In his keynote address at the NICE Conference & Expo 2024, Cyberbit CEO, Caleb Barlow, delves into the dynamic shifts within the cybersecurity skills gap, exploring the pivotal transition in the skills recruiters prioritize today and what can be done to close the gap.
Ensure your cybersecurity team is prepared by upskilling them with the world’s leading cyber skills development platform.
A Case Study in Ramping Up a Large-Scale Incident Response Team
To address the growing global demand for skilled cybersecurity talent, Deloitte partnered with Cyberbit, the world leading SOC readiness and skills development platform. The partnership empowered Deloitte’s EMEA Cybersphere Center (ECC) to advance their clients’ cyber skills. Cyberbit’s advanced platform covers the entire cyber skilling spectrum from cyber skills development and experiential learning to team and individual performance assessment in real-world scenarios.
As a result of the partnership, the Cyberbit platform was added to the Deloitte ECC’s portfolio of cyber risk solutions, maximizing the impact of the ECC across Deloitte’s EMEA Cyber Intelligence Centers.
Download to view the full case study>>
This paper explains that one of the biggest obstacles to achieving effective cyber resilience at an organization is its inability to upskill its cyber talent and make its SOC team frontline prepared for cyber-attacks. The paper further explains how Cyberbit provides finance industry CISOs with the resources needed to upskill their SOC team through career development and learning.
Learn how the SOC manager’s ability to achieve rapid and quality incident response is often stymied because of the team’s lack of preparedness. The paper also explains how the Cyberbit platform facilitates better talent assessment, faster onboarding, and critical upskilling, helping SOC teams to overcome their gap in cyber skills and readiness.
The research reveals dramatic improvements in key SOC metrics, and cost savings across multiple budget items.
Leading research firm TAG Cyber, led by Dr. Ed Amoroso, former CSO, AT&T, has analyzed the cost savings, and the impact on security KPIs, as a result of using next-generation training approaches for SOC teams. The study was created based on the Cyberbit skills development platform.
Attacks like SolarWinds have revealed a hole in our defenses. With software updates on user machines, servers, and other portions of the network becoming a regular occurrence, a compromised update is a new and dangerous entry mechanism into your network.
It is imperative that SOC and Incident Response teams must begin to suspect software from external vendors as a point of entry when investigating security incidents on top of implementing zero-trust policies across the board.
In this webinar, you will have the opportunity to see a live investigation and mitigation of a live-fire supply chain attack, simulated on the cyber range included within Cyberbit.
Turla, aka Uroboros, is one of the most sophisticated ongoing cyber-espionage campaigns. Its targets include governments, militaries, education institutions, and pharmaceutical companies. Kaspersky has recently linked Turla to the SolarWinds attack, uncovering code similarities between Sunburst and the Azuar backdoor.
Researchers have reported that these exploits have been consistently used together with known Turla Tools over the past three years, making the Turla malware an increasingly dangerous threat to enterprise, research, and government organizations.
On this webinar, we will demonstrate a live Turla investigation using an EDR platform, in a simulated, virtual lab environment.
Security leaders manage, or are in the process of building, a threat hunting capability, know the process of hiring, onboarding, and training threat hunters is not trivial. Threat hunters require a unique skillset and an “out of the box” mindset, as they will typically not be working according to a predefined playbook. Can threat hunting be an additional “muscle” built for our existing team members? Can we reskill our existing teams or do we need to look elsewhere? How do we onboard and train threat hunters to be effective?
In the 2nd video in our MITRE series, we dive into TA003 Persistence from the defenders point of view. Attackers oftentimes establish persistence to either automate the tasks they want a machine to perform for them or to remain on the network and evade mitigation efforts from the Blue team.
Resource Type
You are going to download