Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

CSI SX

CSI SX: The event that has become synonymous with security solutions for your business. At CSI SX, innocent servers may wind up dead.

First, we invent a company with a global sales team. Then we build that sales team a real network, a private cloud, deployed via the million-dollar Norwich University Cyberweapons Range. The man behind the groundbreaking Norwich University facility, long-time CSI instructor Dr. Peter Stephenson, gives us the walkthrough on the SX main stage. Then, the fun begins:

  • There's a screen onstage with a real-time network map.
  • There's another screen displaying the SIEM console for this network.
  • Yet another screen connects us to Stephenson's Cybercadet Red Team.

The Cybercadet Red Team are students in a full-time program dedicated to the attack and defense of military networks. Where our sales team's network is concerned, they're up to bad things. Nodes on the network map are turning red—not because we've got PowerPoint slides with red dots, but because real servers are being attacked and taken down.

This scenario—a fully implemented virtual network that will host multiple live attack scenarios—allows us to delve into a real-world, no-mistakes-unpunished trek through the cutting edge of virtual infrastructure, cloud computing, and agile application development. You are part of the blue team. You need to make sure that what's happening to the network onstage can't happen again.

In your breakout sessions you will test your strategies with top expert speakers and the best attendees in the industry. The live attacks that you've seen will meet with live countermeasures. And that's just Day 1! 

Topics covered include:

  • Cloud Computing
  • Globalization
  • Remote Access & Mobile Devices
  • Virtualization
  • Web
Rating
0 vote
Favoured:
0

Listing Details

Vendor
Computer Security Institute
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2010-05-27
Owner
michelemjordan
Created
2010-05-27
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message