Aug 
30th
–
Aug 
31st

Cyber Range London

Add To Waitlist
Text goes here
X
Link Text
Text goes here
X

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

Zone 1

Cloud Monitoring & Compliance

Redlock 

7:30 am to 7:45 am

Registration + Sign In

07:30

am

Registration + Sign In

07:30

am

Registration + Sign In

8:00-9:00

am

Registration + Sign In

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

7:30 am to 7:45 am

Registration + Sign In

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Add To Waitlist
Text goes here
X
About
Agenda
Venue

Cyber Range London 

Oct
 
29th
9:00AM
–
4:00PM
08
/
30
 – 
08
/
31
Add To Waitlist
Text goes here
X

YOUR PEOPLE. REAL ATTACKS. HANDS-ON TRAINING

State-of-the-art simulations for state-of-the-art teams

We are taking Cyber Range on the Road and we are excited that you will be joining us in London! Get ready for a high-tech, FUN way to learn the very latest security strategies and techniques.


At the Cyber Range, you and your teams will:
- Master skills and techniques by identifying and preventing live attacks with best practices tips from our experienced instructors.
- Create and test different security strategies by researching and responding to real-world threats.
- Strengthen your execution by building and testing end-to-end prevention processes during full-on cyber-attack scenarios.
What’s more, you’ll receive a course certificate after completing your Cyber Range session.

 

The Environment:

- An exercise network managed by on-site teams, reproducing a realistic production environment.
- Simulated legitimate production traffic from numerous operating systems, applications and devices.
- Malicious traffic: All Cyber Range attacks use the latest real threats, pulled from the internet and re-generated using Cyber Test Systems Network Traffic Generators in the test environment (see scenarios below).


The Defence:

Each team manages and prevents threats on its own network using its own Next-Generation Security Platform deployment. For example, in this exercise, teams use Palo Alto Networks® next-generation technology to identify all applications on the network, apply URL Filtering, create content-based white-listing policies, and identify and generate real-time prevention against malicious software, exploits, and new threats across IP addresses and URLs.

 
Pre-requisite for the Cyber Range attendees:

In order to get the most out of your Cyber Range training, you should either be familiar with firewall policy creation or, prior to attending, take a Virtual Ultimate Test Drive (next-generation firewall) for a guided, hands-on experience doing so. 


Technical Requirements:

You will need to bring your own WiFi-Enabled Laptop with a pre-loaded Browser: Chrome or Firefox. Please, before the session, ensure you can disable VPN connections.


Add To Waitlist
Text goes here
X

A Smarter Way to Train

Cyber Range challenges participants to maintain the availability, scalability, security, and stability of the network and application infrastructure most often targeted and affected by cyberattacks. Cyber Range instructors simulate network functions and traffic to create a realistic network experience. A typical Cyber Range session consists of five teams:

- Green Team: Creates “legitimate” user and server application traffic.
- Red Team: Acts as malicious users and malicious or compromised servers.
- Yellow Team: Simulates innocent users clicking on phishing links or unknowingly installing malicious applications and compromising the network’s security.
- White Team: Launches cyberattack scenarios, creates traffic and monitors the success or failure of the Blue Team in terms of incident handling and scenario response.
- Blue Team: Represents the network operations center, security operations center and Cyber Incident Response Team.

Class schedule

09:00 - 09:30

 

Registration & Tea/Coffee/Pastries

09:30 - 10:00

 

Introduction to the Range

10:00 - 11:30

 

Session 1 - Defending the Enterprise

11:30 - 11:45

 

Coffee Break 

11:45 - 13:15


Session 2 - Managing the Enterprise

13:15 - 14:00

Lunch

14:00 - 15:30


Session 3 - Protecting the Future

15:30 - 16:00


Cyber Range Feedback & Conclusion

Afternoon Breakout Sessions

Breakout 1

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

3:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

4:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

Breakout 2 

2:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

3:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

4:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

Breakout 3

2:00 pm

The Cloud Security

Sergej, Chief Security Officer, Central Europe

3:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

4:00 pm

Security The Cloud

Sergej, Chief Security Officer, Central Europe

Agenda

Coming Soon

Speakers

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

Sponsors

Signature Sponsor

Gold Sponsor

Agenda

7:30 am to 7:45 am

Registration & Welcome Refreshments

7:45 am to 9:00 am

Welcome & Intro

Dave Allen, Regional Vice President, Western Europe

9:00 am to 10:00 am

A more secure Everywhere

Varun Badhwar, SVP Products & Engineering, Public Cloud Security

10:00 am to 11:00 am

Is Your Security As Agile As Your Business

Greg Day, CSO EMEA

11:00 am to 12:00 pm

Cloud Panel discussion

Joe Fogarty, Head of the Cyber Resilience Centre, Department for Work and Pensions

Alan Duckworth, Security Manager at Betway Group

12:00 pm to 1:30 pm

Networking Lunch - Cloud Expo Area

7:30 am to 7:45 am

Registration + Sign In

7:30 am to 7:45 am

Registration + Sign In

Multi-Day Agenda

Monday

08:00

am

Registration & Welcome Receptions

09:00

am

Welcome & Intro, Dave Allen, Regional Vice President, Western Europe

09:20

am

A more secure Everywhere - Varun Badhwar, SVP Products & Engineering, Public Cloud Security 

 

10:20

am

Is Your Security As Agile As Your Business, Greg Day, CSO EMEA

12:20

am