security employees are often fatigued from long hours, immense pressure, and unreasonable workloads. These issues contribute to dissatisfied employees and high attrition rates across the industry. All of these issues taken together pose a serious problem because organizations that are trusting their security to a fatigued and undermanned or under-skilled cyber team is ultimately a threat to us all. <a href=\"https://www.csoonline.com/article/3253627/leadership-management/cybersecurity-job-fatigue-affects-many-security-professionals.html\"><em>CSO magazine</em></a> recommends that companies assess “the state of mind of key staff members, create work schedules to rotate personnel off the front lines, and provide the right levels of support, stress relief programs, and career counseling.”<strong> </strong></p>\n<h2><strong>Combating common cyber security challenges</strong></h2>\n<p>These challenges are daunting and exist across many industries, keeping many infosec professionals up at night. Fortunately, by expanding the pool of candidates for positions by looking for more diverse skill sets, investing in <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">immersive cyber security training</a>, and understanding the state of mind of key staff members including monitoring their level of job satisfaction and fatigue, firms can more effectively combat these common challenges.</p>\n<p>&nbsp;</p>\n","title":"Common Cyber Security Issues and Challenges"}},{"node":{"id":"75f7fb63-5c9c-551a-811e-c298c2c9fa80","slug":"lessons-learned-cybercrime-incidences-financial-services-industry-can-learn","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/infrastructure_financial_splash.jpg"},"date":"2018-05-30T16:11:05.000Z","content":"<p>Banks, credit unions, credit card companies, investment firms, and insurance companies are all under cyberattacks—making financial cyber security a hot topic of discussion. For years, the finance industry has been one of the hardest hit with cybercrime according to <a href=\"https://www2.deloitte.com/us/en/pages/financial-services/articles/dcfs-transforming-cybersecurity.html\">Deloitte</a>. And it continues to rank in the top five most vulnerable industries. In 2017, 69 material cyber incidents were reported to the Financial Conduct Authority, an increase from the 38 incidents in 2016, according to <a href=\"http://www.information-age.com/rise-cyber-attacks-financial-services-firms-123470588/\">Information Age</a>. Financial cyber security regulations are keeping companies in check but the pace at which threats evolve in sophistication requires a persistent approach to stay ahead of hackers.</p>\n<p>If you bank online or have an insurance policy, you likely understand the convenience of single keystroke access to financial information. It’s easy, convenient and useful to transfer funds from mobile device to mobile device; electronically sign a form; or get a quote for a mortgage company just by entering in new financial details. Unfortunately, the rapid pace of adoption of new technologies that make these everyday transactions convenient is widening the attack surface for hackers and prompting security professionals to consider even stronger finance cyber security risk management processes.</p>\n<h2><strong>Financial Cyber Security Incidents</strong></h2>\n<p>Below are some of the most notable cybercrime attacks on financial services firms that we can learn from in order to take a more proactive approach to cyber security readiness.</p>\n<p><strong>Equifax </strong></p>\n<p>The consumer credit reporting agency was breached in 2017, exposing the sensitive personal information of more than <a href=\"https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding-millions-more-people-who-were-affected-by-its-massive-data-breach/?noredirect=on&amp;utm_term=.6b093132dec7\">147 million Americans</a>. Partial driver’s license data was the primary data leaked. Equifax representatives said the vulnerability that allowed for the attack to occur was the failure to keep its computer systems adequately up to date.</p>\n<p><strong>Bank of Chile</strong></p>\n<p><a href=\"https://www.reuters.com/article/us-chile-banks-cyberattack/bank-of-chile-trading-down-after-hackers-rob-millions-in-cyberattack-idUSKBN1J72FC\">State-backed hackers</a> infiltrated the Bank of Chile’s ATM system in January 2019 and stole $10 million. The cyber heist was deployed via hackers initiating a virus as a “distraction” then prompting banks to disconnect 9,000 computers to “protect customer accounts.” Meanwhile, hackers sneaked in and used the global SWIFT bank messaging service to deploy fraudulent transactions.</p>\n<p><strong>India’s Cosmos Bank </strong></p>\n<p>Unauthorized users accessed their system and <a href=\"https://www.reuters.com/article/us-cyber-banks/state-sponsored-cyberattacks-on-banks-on-the-rise-report-idUSKCN1R32NJ\">siphoned nearly $13.5 million</a> through withdrawals across 28 countries. Unidentified hackers created a proxy switch that approved all the fraudulent payments.</p>\n<p><strong>Lazarus group</strong></p>\n<p>North Korea’s hacking operations are targeting financial institutions nationwide—completely indiscriminate of a brand or geographic location. The country is linked to attacks in <a href=\"https://www.cnn.com/2017/04/03/world/north-korea-hackers-banks/index.html\">18 countries</a>, according to a report from Russian cyber security firm Kaspersky Lab. The hacking operation known as “Lazarus” targeted employees at banks who visited the hackers’ list of 150 specified internet addresses. <a href=\"https://www.csoonline.com/article/3187548/security/kaspersky-lab-reveals-direct-link-between-banking-heist-hackers-and-north-korea.html\">Experts</a> say the attacks are at a “level of sophistication not generally found in the cybercriminal world,” and companies should take proactive measures to carefully scan their networks for the presence of Lazarus malware samples, disinfect their systems and report the intrusion.</p>\n<p><strong>Bangladesh Bank </strong></p>\n<p>Bangladesh Bank experienced a hack in February 2016 that drained <a href=\"https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/\">$81 million</a> from accounts in a few short hours. <a href=\"https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/\">Attackers subverted the bank’s SWIFT accounts</a>, the international money transfer system, to get what they wanted, reports <em>Wired</em> magazine. Hackers sent more than three dozen fraudulent money transfer requests to the Federal Reserve Bank of New York asking the bank to transfer millions of Bangladesh Bank’s funds to accounts in the Philippines, Sri Lanka, etc. <a href=\"https://www.wsj.com/articles/fbi-suspects-insider-involvement-in-81-million-bangladesh-bank-heist-1462861549\">Reports</a> indicate lax computer security practices were to blame (e.g. lack of firewalls installed on the networks), allowing hackers to easily infiltrate the network and find the credentials needed to proceed. The concept of attacking systems on the weekend isn’t a new approach either—other banks like <a href=\"https://www.computerweekly.com/news/450404344/Top-10-cyber-crime-stories-of-2016\">Tesco</a> experienced the same timing in November 2016 when thousands of current account customers were hit with fraudulent transactions by hackers.</p>\n<h2><strong>Learning from Financial Cyber Security Incidents</strong></h2>\n<p>Outdated systems, employee exploitation, weakened network security, and a poor ratio of defenders to hackers all contribute to the severity of these financial cyber security incidents.</p>\n<p>These attacks tell us a lot about what preventative steps can be taken. To ensure financial services firms have the latest systems updated and in place requires an experienced cybersecurity team to perform regular system checks and updates.</p>\n<blockquote><p>Financial cyber security compliance leaders need to empower their teams with the right tools and persistent learning opportunities so they can be prepared for any malware infection or system overwrite that occurs.</p></blockquote>\n<p>The increase in reported attacks reflects a greater need for accountability across all financial institutions. As the attack frequency grows, so must our cybersecurity vigilance. Cyberattacks will adapt to defense strategies so financial firms need to ensure they are always one step ahead. The best way to achieve this goes beyond hiring our way out of the issue. Training your cyber workforce proactively using <a href=\"https://www.circadence.com/blog/cyber-ranges-101-and-how-they-improve-security-training/\">gamified cyber range training </a>to combat the latest threats is the key to sustained success.</p>\n<h3 style=\"text-align: center;\">For more information on how financial firms can upskill their security workforce<br />\nd<a href=\"https://marketing.circadence.com/acton/attachment/36273/f-96d7e7fd-bce9-49e1-940a-b34d3931449a/1/-/-/-/-/Project%20Ares%20-%20Learn%20by%20Doing%20%283%20Subsc%20Table%29%20June%202019.pdf\">ownload Project Ares subscription brochure</a>.</h3>\n<div class=\"_3tLhF\">\n<div class=\"_3Hx4x vem7e\">\n<div class=\"_36ib3\">\n<div class=\"_1Pp3a\">\n<div class=\"_3bJ2H CHExY\">\n<div class=\"_1l8RX _1ByhS\"><span style=\"font-size: 8pt;\">Photo by <a href=\"https://unsplash.com/@alexandermils?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Alexander Mils</a> on <a href=\"https://unsplash.com/search/photos/finance?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash</a></span></div>\n</div>\n</div>\n</div>\n</div>\n</div>\n","title":"Learning from the Top 5 Financial Cybersecurity Incidents"}},{"node":{"id":"62a098a0-5177-5a01-88c1-ab4ad622bb7c","slug":"measuring-security","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/09/testimonybg.jpg"},"date":"2018-05-24T19:44:59.000Z","content":"<p>What do you think of when you hear the term &#8216;information security&#8217; or even the term &#8216;cybersecurity&#8217;? If you think about how it all works, you may think about vulnerabilities, firewalls, intrusion detection systems, anti-virus or perhaps something else entirely. What probably doesn&#8217;t come to mind are terms like metrics and measurement. These are elements of information security that seems to get short shrift a lot, in spite of their importance. No matter what aspect of a company&#8217;s security posture, metrics are essential.</p>\n<p>As an example, if we start on the low end of the scale, the one where everyone has an impact on the company, we talk about security awareness. Companies today generally have security awareness programs to help their employees know how to do the right things when it comes to interactions outside the company and especially with corporate resources and sensitive information. These awareness programs often start with some form of training &#8212; computer-based or video. The question is: how do we measure the effectiveness of this training? Ultimately, what is the goal of a security awareness program? To make sure employees know what information security is and the impact they have on it? Of course not. It&#8217;s to ensure that employees alter their behavior in order to better protect the organization and its resources. So how do you measure behavior change?</p>\n<p>Metrics aren&#8217;t always about numbers. Sometimes we just need help retracing the steps after something has happened (e.g. qualitative information). Recently, I was looking at trying to measure some behaviors with respect to firewalls – asking: what happened and when did it happen? What I discovered was that neither iptables nor firewalls, the two Linux-based firewalls, provided any persistent details when rules were changed or what the rule changes were. It doesn&#8217;t appear as though it&#8217;s possible to even turn on that level of logging. One open source firewall where a Web interface is used to make changes is PFSense. This is a firewall based in the BSD operating system. After making changes to the rules, there was no indication of a change having been made in any of the log files. How do we measure over time the changes to rulesets and the impact they have had if there is no record of the changes to begin with?</p>\n<p>Measurement comes down to identifying the problem, much like many other aspects of information technology (or even other industries and endeavors). In the first case above, what is the problem? The problem is that humans can have a negative impact on the security posture of an organization. So, what are we measuring? Are we measuring whether we&#8217;ve trained all the people in the organization? We could, and it&#8217;s easy to measure that, but what would be the purpose? If your organization has to demonstrate compliance to a set of standards, this may be useful. It&#8217;s more important to measure behavior, and more importantly, changes in behavior as a result of training.</p>\n<p>One way to measure behavior changes, is to send e-mails with links that should look like they are untrustworthy. If the links are clicked (the URL would be one that goes to a site controlled by information security or information technology), there is evidence that the behavior hasn&#8217;t changed. What do you do with the information when behavior hasn&#8217;t changed? Put people through the training again? If it didn&#8217;t work the first time, what would suggest that it may work the second time?</p>\n<p>And this is why measurement is important. Without this data, you don&#8217;t know when something is going wrong. You also won&#8217;t know what is going wrong. Unfortunately, there are no easy resolutions. More data isn&#8217;t necessarily better. The best approach when it comes to measuring security is to clearly identify the problem or situation. It&#8217;s essential to take a logical and rational approach to this and not feel like you have to protect against absolutely everything. Once you have identified the situation, you can determine what you need to measure, as in the case of awareness training. The really hard part is in interpreting the data. In the case of security awareness, we know that people are not making decisions based on the training they have had. Do you address that by sending the people through training again? Do you re-evaluate the training?</p>\n<p>It&#8217;s not always easy to make the right decisions but having the right data to inform your decision is essential. You can only have that if you think through ahead of time what the right data is, so you can ensure you are collecting it.</p>\n<p><a class=\"button color-7 large cta-contact-btn btn_slider\" style=\"transition: none; text-align: inherit; line-height: 15px; border-width: 1px; margin: 0px 5px 0px 0px; padding: 18px 30px; letter-spacing: 1px; font-weight: 400; font-size: 15px;\" href=\"http://marketing.circadence.com/acton/fs/blocks/showLandingPage/a/36273/p/p-0035/t/page/fm/1\" rel=\"noopener\">Sign Up For Our Newsletter</a></p>\n","title":"MEASURING SECURITY"}},{"node":{"id":"7a511534-02dc-51ed-bff3-9637fc8e08b6","slug":"importance-cybersecurity-awareness-education-easily-attack-friends-enemies","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/05/customer_education_splash.jpg"},"date":"2018-05-07T17:47:51.000Z","content":"<p>While it hasn&#8217;t received as much conventional press as, say, the Equifax data breach, there was recently a significant event that took place on the Internet. A service called Memcached, which allows chunks of data to be shared between websites, is or was vulnerable to being misused to send large amounts of data to unsuspecting targets. One of these targets was Github, though there were others that have not been named. What made these attacks so significant is their sheer volume. According to Arbor Networks&#8211;a company that has made denial of service attack protection their life&#8217;s work for more than 20 years&#8211;one of their customers received roughly 1.7 terabits per second of attack traffic.</p>\n<p>Think about that for a second. Let&#8217;s say that you have a fairly conventional 100 megabits per second connection to the Internet at home. It would take you 17,000 seconds to transmit the same amount of data and that&#8217;s assuming you had 100 megabits per second outbound at home (you likely don&#8217;t) and you were able to saturate the connection. It would take you nearly 5 hours to send that same amount of traffic that it took just a second to push out.</p>\n<p>How does this happen? This was an <strong>amplification attack</strong>, which means the attacker sends a very small amount of data to one place and that place responds with something much, much larger to someone else. Let&#8217;s say that Bob wanted to attack Edgar. He sends a box that weighed 1 pound to Alice (using common Internet naming conventions, Alice and Bob regularly do things with each other). However, he tells Alice that the box came from Edgar. As a result, Alice sends a box weighing 15,000 pounds to Edgar. Edgar won&#8217;t be able to get that box through his front door. Let&#8217;s also say that not only Bob is sending these boxes to Alice to go to Edgar, but Charlie, Fred and Daniel are in on the act too. That&#8217;s suddenly several very large boxes</p>\n<p>Now back to the recent incident. Some researchers have indicated the amplification rate for the service used isn&#8217;t 15,000 as in our example but instead, more like 52,000. What was already a lot of very large, very heavy boxes is suddenly increased by a factor of 3-4x.</p>\n<p>The problem here comes, in part, because the developers used the user datagram protocol (UDP). UDP is often used where a lack of overhead is considered a useful feature. Because there is no actual connection between the system sending and the one receiving &#8212; the data is just sent, sort of like if you were to start talking into an intercom without having any idea if the person on the other end of the intercom was there &#8212; the data can be sent faster, theoretically. When developers use UDP for transmission, they expect that the messages they are sending will never be checked to ensure arrival. They also don&#8217;t check to see if the receiving party is at home.</p>\n<p>Not checking to see if the receiving party is home allows attackers to use UDP. UDP is an easy protocol to launch spoofing attacks with because there is never any check to see whether the sending address is correct. That allows Bob to send a message to Alice saying he is Edgar. Alice assumes the sending address is correct and so responds to that address. There is no checking by anyone for address validity and veracity.</p>\n<p>Any service that listens for messages on the open Internet (meaning there are no or few restrictions on who can send messages in) that doesn&#8217;t do some form of validation and verification, is exposing others on the Internet to attack. <strong>This is why cybersecurity is everyone&#8217;s problem and why cybersecurity awareness is so critical.</strong></p>\n<p>The people responsible for these attacks are not the attackers. They are the developers who didn&#8217;t consider the potential for misuse and abuse of their service. They are the system administrators who stood up servers running this service without considering the potential for bad people on the Internet who misuse and abuse servers to cause problems for other people and businesses. The servers that were misused and abused were not owned by the attacker. They were owned and maintained by legitimate businesses.</p>\n<p>If developers and administrators (not to mention executives who should be expected to sign off on these sorts of decisions), continue to make bad choices because they are not aware of the security implications of their actions, people and businesses will continue to be exposed to these overwhelming amplification attacks. When businesses can&#8217;t respond quickly enough to shut down their servers that are being abused and misused, other businesses will continue to have to pay their price for the lack of education, awareness and caring about the welfare of these other people and companies.</p>\n<p><a class=\"button color-7 large cta-contact-btn btn_slider\" style=\"transition: none; text-align: inherit; line-height: 15px; border-width: 1px; margin: 0px 5px 0px 0px; padding: 18px 30px; letter-spacing: 1px; font-weight: 400; font-size: 15px;\" href=\"http://marketing.circadence.com/acton/fs/blocks/showLandingPage/a/36273/p/p-0035/t/page/fm/1\" rel=\"noopener\">Sign Up For Our Newsletter</a></p>\n","title":"The Importance of Cybersecurity Awareness and Education (or, how to easily attack your friends and enemies)"}},{"node":{"id":"c2621883-1b1f-500e-9a48-158089257b0c","slug":"socal-cyber-cup-challenge-finals-wrap-6-month-long-cyber-program","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/04/original_photo3.jpg"},"date":"2018-04-04T15:46:15.000Z","content":"<p>This past month, the SoCal Cyber Cup Challenge wrapped up a six-month long program and competition intended to educate and prepare the nation’s next generation of cybersecurity professionals. Organized and backed by Securing Our eCity Foundation, National Defense Industrial Association, National University and Circadence, the Challenge provided high school and middle school students the opportunity to learn and practice cyber skills using a gamified, persistent training platform, Project Ares®.</p>\n<p>More than 500 students from across five counties in Southern California participated in the Challenge that began September 2017. After two Practice Rounds and a highly-competitive Qualification Round, 14 teams of 5-8 student competitors made it into the Finals held on March 24th, 2018, at the Supercomputer Center at UCSD.<br />\nThe competition kicked off with a Digital Forensics challenge, during which Varsity students rushed to investigate an on-site “crime scene” for physical evidence. Varsity competitors presented their physical evidence in exchange for digital evidence, which was then used to unlock and complete forensic tasks built into Project Ares as a Battle Room. Both JV and Varsity completed the digital forensics Battle Rooms and were simultaneously tasked with executing Project Ares’ Mission 12: Operation Bold Hermit. This was a complex incident response mission involving OWASP Top 10 Vulnerabilities affecting a satellite communications system.</p>\n<p>Cyberattacks are some of the biggest threats facing many of the nations in the world today, and the demand for qualified cybersecurity workforce professionals has been made clear. Circadence is proud to lead the way towards real change by re-imagining cybersecurity education and delivering hands-on, gamified, technical opportunities to students at all levels of proficiency.</p>\n<p>The students who participated developed a love for the profession, with many of the winners stating their intent to continue their studies into college and the workplace. It is part of Circadence’s mission to successfully educate, train, and augment the cyber warriors of the future, and sponsoring hackathons and challenges such as the SoCal Cyber Cup Challenge is an important part of that mission.</p>\n<p>Congratulations to The Cambridge School and Del Norte High School for winning 1st place in their respective divisions, Junior Varsity and Varsity. Both schools took home $6,000 Grants to further cybersecurity programming on campus. We look forward to their continued success stories. Click here to see the winners interviewed by local news station, KUSI.</p>\n","title":"SoCal Cyber Cup Challenge Finals Wrap Up 6-Month Long Cyber Program"}},{"node":{"id":"2fa20d09-4edf-51df-ac31-e7976136f5c2","slug":"youre-infosec-n00b","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-06-19-at-2.20.25-PM.png"},"date":"2018-03-19T22:09:32.000Z","content":"<p>You may be an InfoSec n00b but not all is lost. You are far from alone. Now more than ever, security is everyone’s problem but it’s difficult. So much is taken out of our control in the name of making our life easier that in the end, it can be harder to protect ourselves and, by extension, the companies we may be working for.</p>\n<p>As a starting point, let’s talk about something that everyone is probably familiar with. You likely have either received them or at least you have one or two sitting in your Junk folder that your mail provider kindly put there for you because they recognized what it was. They don’t always catch them, though, so how would you identify a phishing attempt from a legitimate e-mail message? This ends up hitting on two important tenets of information security – confidentiality and integrity. By way of illustrating the point, we will use an e-mail message I recently received that had been identified as Junk for me. You can see the message below.</p>\n<p><img class=\"alignleft wp-image-2283 size-large\" src=\"https://www.circadence.com/wp-content/uploads/2018/03/PhishingScam-1024x640.png\" alt=\"\" width=\"1024\" height=\"640\" /></p>\n<p>Of course, the line that says this message appears to be junk mail is a dead giveaway but let’s pretend that doesn’t exist. What makes this a phishing message and why is it a security problem? First, if you look at the line that has the sender’s information, you can see that where a name would normally be, there is an e-mail address saying <a href=\"mailto:service@paypal.com\">service@paypal.com</a>. Except that where the e-mail address is, there is a different e-mail address entirely. The fact that the real e-mail address has nothing to do with PayPal is a giant red flag that should say, &#8220;stay as far away from this message as you can.&#8221; This is a failure of integrity. The message didn’t come from who it purports to come from.</p>\n<p>However, your e-mail client may only present the name of the sender, so it would look like it was from <a href=\"mailto:service@paypal.com\">service@paypal.com</a>. This is a common problem with modern e-mail clients. They hide what can be important information in order to not distract you. You can see this in the To: line where it’s just my name. I have several e-mail addresses that all go into the same mailbox, so knowing what e-mail address it was actually sent to may be helpful to me in determining whether this is something I should be taking seriously. If you can, make sure to look closely at the From: and To: field.</p>\n<p>Another indicator to me for this particular message is I haven’t had any dealings with PayPal in a long time. I certainly haven’t done anything out of the country. If you see addresses out of the country, that may be a warning to stay clear of the message as well. You will notice, though, as you look closely at the e-mail message, that it looks completely legitimate. It has PayPal’s logo, after all. This is another failure of integrity because it’s easy to copy the look of PayPal e-mails and also copy their logo. Creating a message that says it’s from PayPal when it, in fact, isn’t, means the message lacks integrity. It’s not what it claims to be.</p>\n<p>Finally, and here is where we get away from integrity a little, is the Cancel link in the message. I hovered my mouse over the link to reveal the URL the link will take me to. You will notice this is also not PayPal.  If PayPal was going to send you a link to cancel a transaction, you can be sure that the URL would be to a PayPal site that was at paypal.com and not at mysp.ac. When you go to that site, you can be pretty sure they will ask information of you like, perhaps, your PayPal user ID and maybe your password. This would be a breach of confidentiality because you are exposing information to someone who shouldn’t have it.</p>\n<p>The mysp.ac URL highlights an interesting point, though. Phishing attacks and other, similar, attacks are collectively called social engineering. You are using social cues to get someone to do something they shouldn’t be doing – especially revealing information that shouldn’t be exposed. There will be a lot of tricks done to fool you. This URL is another one. You will notice that it bears a little resemblance to myspace (myspace.com). This is likely not a coincidence. You will regularly find URLs and e-mail addresses that include portions of a legitimate domain name. As an example, I was asked to look at something recently where the URL was something along the lines of Microsoft.com.f4587.bogushosting.com. It included Microsoft.com in hopes that people will see that and be fooled into thinking that it is actually Microsoft.com.</p>\n<p>Take a look through your own e-mail folder and your junk folder. See if you can find instances of phishing attacks. Compare the important pieces of a legitimate message (sender, receiver, any links, etc.) to one that is not legitimate. See if you can spot the differences on your own. Being more aware of phishing scams is everyone&#8217;s responsibility.</p>\n<p>&nbsp;</p>\n<p><a class=\"button color-7 large cta-contact-btn btn_slider\" style=\"transition: none; text-align: inherit; line-height: 15px; border-width: 1px; margin: 0px 5px 0px 0px; padding: 18px 30px; letter-spacing: 1px; font-weight: 400; font-size: 15px;\" href=\"http://marketing.circadence.com/acton/fs/blocks/showLandingPage/a/36273/p/p-0035/t/page/fm/1\" rel=\"noopener\">Sign Up For Our Newsletter</a></p>\n","title":"So, You’re An InfoSec N00b"}},{"node":{"id":"391d6d06-9653-5518-be96-91310271882a","slug":"circadence-teams-md5-support-t9hacks-event-cu-boulder","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/02/IMG_0018.jpg"},"date":"2018-02-08T21:35:20.000Z","content":"<h2><a href=\"http://t9hacks.org/\" target=\"_blank\" rel=\"noopener\">T9Hacks</a></h2>\n<h2>Feb 10<sup>th</sup>-11<sup>th</sup></h2>\n<p><a href=\"https://mlh.io/\" target=\"_blank\" rel=\"noopener\">Major League Hacking</a> opens its 2018 Season at the University of Colorado Boulder with T9Hacks, February 10-11, 2018.</p>\n<p>Welcome to 24 hours of research, learning, designing, building and solving. With no experience required, <a href=\"http://t9hacks.org/\" target=\"_blank\" rel=\"noopener\">T9Hacks is an event</a> planned by college students, for college students, and focuses on creating a unique and engaging venue for women, non-binary, and other gender minority students. With three tracks to explore, participants will attend workshops and compete in challenges around creative technology, humanitarian technology, or cybersecurity.</p>\n<p>The cybersecurity track, presented by <a href=\"https://community.md5.net/md5/homepage\" target=\"_blank\" rel=\"noopener\">MD5</a>, is open to students at all levels of cyber proficiency. Via Circadence’s Project Ares®, attendees will work individually or in teams to learn the basics, hone their skills, explore cybersecurity job roles, and execute simulated mission scenarios.</p>\n<ul>\n<li><strong>Part 1: Warm-up.</strong> Dive head first into Project Ares. This portion of the event will feature minigames and battle rooms, and is structured to introduce core concepts, present hands-on tasks, and expose students to the real-world tools and virtualized networks that cybersecurity professionals engage with for day-to-day operations.</li>\n</ul>\n[<em>Saturday, February 10<sup>th</sup> from 12:00p-8:00p</em>]\n<ul>\n<li><strong>Part 2: Dig in.</strong> With the basics covered, the challenge heats up. Phase two of the cybersecurity track looks to continue developing students’ ideas and proficiency through further work role-based activities and an emphasis on end-to-end problem solving. Virtual environments will replicate real-life cyber scenarios and threats, allowing students to interact with processes and tools as they execute mission objectives.</li>\n</ul>\n[<em>Saturday, February 10<sup>th</sup> 8:00p to Sunday, February 11<sup>th</sup> 12:00p</em>]\n<p>“Our goal is to create fun and creative environments where marginalized students – particularly women and non-binary students – can learn and solve compelling problems,” said B.A. Kos, T9Hacks Event Director.</p>\n<p><strong>Circadence’s Project Ares</strong></p>\n<p>Project Ares, the only gamified, artificial intelligence (AI) powered cyber training solution, changes the paradigm for cybersecurity education by engaging learners interested in or pursuing a STEM-focused path by utilizing real-world tools and tactics in immersive, virtual environments.</p>\n<p>Project Ares’ virtual gaming environment adapts to the experiential learning style of next generation students, and supports customized, task-oriented training, skill-specific games, and mission scenarios for both individual and team-based exercises. This approach encourages the repetition necessary to develop lasting skill and knowledge retention, while keeping students excited and engaged.</p>\n<p>&nbsp;</p>\n<p><em>Image Courtesy of T9Hacks.org</em></p>\n","title":"Circadence Teams up with MD5 to Support T9Hacks Event at CU Boulder"}},{"node":{"id":"130c3f4a-068f-5d03-aaef-1c5951dec69a","slug":"understanding-malware-analysis","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-06-19-at-2.22.53-PM.png"},"date":"2018-01-18T13:00:15.000Z","content":"<p>The malware industry has come a long way and currently, it&#8217;s a very lucrative business. This is one of many reasons that makes studying malware so fascinating. It&#8217;s an interesting mix of technology, psychology, and commerce. Psychology is what makes malware effective, and commerce is what ensures more hackers continue to develop new and interesting malware.<span data-ccp-props=\"{}\"> </span></p>\n<p>Information security has long been considered an arms race. According to <a href=\"https://www.gdatasoftware.com/blog/2017/04/29666-malware-trends-2017\">G DATA Software</a>, a new malware specimen emerges every 4.2 seconds. The good guys develop responses to things the bad guys do, causing the bad guys to develop new &#8216;weapons&#8217; that get around the defenses the good guys put into place. Perhaps nowhere is this more evident than in malware. In 1987, the first antivirus software was released for the Atari ST. Coincidentally, also in 1987, Fred Cohen of IBM said, &#8220;There is no algorithm that can perfectly detect all possible computer viruses.&#8221; In spite of having detection and removal capabilities for 30 years, we are more plagued with virulent and destructive software than ever before. <span data-ccp-props=\"{}\"> </span></p>\n<p>All this is to say that a need exists to better understand malware by performing malware analysis. This work is primarily relegated to the antivirus vendors. However, the details of how the malware behaves are often hidden, primarily because exposing the details in the code can provide others hints on how they could start and improve that code for future malware. This is, of course, happening already in the malware development community. <span data-ccp-props=\"{}\"> </span></p>\n<p>To understand how to assess malware, you need to look at a few important elements. First, you inspect the infection vector – which is understanding how the malware infected your system in the first place. While there are many pathways, including compromising a system, the popular ones today are often based in social engineering, which relies on psychology and manipulation of the user. For example, using e-mail to either deliver the malware directly or to get a user to visit a website that includes the malware used to infect your system. This type of attack is called a drive-by attack. The idea is that you are “driving by” the website and get attacked in the process.<span data-ccp-props=\"{}\"> </span></p>\n<p>Another, related, attack is the watering hole attack. In a watering hole attack, the malware is still hosted on a web server the user is expected to visit. The difference is that with a watering hole attack, the attack is more targeted. The attacker infects a website that the targets are known to use in order to infect the targets. The attacker may be aware of the demographics of a site like ESPN, for example, and infect that site to infect people who are regular visitors there. <span data-ccp-props=\"{}\"> </span></p>\n<p>Knowing the infection vector and tracking the malware back to the point in time when it entered your system is important. The reason for that is in some cases, the initial infection may be small, but the malware may download a lot of other software, including other malicious software. A small infection program that installs more software is often called a dropper. Identifying the time when the malware entered a system can provide a reference point to look for other software that was installed about that time. This way, you aren&#8217;t just finding the initial attack and leaving all the other landmines behind.<span data-ccp-props=\"{}\"> </span></p>\n<p>Understanding how malware works and gets onto your system is an important and complex task. It requires understanding operating system internals as well as a reasonably deep understanding of how programs are constructed. Considering what can be at stake with your system and the files that are stored on it, people who perform malware analysis with the goal of finding ways to prevent or remove the malware are performing a critical function in our interconnected world.<span data-ccp-props=\"{}\"> </span></p>\n<p><a href=\"https://www.cyberstudents.org/malware-analysis-bad-software/\" target=\"_blank\" rel=\"noopener\">Join Ric Messier for a LIVE webinar Saturday, January 20th at 12 pm ET.</a></p>\n","title":"Understanding Malware Analysis"}},{"node":{"id":"f0b92fbb-5425-5d90-ae29-067ffa1f1c6c","slug":"four-reasons-security-team-training-cyber-range","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2017/12/CyRaaS_01_wallpaper_1920x1080.jpg"},"date":"2017-12-14T17:51:44.000Z","content":"<p>It seems that every other week another mega-breach is making headlines. Cyber teams barely have time to bolster their cyber defenses before a new attack vector is revealed. It is nearly impossible for teams to train in such a rapidly evolving threat landscape through traditional lecture-based methods. Today’s threats demand an immediate shift in approach.</p>\n<p>The next generation of cybersecurity training involves active learning through realistic, immersive training missions performed in high-fidelity cyber ranges. These virtual environments, which replicate actual enterprise environments, allow cyber warriors to practice with real-world tools defending against simulated threats.</p>\n<p>Here are four reasons why you should consider modernizing your cybersecurity training program by implementing a cyber range-based approach:</p>\n<p><strong>1) Authenticity</strong> – The most critical aspect of any cybersecurity training program is that it provides an authentic experience to the trainee. The cyber threat landscape changes rapidly so your training must be agile and responsive. Face-to-face simulation exercises attempt to replicate this experience and certainly go beyond what is offered in a classroom. However, they must be updated frequently to be truly impactful, which isn’t realistic.</p>\n<p>Additionally, these table-top drills address an incident in theory. Cyber ranges allow a team to practice identifying and mitigating threats in a replicated environment using real-world tools. True-to-life representations of network, host traffic, and user activity more effectively challenge professionals to consistently hone their skills. This authentic experience ensures a cyber team is ready to act quickly and effectively when the time comes.</p>\n<p><strong>2) Repetition</strong> – Studies show that information loss following lecture-based learning is rapid—as much as 90 percent within the first week, according to Learning Solutions Magazine. However, when applying the principles of active learning through doing and repetition, long-term information retention increases to 75 percent (National Training Laboratories Institute). This means security professionals who are actively training in cyber ranges are more likely to retain—and be able to act upon—the skills they acquire. Therefore, they are better prepared for attacks and able to respond more quickly to mitigate threats, ultimately saving their organizations money in the long run.</p>\n<p><strong>3) Scale</strong> – Even a top-notch course is limited in value if it cannot scale to train all personnel. Week-long trainings out of the office offer point-in-time content and take critical resources away that can leave your organization vulnerable. A cyber range enables security leaders to train teams of any size—from individual skill-building exercises to full-scale missions involving both red and blue teams. Additionally, instruction can happen on demand—weekly or even daily—without taking cyber defenders away from the front lines.</p>\n<p><strong>4) Gamification</strong> – Much has been said in the last five to ten years about gamification and its role in motivating teams. Cybersecurity professionals, perhaps more so than any other type of team, crave the agility, technical prowess and competition that comes with their roles. If they are not engaged in the cyber fight, they want to train in a way that is meaningful and have a record of progress and growth. Cyber ranges give teams a platform to engage as teams in gamified training. Red teams and blue teams can train head-to-head in real-world scenarios. Also, range-based platforms like Circadence® Project Ares® provide security leaders and team members with full visibility into skills progression.</p>\n<p>As the technology landscape grows in complexity, enterprises, more than ever, are relying on people as their first line of defense. This approach demands a shift in our approach to training cyber professionals. It’s no longer enough for cybersecurity professionals to attend yearly or quarterly trainings. Professionals need realistic, immersive and responsive training achieved through cyber ranges.</p>\n<p>Malicious hackers are persistent; our training must be as well. By utilizing cyber ranges, we can begin modernizing our approach. Contact the team at Circadence for more information on range-based cybersecurity training with Project Ares.</p>\n<p><a class=\"button color-7 large cta-contact-btn btn_slider\" style=\"transition: none; text-align: inherit; line-height: 15px; border-width: 1px; margin: 0px 5px 0px 0px; padding: 18px 30px; letter-spacing: 1px; font-weight: 400; font-size: 15px;\" href=\"https://www.circadence.com/contact/?utm_source={source}&amp;utm_medium={medium}&amp;utm_campaign={campaign}&amp;utm_ad_group={ad_group}&amp;utm_keyword={keyword}\" rel=\"noopener\">REQUEST DEMO</a></p>\n","title":"Four Reasons Your Security Team Should Be Training on a Cyber Range"}},{"node":{"id":"7adafe85-deb3-5f12-839d-3ef4f5c1e1e4","slug":"circadence-project-ares-training-next-generation-cyber-experts-socal-cyber-cup-challenge","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2017/10/students2.jpg"},"date":"2017-10-31T13:30:45.000Z","content":"<p>Teaching a new generation to become experienced cyber professionals, trained to deal with the latest cyber threats, is critical to ensure the safety of information. Because there is an ever-present threat of cyber criminals who are intent on hacking into systems and causing chaos worldwide, there will always be a need for skilled cybersecurity professionals. And, we know that active learning is one of the best ways to train them, since the National Training Laboratories Institute reported that <a href=\"https://www.fitnyc.edu/files/pdfs/CET_Pyramid.pdf\" target=\"_blank\" rel=\"noopener\">active learning results in a 75% retention rate, versus 5%</a> using traditional learning methods like lectures.</p>\n<p>Since 2008, middle and high school students from the San Diego area have been competing in a cyber challenge, competing for the San Diego Mayor’s Cyber Cup. The competition expanded last year to include the entire Southern California region &#8212; the <a href=\"http://socalcc.siplay.com/site/\" target=\"_blank\" rel=\"noopener\">SoCal Cyber Cup Challenge</a>, which is backed by Securing Our eCity Foundation, National Defense Industrial Association and National University. This year, Circadence is proud to provide students and mentors the opportunity to use Project Ares, supported by ScaleMatrix. Project Ares is a top-level cybersecurity training, education and assessment platform for cyber students and professionals of all skill levels.</p>\n<p>Project Ares gamifies cyber skill training, allowing students to use the platform to learn and practice, then to compete with their peers. The SoCal Cyber Cup Challenge is divided into three phases – a practice phase, a qualifying round, and then finals where the students participate in head-to-head competitions to complete realistic mission scenarios. The practice round began on October 14<sup>th</sup>, with finals and awards beginning in late March 2018. The schools with the top teams are awarded scholarship funds.</p>\n<p>Within the instructor portal provided through Project Ares, trainers can review progress and performance. The automatic, artificial intelligence (AI) powered umpire grades the student’s performance and eliminates the need for instructors to comb through logs to score homework or tests. Game play is recorded and saved for visibility into students’ activity history. These records serve institutions and teams with data on engagement and skills acquisition, and allow for mission playback for play-by-play instructor/student review. These features enhance learning for the student and allow instructors to focus less on assessments and more on training our next generation of cyber professionals.</p>\n<p>The SoCal Cyber Cup Challenge finals are scored on five essential skills:</p>\n<ul>\n<li>maintenance of critical services</li>\n<li>removing vulnerabilities and hardening systems</li>\n<li>communicating status and resource requirements</li>\n<li>thwarting and removing hacker activities</li>\n<li>decoding, decrypting and file carving forensic challenges</li>\n</ul>\n<p>Allowing students to learn and compete in STEM-related challenges like the SoCal Cyber Cup is an important part of exposing them to the possibilities of a career in cybersecurity or other tech-related professions. Learn more about the <a href=\"http://socalcc.siplay.com/site/\" target=\"_blank\" rel=\"noopener\">SoCal Cyber Cup Challenge</a> at their website, or find out how <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\" target=\"_blank\" rel=\"noopener\">Project Ares is equipping government, enterprise, and academic institutions with the skills necessary to defeat </a>cyber criminals.</p>\n<p>&nbsp;</p>\n<p>*Photos sourced from SoCal Cyber Cup Challenge website.</p>\n<p>&nbsp;</p>\n","title":"Circadence® Project Ares® is Training the Next Generation of Cyber Experts in the SoCal Cyber Cup Challenge"}},{"node":{"id":"f9bcedae-6763-5ce6-87b1-1951ec60748b","slug":"cyber-practitioners-students-accept-2017-cybersecurity-gaming-challenge-uncc","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/customer_education_splash.jpg"},"date":"2017-10-06T18:27:07.000Z","content":"<p>Each year, the University of North Carolina at Charlotte hosts the <a href=\"http://cybersecuritysymposium.uncc.edu/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Symposium</a>, bringing world class speakers together to discuss top security challenges, cutting edge technology and best practices for mitigating risk and defending the enterprise.</p>\n<p>Drawing more than 600 attendees, the conference serves as a platform for important industry dialogue as well as a forum for cybersecurity students to engage with security experts and practitioners. <a href=\"https://www.circadence.com/\" target=\"_blank\" rel=\"noopener\">Circadence</a>® is honored to play a key role in this year’s conference by hosting the 2017 Live Gaming Café: Cyber Hunting from 10-4 p.m. Wednesday, October 11.</p>\n<p>Hosted on Circadence’s AI-powered, next generation cybersecurity training platform, <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\" target=\"_blank\" rel=\"noopener\">Project Ares</a>®, the event will challenge cybersecurity professionals and students through individual and team play covering a broad set of skills from beginner to expert. Participants can choose from red or blue team scenarios, mini game and battle room challenges.</p>\n<p>The team competition will feature a live event leaderboard showing mission status and points earned as participants engage in full-scale cyber missions in the Project Ares immersive, high-fidelity environment using real-world tools, such as Wireshark, Metasploit, Splunk and more.</p>\n<p>The opportunity to engage future cyber leaders is an important part of Circadence Corporation’s ongoing efforts to bridge the cybersecurity skills gap and build a better trained, more highly skilled workforce.</p>\n","title":"Cyber Practitioners &#038; Students Accept the 2017 Cybersecurity Gaming Challenge at UNCC"}},{"node":{"id":"7eabd309-0d5c-573e-ad42-807c82acc0bf","slug":"circadence-awarded-cybersecurity-training-education-security-software-innovation","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/circadence_splash_no_logo.jpg"},"date":"2017-09-22T18:14:54.000Z","content":"<p><a href=\"https://www.circadence.com/\" target=\"_blank\" rel=\"noopener\">Circadence</a>® was recently named the Gold Winner for Training and Education and the Bronze Winner for Security Software Innovation in the <a href=\"http://www.goldenbridgeawards.com/world/\" target=\"_blank\" rel=\"noopener\">2017 Golden Bridge Awards</a>. These annual industry and peer-selected awards encompass the world’s best in organizational performance, product management, and customer satisfaction.</p>\n<p>Winners were honored September 18, 2017 at the Red Carpet Award Ceremony in San Francisco.</p>\n<p>Circadence has always put innovation at the forefront of its business. With more than 20 years’ experience, 34 patents and a history of cutting-edge software development, <a href=\"https://www.circadence.com/about/company-profile/\" target=\"_blank\" rel=\"noopener\">the company</a> solves complex customer problems using robust, industry-leading solutions.</p>\n<p>The ever-evolving threat landscape requires cybersecurity professionals to constantly learn and sharpen their skills, but traditional training methods bring a number of challenges. Not only are they ineffective and unable to keep pace with emerging threats, but many require travel to a training facility or conference, which pulls defenders off the front lines leaving organizations vulnerable.</p>\n<p><a href=\"https://www.circadence.com/project-ares/enterprise-overview/\" target=\"_blank\" rel=\"noopener\">Circadence’s Project Ares</a>® solves these challenges by combining the most advanced gaming technology with authentic tools and threat scenarios to create a modern solution to cybersecurity training and education. Cyber professionals train more effectively and on-demand in realistic, high-fidelity learning environments with gamified training missions powered by artificial intelligence and virtual machine orchestration.</p>\n<p>Today’s threat environment demands a modern, agile training solution. This award-winning combination positions Circadence as a leader in both cybersecurity training and security software innovation.</p>\n","title":"Circadence Awarded for Cybersecurity Training and Education, Security Software Innovation"}},{"node":{"id":"fe36f5b1-83d7-577f-a063-37bf452dccaa","slug":"new-draft-nice-cybersecurity-workforce-framework-expands-skills-team-approach-simplicity-needed","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/infrastructure_government_splash2.jpg"},"date":"2017-08-25T16:57:19.000Z","content":"<p>A new draft of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) (<a href=\"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf\">NIST Special Publication 800-181</a>) was just released and among the many revisions, the framework draft includes most of the tasks and knowledge/skills/activities (KSAs) supporting the 52 work roles previously outlined.</p>\n<p>Work role details are nearly 95 percent defined—a significant improvement from approximately 50 percent completion in the previous version—with much of the new content focused on categories that would be considered offensive in nature (penetration testing, for example). Notably, the tasks and KSAs supporting Cyber Protection Team work roles still require additional details. I expect future versions will address this critical area.</p>\n<p>The NCWF is a positive step toward defining the tasks and skills needed across cybersecurity in general. It provides traceability to many other standards and brings all of those references together in the framework. However, it stops short, by design, and only defines <em>what</em> needs to be done, not <em>how</em> or by <em>whom</em>. Unfortunately, the omission causes many organizations to struggle in applying the NCWF to real-world situations.</p>\n<p><strong>A Team Approach Is Needed</strong></p>\n<p>The ultimate challenge in workforce development is not in the adequacy of <em>individual</em> work roles, but rather in the completeness of the set of work roles as applied to a given scenario that the organization or business expects to face. Only by considering a full set of work roles in a scenario can the gaps in a cyber defense strategy be seen.</p>\n<p>The <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">Circadence® Project Ares® platform</a> maps cybersecurity training missions and skill building to the tasks and KSAs for all work roles outlined in the NCWF. Within the platform, cybersecurity professionals can work individually or in teams to fulfill both offensive and defensive missions to defeat real-world threats in high-fidelity environments. Missions, security tools and objectives are based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This gives us at Circadence a unique perspective on the practical application of both the NIST and NICE frameworks.</p>\n<p>It seems we continue to define individual work roles without looking at how to practically combine them into teams. The NIST Cybersecurity Framework outlines everything an organization must do (as an integrated team), but most organizations don&#8217;t know how to take all the work roles from NICE/NIST 800-181 and map those to build out a workforce.</p>\n<p><a href=\"https://www.circadence.com/about/company-profile/\">Circadence</a> wants to postulate different team structures (and sizes) for all of our missions in order to capture what is and is not working. We can then share this data so organizations can adapt their concepts around team approaches to both offense and defense.</p>\n<p><strong>Simplicity Is Key to Widespread Adoption</strong></p>\n<p>Another challenge with the NCWF is the complexity of work roles. Although the 52 work roles outlined are aligned with job codes for the Office of Personnel Management (government), this is not the case for corporate America, where the tasks and KSAs for a security analyst can vary greatly among organizations.</p>\n<p>Because of this, we spend a lot of time trying to create a common lexicon so that different people who use different tools can work together and pass information quickly. I&#8217;m advocating for SIMPLICITY built around TEAM requirements to ensure there are no gaps or substantial overlaps (although some overlap of skills makes sense for timeliness in the response). This will allow organizations to make a more practical application of the NIST and NICE frameworks, encouraging a more widespread adoption.</p>\n<p><strong>Next Steps</strong></p>\n<p>Future versions of the NCWF should offer more of a practical application through team concepts and simplified definitions of work roles. Embracing the TEAM APPROACH and SIMPLICITY will encourage more widespread adoption of the framework from enterprise security organizations, bringing more standardization of work roles and the associated skills. This will also help to define cybersecurity career paths for the next generation, which in turn will address the growing workforce shortage.</p>\n","title":"New Draft of NICE Cybersecurity Workforce Framework Expands on Skills, but Team Approach &#038; Simplicity Are Needed"}},{"node":{"id":"ef67e994-a88c-5113-b287-b6e64e4427b7","slug":"test-skills-cyber-mission-cafe-afcea-technet-augusta-booth-802","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-11-13-at-2.24.28-PM.png"},"date":"2017-08-08T17:17:11.000Z","content":"<p>Security practitioners of all skill levels are invited to join Circadence® at Booth #802 during the TechNet Augusta Conference August 8-10. Spend some time in our Cyber Mission Café testing your cyber skills or practicing offensive and defensive tactics in the gamified, AI-powered <a href=\"https://www.circadence.com/project-ares/training-assessments/\">Project Ares®</a> platform.</p>\n<p>The focus of this year’s conference is the integration of cyberspace, electronic warfare, and intelligence and many conference sessions will address cyber warfare strategies, preparation and training. In between these hard-hitting conference sessions, visit the Cyber Mission Café to kick back, test your skills and assess your cyber expertise on the <a href=\"https://www.circadence.com/\">Circadence</a> Project Ares platform.</p>\n<p>Combining artificial intelligence with virtual machine orchestration, Project Ares offers a completely immersive, interactive, real-world environment for training and assessment. In the café, you can spend time honing your skills in the Battle School or get the true, gamified experience by facing off with peers in realistic, mission-specific virtual environments.</p>\n<p>Circadence Project Ares has taken cyber training out of the classroom, and with a full ‘rucksack’ of real-world tools and a large library of mission scenarios it is already a trusted source of continuous cybersecurity training, education and preparedness for many entities in the defense and government sectors.</p>\n<p>As you plan your TechNet Augusta experience this week, make time to visit the Circadence Cyber Mission Café at Booth #802 for a unique, immersive cybersecurity training experience.</p>\n<p>&nbsp;</p>\n","title":"Test Your Skills in the Cyber Mission Café during AFCEA TechNet Augusta, Booth #802"}},{"node":{"id":"9051c4d6-16d8-58b9-8ecd-1f9eb31f491c","slug":"educational-institution-roadmap-women-cybersecurity","status":"publish","template":"","format":"standard","featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2018/11/Screen-Shot-2018-06-19-at-1.24.36-PM.png"},"date":"2017-06-28T16:42:14.000Z","content":"<p>When I was in school, just five percent (5%) of my engineering class were women. Today, according to the <em>2017 Global Information Security Workforce Study: Women in Cybersecurity</em>, just <a href=\"https://iamcybersafe.org/wp-content/uploads/2017/03/WomensReport.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">11 percent</a> of information security jobs are held by women. And if you look at many security technology providers, you often won’t see a single woman on the executive team. (I’m proud to say that <a href=\"https://www.circadence.com/about/executive-team/\">Circadence®</a> is a rare exception to this).</p>\n<p>There’s a dire need for more cybersecurity professionals – and that gap is only growing. According to ISACA, there will be a global shortage of two million cybersecurity professionals by 2019. It’s a huge challenge for the industry, but also an opportunity to bring more people, and especially women, into computer sciences and specifically careers in cybersecurity.</p>\n<p>There are some terrific programs for women in technology. <a href=\"https://girlswhocode.com/\" target=\"_blank\" rel=\"noopener noreferrer\">Girls Who Code</a> is one of the best. It helps volunteers and clubs aimed at closing the gender gap, but more can be done to make it a standard in primary education. Google.org is also instrumental in (almost counter-intuitively) taking digital content offline for people who don’t have internet to help show a computer sciences and cybersecurity path to individuals born in remote and rural areas.</p>\n<p>We need to bolster educational institutions, which lack resources, to deliver computer sciences (and specifically cybersecurity) training. In the U.S., the underlying curriculum for tech and cybersecurity is Computer Science, which is typically relegated to a single AP class in high school. It is viewed as a separate field from the Arts and Sciences, and frequently portrayed in media as appropriate for male nerds. Unless a young lady was exposed to the field earlier through a special program or perhaps from a parent role model, they are not likely to take an “introductory” AP class stigmatized in that manner.</p>\n<p><em>So how do we get there? </em></p>\n<p><strong>Start Early and Often. </strong>The U.S. should take cues from other countries, such as Singapore, Hong Kong and Israel, where elementary school children are taught computer science and robotics as early as kindergarten. We should offer computer science and coding programs starting in kindergarten with safe online resources, and then offer specialization and a variety of experiences built on that base level of knowledge as they progress in age. Progress to logic and coding in Python and then introduce robotics in secondary school. And later in age, introduce competition and more advanced scenarios that mimic real-world challenges.</p>\n<p><strong>Modern, Immersive Mediums. </strong>We also need to look at the medium in which the training is delivered. Right now the security industry as a whole needs to migrate from its reliance on older, static training formats (classroom presentations, etc.). We need to leverage the technology readily available to create interesting and immersive experiences. Hackathons remain popular, but only crack what’s possible when you combine virtual reality, gamification, and team competition together into an ongoing training and learning experience.</p>\n<p>One great example of how these combine is the <a href=\"https://www.uscyberpatriot.org/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberPatriot</a> program supported by Circadence. In the CyberPatriot program, more than 4,400 schools (including 600 middle schools) compete in regions around the United States. Students are put in the position of a “newly hired” IT professional and tasked with managing and defending the network of a small company in an immersive, virtual platform.</p>\n<p>With the daily race to stay ahead of threats, it’s tempting to not think long-term about information security. But with such a large skills shortage ballooning in cybersecurity, our industry needs to start children, and especially women, early on in computer sciences and information security, with modernized curriculums, and coach them to grab the opportunity just ahead.</p>\n","title":"An Educational Institution Roadmap for Women in Cybersecurity"}},{"node":{"id":"d958a38a-2b89-53e8-be30-ad5dd310d7b4","slug":"circadence-project-ares-honored-innovation-cyber-training","status":"publish","template":"","format":"standard","featured_media":null,"date":"2017-06-06T16:41:25.000Z","content":"<p>Network Products Guide, the IT industry’s leading technology research and advisory guide, named <a href=\"https://www.circadence.com/project-ares/training-assessments/\">Circadence® Project Ares®</a> a Gold winner in both the IT Products and Services for Education, as well as the Training, Awareness and Educational Programs categories in the <a href=\"https://www.circadence.com/about/news/npg-awards/\">2017 IT World Awards®</a>. Additionally, Circadence was named a Bronze winner for Innovative IT Company of the Year.</p>\n<p>The Circadence cyber range solution and next generation cybersecurity training platform, Project Ares, enables <a href=\"https://www.circadence.com/project-ares/enterprise-overview/\">commercial</a>, <a href=\"https://www.circadence.com/project-ares/government-overview/\">government</a> and <a href=\"https://www.circadence.com/project-ares/education-overview/\">academic</a> organizations to address the critical lack of experienced cybersecurity professionals in the workforce today.</p>\n<p>Circadence is shifting the cyber training paradigm from static, lecture-based learning to active, artificial intelligence (AI) powered, game-based learning. Within the Project Ares platform, trainees – individually or in teams – hone their skills, practice with real-word tools and solve relevant problems in high-fidelity environments as they prepare to protect their organizations.</p>\n<p>By providing immersive, realistic cyber training anytime &#8211; anywhere, Project Ares provides organizations with a tremendous opportunity to revolutionize the speed, efficacy and relevancy of training in the quickly-evolving cybersecurity landscape.</p>\n","title":"Circadence® Project Ares® Honored for Innovation in Cyber Training"}}]}}}