[ad_1]
<div _ngcontent-c16 = "" innerhtml = "
Shutterstock
Many of you already know that I am a movie buff. During a conversation with Allison Ritter, engineer of Gamification of Threats and Creative Director of the X-Force Command Center at IBM Security, I had a look back at the clbadic Wargames of the 80s. Hearing Ritter Talks about Cyber Range and Cyber Simulations Attacks with Fortune 500 Leaders Reminded Matthew Broderick and Ally Sheedy Avoiding a Real Nuclear War Even though Ritter and his simulations are not at risk of disaster in the real world, they help businesses better prevent cyberattacks and the crises in real life – and to understand how to react when they fire.From Target to Yahoo !, data breaches seem to occur with increasing regularity and with the average cost of do mega violation – 1 million or more lost or compromised records – reaching between 40 and 350 llion (according to the latest study on the cost of a data breach of IBM Security and Ponemon Institute), the stakes are huge and companies are realizing that they need to prepare themselves comprehensively. Failure to respond quickly and accurately to a breach can escalate costs and increase problems. The report found that companies capable of containing a violation within 30 days can save up to $ 1 million.
Unfortunately, villains are becoming more sophisticated than ever and many are working in groups. According to Ritter, nearly 80% of cyberattacks are conducted by highly organized criminal groups and are becoming increasingly sophisticated. And it's not just big business, where these attacks take place. Businesses of all sizes can be hacked or their systems held for ransom. Due to the growth of these crimes, more cyber-fighters are needed. That's where Ritter and the IBM X-Force Command Center come in.
Companies realize that they need to invest more in cybersecurity and train for possible scenarios of attack. As a result, a report of Frost & Sullivan predicts nearly 2 million jobs in this sector by 2020. These cyber security jobs do not only concern hackers or programmers, but cybersecurity awareness trainers, technical writers and more.
Ritter began her tech career at the Rochester Institute of Technology where she specialized in media arts and technology with a minor in theater. She's focused on how people interact with visual technology and how it impacts them. His studies have taught him the importance of interactive visual learning and the use of various ways to enhance the learning experience, including art, art, and art. sound and movement. Ritter considered herself a visual explorer and a designer.
After graduating, she began working as a security program manager to help large organizations develop a safer strategy and state of mind. She was not aware of cybersecurity as a specific discipline, but was increasingly focusing on overlapping technology and security. She was fascinated by piracy stories and the emergence of new technologies like Internet of Things (IOT), autonomous cars, and web-based communications. Ritter intuitively understood that all these technologies were interconnected and required protection.
While he was interviewing for marketing positions at IBM Security, Ritter discovered a new project in the Cyber Range company. Even in her training phase, she knew that she wanted to be part of the project. She seconded the future project manager to make sure she could enter the ground floor and help build the simulator.
Finally, the project helped bring together all of Ritter's diverse skills, including his theater background. She has contributed to the development of a full immersion live fire experience for a business team in order to deal with a cyberattack. More than the technical aspects of an attack, she focused on how teams maintain operations with limited access to their systems, stay out of news headlines, and more. The goal of the simulator is to ensure that the team can react quickly and decisively even under intense pressure.
Ritter and his team use a wide range of technologies to create the situations of each party. This can include blade servers that allow them to run the entire event, the malware that they bring from the dark web, the software that creates the simulation and the audio resources and video as multiple screens that follow a dynamic attack scenario. takes place From the moment a team enters the room, Ritter uses technology to pressure and sweat.
IBM is actively seeking to increase the number of women on the ground. As cyber incidents multiply, there is always a persistent lack of cyber-workers. One of the ways in which the industry can increase the workforce required is to focus on diversity. Currently, only 11% of those working in this field are women according to the latest Frost & Sullivan figures. Having a more varied background will help fill those holes, but also increase the types of ideas and approaches created to stop these threats.
Ritter says that while many people neglect a cybersecurity career because it's super-technical or tactical, the truth is that many people would be well-qualified. Ritter points out that there is a complete ecosystem of jobs in the industry that are open and available, including training, writing, design, or even hacking. As in her own experience, she believes that no matter who with motivation can acquire the necessary training and qualifications once they aim for their work in the field.
">
Many of you already know that I am a movie During a conversation with Allison Ritter, threat gaming engineer and creative director of the X-Force Command Center at IBM Security, I've had a look back at the clbadic Wargames of the 80s. Hearing Ritter Talks Cyber Range and Simulations of Cyber Attack with Fortune 500 Frameworks Remind Me That Matthew Broderick and Ally Sheedy Avoided a Real War
But while Ritter and his simulations do not run the risk of real disasters, they help companies do better at preventing cyber attacks and crises in real life – and to understand how to react when they occur. From Target to Yahoo !, data breaches seem to occur with increasing regularity. cost of a mega violation – 1 million or more lost documents or compromises – between 40 and 350 million dollars (according to the latest study on the cost of data breach of IBM Security and Ponemon Institute), the stakes are enormous must prepare in a comprehensive way . Failure to respond quickly and accurately to a breach can escalate costs and increase problems. The report found that companies capable of containing a violation within 30 days can save up to $ 1 million.
Unfortunately, villains are becoming more sophisticated than ever and many are working in groups. According to Ritter, nearly 80% of cyberattacks are conducted by highly organized criminal groups and are becoming increasingly sophisticated. And it's not just big business, where these attacks take place. Businesses of all sizes can be hacked or their systems held for ransom. Due to the growth of these crimes, more cyber-fighters are needed. That's where Ritter and the IBM X-Force Command Center come in.
Companies are realizing that they need to invest more in cybersecurity and train for possible scenarios of attack. As a result, a report of Frost & Sullivan predicts nearly 2 million jobs in this sector by 2020. These cyber security jobs do not only concern hackers or programmers, but cybersecurity awareness trainers, technical writers and more.
Ritter began her tech career at the Rochester Institute of Technology where she specialized in media arts and technology with a minor in theater. She's focused on how people interact with visual technology and how it impacts them. His studies have taught him the importance of interactive visual learning and the use of various ways to enhance the learning experience, including art, art, and art. sound and movement. Ritter considered herself a visual explorer and a designer.
After graduating, she began working as a security program manager, helping large organizations develop a safer strategy and state of mind. She was not aware of cybersecurity as a specific discipline, but was increasingly focusing on overlapping technology and security. She was fascinated by piracy stories and the emergence of new technologies like Internet of Things (IOT), autonomous cars, and web-based communications. Ritter intuitively understood that all these technologies were interconnected and required protection.
While he was interviewing for marketing positions at IBM Security, Ritter discovered a new project in the Cyber Range company. Even in her training phase, she knew that she wanted to be part of the project. She seconded the future project manager to make sure she could enter the ground floor and help build the simulator.
Finally, the project helped bring together all of Ritter's diverse skills, including his theater background. She has contributed to the development of a full immersion live fire experience for a business team in order to deal with a cyberattack. More than the technical aspects of an attack, she focused on how teams maintain operations with limited access to their systems, stay out of news headlines, and more. The goal of the simulator is to ensure that the team can react quickly and decisively even under intense pressure.
Ritter and his team use a wide range of technologies to create the situations of each party. This can include blade servers that allow them to run the entire event, the malware that they bring from the dark web, the software that creates the simulation and the audio resources and video as multiple screens that follow a dynamic attack scenario. takes place From the moment a team enters the room, Ritter uses technology to pressure and sweat.
IBM is actively seeking to increase the number of women on the ground. As cyber incidents multiply, there is always a persistent lack of cyber-workers. One of the ways in which the industry can increase the workforce required is to focus on diversity. Currently, only 11% of those working in this field are women according to the latest Frost & Sullivan figures. Having a more varied background will help fill those holes, but also increase the types of ideas and approaches created to stop these threats.
Ritter says that while many people neglect a cybersecurity career because it's super-technical or tactical, the truth is that many people would be well-qualified. Ritter points out that there is a complete ecosystem of jobs in the industry that are open and available, including training, writing, design, or even hacking. As in her own experience, she believes that any motivated person can acquire the necessary training and skills once she has decided to work in the field.