{"id":57073,"date":"2018-01-15T05:00:08","date_gmt":"2018-01-15T13:00:08","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=57073"},"modified":"2019-01-29T12:55:24","modified_gmt":"2019-01-29T20:55:24","slug":"cyber-range-fueling-next-generation-cyber-defenders","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2018\/01\/cyber-range-fueling-next-generation-cyber-defenders\/","title":{"rendered":"Cyber Range: Fueling the Next Generation of Cyber Defenders"},"content":{"rendered":"<p>According to a <a href=\"https:\/\/hbr.org\/2017\/05\/the-best-cybersecurity-investment-you-can-make-is-better-training\" rel=\"nofollow,noopener\" >recent article in the Harvard Business Review<\/a>, the best cybersecurity investment business leaders can make is better training: \u201cAs the scale and complexity of the cyber threat landscape is revealed, so too is the general lack of cybersecurity readiness in organizations, even those that spend hundreds of millions of dollars on state-of-the-art technology.\u201d<\/p>\n<p>The challenge is how to focus the training on the right approach, and on the right people. Cybersecurity proficiency today is rife with complexity. Just think about the many places corporate data resides, from smartphones and laptops to AWS, Azure or other cloud instances, and partner networks. Traditionally air-gapped ICS\/SCADA networks \u2013 the very networks that run our power, lighting, production networks and more \u2013 are also now more accessible by the business than ever.<\/p>\n<p>Many different people now share the responsibility of securing data and supporting operations. And as our networks continuously expand and evolve, so do the functions that must be trained to secure them. But without the time, propensity or funds to send every conceivable employee with security responsibility in the company through formal schooling, how can these professionals acquire the knowledge, tools and techniques they\u2019ll need to take on this responsibility? What type of training is best to cover the diversity of skills and positions \u2013 all within the context needed for their specific jobs?<\/p>\n<p>Finding the appropriate level of training to develop the next generation of passionate, agile and sophisticated professionals, wherever they sit in the company, isn\u2019t easy \u2013 yet it\u2019s <strong><em>critical<\/em><\/strong> to address today\u2019s security challenges.<\/p>\n<hr \/>\n<hr \/>\n<p style=\"text-align: center;\"><strong><span style=\"font-size: 18pt;\">Cyber Range is a demonstrable way to experience how analytics-based automation changes the cybersecurity paradigm in a meaningful way.<\/span><\/strong><\/p>\n<hr \/>\n<p>The <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/cyberrange-overview\">Palo Alto Networks Cyber Range<\/a> arms a diversity of practitioners with a curriculum to protect the availability, integrity and confidentiality of their data and networks. Cyber Range transforms passionate, talented folks into a community of highly capable, \u201cbadass\u201d cyber defenders with one goal in mind: to protect our way of life in the digital age by preventing successful cyberattacks. Today, we are announcing the first of many Palo Alto Networks Cyber Range centers, located at our campus in Amsterdam.<\/p>\n<p><strong><br \/>\n<\/strong><span style=\"font-size: 18pt;\">Cyber Range \u2013 The First Step Toward Protecting Our Digital Way of Life<\/span><\/p>\n<p>The best way for human beings to retain knowledge is to apply it beyond the classroom. Not all companies and government agencies can take on the challenges of building and maintaining their own Cyber Range to keep the attacks and curriculum fresh, but they can come to a Palo Alto Networks campus to participate in a Cyber Range training experience there. Our standard curriculum only requires one day out of the office \u2013 and it\u2019s free.<\/p>\n<blockquote><p><em><br \/>\n\u201cIt\u2019s one thing to sit in a classroom and hypothesize, developing hypothetical plans to implement a defensive course of action should your security teams come up against a given threat. It\u2019s quite another to become submerged in a hands-on training experience. Cyber Range arms security operations teams with real-world defense techniques that can be applied immediately to prevent threats and preserve the integrity of your business.\u201d<\/em><\/p>\n<p>\u2013 Rinki Sethi. senior director, Information Security, Palo Alto Networks<\/p><\/blockquote>\n<p>Our Cyber Range is a place for people to get firsthand experience with today\u2019s threats in a semi-competitive, secured environment. It naturally breeds a culture of acceptance and collaboration, and allows professionals from diverse backgrounds and experiences to gain confidence in terms of the value that they can bring to cyber defense.<\/p>\n<p><strong><br \/>\n<\/strong><span style=\"font-size: 18pt;\">Next-Level Problem Solving to Maximize Investments<\/span><\/p>\n<p>Cyber readiness \u2013 through best practices and innovative technology that solves real problems, together with open lines of communication across technical and business teams \u2013 is key to effective prevention, detection and response. If you recall the quote from the Harvard Business Review, even those who spend hundreds of millions of dollars on state-of-the-art technology aren\u2019t necessarily equipped to defend their business from the ever-growing community of cyber adversaries.<\/p>\n<blockquote><p><em>\u201cCyber Range provides the powerful opportunity for your security teams to witness and defend against real-world attacks coming through, and it doesn\u2019t stop at the technology aspect. Participation provides the strategic and necessary ability to collaborate and communicate cross-functionally with a diverse group of peers. It is with this holistic understanding and approach that security teams can gather the full scope and context around an attack and confidently make decisions to prevent threats from impacting your organization.\u201d<br \/>\n<\/em><\/p>\n<p>\u2013 Lucas Moody, CISO, Palo Alto Networks<\/p><\/blockquote>\n<p>Cookie-cutter simulations and tabletop exercises do not deliver the value necessary for effective cyber readiness. There\u2019s no substitute for real-world experience. Consider this a strategic investment in your business, and consider sending your teams \u2013 networking, infrastructure, DevOps, OT and security operations, especially \u2013 \u00a0to a Cyber Range.<\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/cyberrange-book\">Register now for one of our free Cyber Ranges.<\/a><\/strong><\/p>\n<p><em><a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/cyberrange-overview\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:52.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-57076 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/01\/Cyberrange_1.png\" alt=\"Cyberrange_1\" width=\"500\" height=\"262\" \/><\/span><\/div><\/a>\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, we are announcing the first of many Palo Alto Networks Cyber Range centers, located at our campus in Amsterdam. Learn more<\/p>\n","protected":false},"author":47,"featured_media":57076,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[536],"coauthors":[717,2745],"class_list":["post-57073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-cyber-range"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/01\/Cyberrange_1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/57073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=57073"}],"version-history":[{"count":14,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/57073\/revisions"}],"predecessor-version":[{"id":57154,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/57073\/revisions\/57154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/57076"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=57073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=57073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=57073"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=57073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}