A large-scale cyber battle was held in Moscow where teams of ethical hackers find vulnerabilities in corporate and industrial IT infrastructures, and cyber defense specialists gain experience in preventing unacceptable events. Experts told about why such cyber-training is needed and how you can benefit from their results.
On November 15-16, information security specialists gathered at the world's largest open cyber battle, The Standoff, organized by Positive Technologies with the participation of Innostage Group.
During the open cyber studies, a team of highly professional security researchers from several companies with the strongest expertise in the field of ethical hacking acted as a sparring partner of Positive Technologies, each of them has experience in finding zero-day vulnerabilities. Almost every Red Team attack ends in success.
For specialists, this is primarily an opportunity to gain new knowledge and practical skills in detecting and countering cyber attacks, to study scenarios for responding to known and unknown risks, and to explore the relationship between cybersecurity and business.
In addition, the event hosted The Standoff Young Hats track for young information security specialists who presented their reports on a research topic.
The emergence of cyber polygon was dictated by the fact that the industry has a request for measurable and effective security. Having an infrastructure close to the real one, users of The Standoff 365 platform, for example, can independently simulate real situations but virtually.
Positive Technologies plans to hold the next open cyber studies in the first quarter of 2022 and, just as now, give the whole world the opportunity to observe their progress on the Internet.
In addition, in early December, Jet Infosystem experts conducted two-day cyber training for Rosbank Security Operation Center (SOC) specialists. In the simulated infrastructure, Rosbank's information security specialists investigated a major attack, during which the intellectual property of the company was stolen, and also stopped the infection by the cryptocurrency miner of the workstations of a large engineering center.