Cyber Defense Center

Cyber Defense Center

Computer and Network Security

Castle Rock , Colorado 322 followers

ACSEND | DEFEND

About us

MISSION > Our Mission is to share in the responsibility of securing the critical cyber infrastructure within our local communities to better preserve the integrity, privacy, and sovereignty of all connected systems that we and our public services rely upon. ASCEND > Our partnership goal is to approach cyber security problems using a collective defense model that leverages battle-tested methods and defense-grade solutions with the most experienced workforce within the service region. DEFEND > Our partner enablement goal is to provide our partners with holistic, innovative, and effective cyber security solutions to force multiply their ongoing efforts to protect, defend, respond, and educate on cyber defense risk.

Website
https://www.cyberdefensecenter.org
Industry
Computer and Network Security
Company size
2-10 employees
Headquarters
Castle Rock , Colorado
Type
Partnership
Founded
2012
Specialties
Public-Private Sector Partnership, Cyber Defense, Research, Training, Penetration Testing, Red Team, Threat Analysis, Compromise Assessment, Analytics, Intelligence, Forensics, Incident Response, Suspicious Code Review, Contain and Control, Scenario Design, Cyber Defense Awareness, Investigations, Litigation Support, Attribution, and Tabletops

Locations

Employees at Cyber Defense Center

Updates

  • This panel discussion focused on wartime motives, objectives, and planning. Cyber Defense Center helps critical infrastructure and private sector companies prepare, plan, and improve readiness for cyber conflicts involving adversarial nation states as well as cyber warfare. Strategies for the 5th domain of hybrid warfare. LAND | SEA | AIR | SPACE | CYBER. Perform tabletops and assess readiness and start your journey to preparedness through innovative exercises and intentional planning. https://lnkd.in/eZ7-JchE

  • Do you know how you and your company would respond if your country was engaged in an armed conflict or during wartime? Perhaps its time to find out. 21st Century Warfare is one of many conversations on this 5th domain of warfare topic. LAND | SEA | AIR | SPACE | CYBER. Join us to learn more.

    View organization page for AMPYX CYBER, graphic

    828 followers

    🌐 Join Ampyx Cyber in Collaboration with WorldDenver🌐 Mark your calendars for July 29 as we delve into the critical topic of cybersecurity, a field that influences global threats and conflict. The panel will discuss critical infrastructure vulnerabilities , including power grids, water supplies, and cyber attacks. Gain valuable insights from industry leaders who tackle these challenges daily. This is a unique opportunity to enhance your understanding and engage with top professionals in the field. This event is free and open to everyone. 👉🏻 Secure your spot now: https://buff.ly/3y9jnkc #Cybersecurity #ICS #OT #PanelDiscussion #AmpyxCyber #WorldDenver #Event #Denver

    • No alternative text description for this image
  • The CYBER DEFENSE CENTER officially launches new OTSEC (OT Security) Cyber Defense Certifications. These OT certifications are part of the most comprehensive OT certification track offered in the industry. Certifications offer offensive and defense cyber security training in live and simulated energy environments to sharpen your skills and abilities in this specialized field.  These new certifications are aligned with a progressive certification path where you will have the opportunity to earn the following industry leading credentials: 1) Cyber Defense Associate Certification (CDAC)  2) Cyber Defense Professional Certification (CDPC)  3) Cyber Defense Expert Certification (CDEC) The CYBER DEFENSE CENTER OTSEC certifications (https://lnkd.in/giQNYehd) are the first and only industry recognized cybersecurity certifications for protecting energy power stations, substations, transmission, and distribution (collectively known as the Bulk Electric Systems). These specialized certification tracks prepare you for a successful and rewarding career in energy cyber security. Read the full announcement here: https://lnkd.in/gmKMgZ5W #OTSEC, #cybersecurity, #otcertifications, #cyberdefense, #cyberdefensecenter, #cyberdefenseassociate, #cyberdefenseprofessional, #cyberdefenseexpert, #training, #OT, #energysector, #renewableenergy, #riskmanagement, #informationsecurity, #ICS, #industrialcontrolsystems

    CYBER DEFENSE CENTER LAUNCHES NEW OTSEC CERTIFICATIONS

    CYBER DEFENSE CENTER LAUNCHES NEW OTSEC CERTIFICATIONS

    cyberdefensecenter.org

  • CISO SERIES PART 5 - CHANGE THE GAME.  Making improvements, achieving balance, and assessing CISO effectiveness. Ultimately, the effectiveness of a CISO is not only shaped by their expertise and leadership but also significantly influenced by the organizational structure and the level of support and authority they are granted. This is evidenced in so many ways. As cybersecurity becomes increasingly critical to business operations and reputation, reevaluating the role and positioning of the CISO within the organization becomes imperative. By addressing these areas, organizations can not only elevate the CISO role but also integrate cybersecurity more deeply into their strategic operations, fostering a culture that values and protects information assets as essential components of business success. This approach requires commitment from the top down, starting with recognition at the board and executive levels of the critical importance of cybersecurity in today’s competitive dependency of digital safety. Read the full post on how to correct CISO imbalances here: https://lnkd.in/g-TgGuPS #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement

    CISO SERIES PART 5

    CISO SERIES PART 5

    cyberdefensecenter.org

  • CISO SERIES: PART 4 - BORN IN BATTLE -  Why CISOs are essential in Wartime. Aside from the fact that the CISO role may be standing between your company and an extinction level event, there are other geo-political circumstances where you may find that your CISO is indeed the company’s MVP (Most Valuable Player). CISOs become invaluable in natural disaster responses, breaches, fraud cases, and defending your corporation from threats on nearly a daily basis. Born in battle, great CISOs thrive in conflict. So it may not surprise you that one of the most interesting aspects of the role of a CISO is that, should the United States be involved in an armed conflict or go to a war with an adversarial nation-state, the wartime CISO may become the most important C-level executive in a company’s leadership ranks. Read more about how CISOs are essential in wartime: https://lnkd.in/gJ3cCQVb The Cyber Defense Center helps companies with wartime readiness. Schedule a wartime tabletop and discover the value of a battle-ready CISO. #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement

    CISO SERIES: PART 4

    CISO SERIES: PART 4

    cyberdefensecenter.org

  • CISO SERIES PART 3:  IMPACT OF IMBALANCE  - Imbalance adversely impacts the business and the CISO's tenure. Employees astutely see when certain departments or executives are not adequately supported which, severely limits their willingness to take calculated risks or pursue innovative projects. The longer these imbalances persist, voices that desperately need to be heard to outpace competitors will instead be undervalued or ignored, leaving decision-making processes to suffer across the company. This may result in strategies that do not fully consider all aspects of the business or fail to leverage diverse insights and expertise. Read the full post here on the imbalances of the CISO role: https://lnkd.in/g55kkgii #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement

    CISO SERIES: PART 3

    CISO SERIES: PART 3

    cyberdefensecenter.org

  • CISO SERIES PART 2:  CISOs ARE THE BURNER PHONES OF COMPANIES  - Concerning trends with the CISO role and the 6 imbalances of the CISO role when compared to other C-level positions.  CISOs are simply not getting the job done and continuously receive poor or failing grades from their executive teams. They are viewed as a cost center and burden to progress. This leads companies to react and try new things. And, although, the CISO role as we know it may undergo significant changes or even face obsolescence in its current form, the need for leadership in cybersecurity within organizations will likely persist, possibly leading to an evolution of the role to meet new challenges and integrate more closely with business strategies. Challenges and imbalances covered in this post include: 1) The First Imbalance: Accountability and Responsibility 2) The Second Imbalance: Organizational Structure 3) The Third Imbalance: Regulation 4) The Fourth Imbalance: Equitable Importance 5) The Fifth Imbalance: Compensation 6) The Sixth Imbalance: Expendability Read the full post here on the imbalances of the CISO role: https://lnkd.in/gj6AVHGX #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement

    CISO SERIES: PART 2

    CISO SERIES: PART 2

    cyberdefensecenter.org

  • CISO SERIES PART 1: 30 YEARS OF BREACHES CISOs are now celebrating 30 years of breaches yet are still responsible for stopping and preventing breaches. They still report two to three organizational structure levels deep within their respective organizations, although the “C” title designation has generally been adopted. Most of the time the CISO role reports to the chief technology leader (CIO or CTO), and their budgets and authority are subject to the priority these leaders place on their areas of responsibility. Unlike the revenue alignment of other technology services, CISOs are still considered a cost center or burden to the bottom line. The CISO is still the primary subject matter expert on security and compliance, even as cyber security training and course requirements are now included as part of university degrees. And the most enduring and consistent responsibility of CISOs that has remained the same since the position’s inception, the CISO is the burner phone of corporations. The scapegoat, or fall guy, for executive leaders and the board when an inevitable breach or catastrophic security incident occurs. Read the full post here on the history and impact of CISOs: https://lnkd.in/g3kjaiY7 #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement

    CISO SERIES: PART 1

    CISO SERIES: PART 1

    cyberdefensecenter.org

  • CISO SERIES This series seeks to explore the contributing factors that may explain why the tenure of the average Chief Information Security Officer (CISO) is substantially shorter than that of their other C-suite counterparts. Although it is widely acknowledged that the tenure of a CISO is generally shorter than other C-level positions, specific figures for this reduced tenure vary among industry surveys and reports. This series has been written by an experienced CISO about the role of a CISO. This series dives deep into several controversial topics about the CISO role, its history, and the inequities CISOs face in performance of their jobs. The series is broken into multiple parts and will continue as an area of research and publication for the Cyber Defense Center. Explore the CISO SERIES here: https://lnkd.in/gRCxZpP3. The first five (5) parts of the series are posted. 1) PART 1: 30 YEARS OF BREACHES - The history and impact of the CISO.  2) PART 2: CISOs ARE THE BURNER PHONES OF COMPANIES - Concerning trends with the CISO role and the 6 imbalances of the CISO role when compared to other C-level positions.  3) PART 3: IMPACT OF IMBALANCE:  Imbalance adversely impacts the business and the CISO's tenure.  4) PART 4: BORN IN BATTLE: Why CISOs are essential in Wartime.  5) PART 5: CHANGE THE GAME: Making improvements, achieving balance, and assessing CISO effectiveness. #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement

    CISO SERIES

    CISO SERIES

    cyberdefensecenter.org

  • Critical Assets Podcast Link: https://lnkd.in/d4Xm3pXC Electrifying! The conversation continues. Energizing Cybersecurity Careers HOST: PATRICK MILLER, GUESTS: CYNTHIA HSU, ERIN OWENS Join us for a discussion on Energizing Cybersecurity Careers: Workforce Development in the OT/ICS Community. Guests Cynthia Hsu and Erin Owens dive into the cybersecurity challenges facing Industrial Control Systems and Operational Technology asset owners. Through open conversations, we explore everything from skill gaps and career pathways to diversity, continuous learning, and the impact of new technologies. This session aims to provide insights into developing a skilled, diverse cybersecurity workforce – starting from the ground up – with a focus on practical strategies for professionals, educators, and anyone interested in the future of ICS/OT security. Watch for a major announcement from the Cyber Defense Center on March 15.

    • No alternative text description for this image

Affiliated pages

Similar pages