Expert Researcher JSC Advanced Monitoring
Sergey Ovchinnikov has more six years of experience in information security. He has researches in the field of IPv6 networking technologies as well as the security deploying and debugging of Cisco ASA firewalls. He is the author of the AMPIRE software package and certified specialist (OSCP, OSWE, CRTE). Also, he is speaker of international conferences such as PHDays, OFFZone, RusCrypto.
Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness & Training Polygon
Cybercrime in our time is a threat not only to business and medicine fields but also to the national security. Attacks focused on a particular area are becoming more complex, and their behavioral is less predictable. Thus, the Red, Blue, SOC, and Purple teams are faced with the actual task of training encountering, detecting and eliminating the effects of computer attacks, as well as coordinated work in responding to information security incidents.
Nowadays, there are many similar solutions aimed at one goal: raising awareness of employees, business games, and CTF games. But in all of them have a significant drawback with the depth of attacks that are based only on common and most straightforward vulnerabilities. This leads to a situation when incident response teams do not understand the attack vectors that usually change and affect all elements of the protected infrastructure.
The speakers will talk about their approach to train Red/Blue/Purple/SOC teams and their solution that allows them to interactively train and learn to detect, prevent and eliminate the consequences of computer attacks and respond to incidents eventually. The solution helps to deploy cyber awareness templates to represent various organizations (bank, ICS, corporate sub-networks). The speakers will conduct a cyber-attack where two teams (SOC team and Blue team) will be trained to detect attacks on various segments of typical network infrastructure including attacks on a domain controller from an external network segment, social engineering, an internal violator and an attack on an automated process control system. The SOC team using various response tools that are necessary to determine the components of the attack on which the strikes are conducted to describe the incident and transfer to the response team. The Blue Team will have to detect the vulnerabilities in the components and fix them in the allotted time.
This talk is co-presented with Ilya Kostyulin, Expert Researcher at JSC Advanced Monitoring
Are you the next cyber security superstar?
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
Sponsors & Partners
They help us make this conference possible.
As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.