Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top Page Results

See all search results

Featured Solutions
What's trending
?
Home
Solutions & Services
Solutions
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Research
About
Footer Links
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
Cyber Range Security Transformation
Cyber Range

Cyber Range - Capture The Flag Series - Blue 1

  • Details
  • Select an Option

Event Overview

Cyber Range teams -- comprised of teams of three to four players -- will be pitted against one another in a point-style competition, and the team with the most points at the end wins. This will be a multi-day experience that can accommodate teams from within different geographies. Although this event lasts 72-hours, it is designed to be completed in a 6-8 hour period. The larger block of time provides your team with the flexibility to participate at a time and pace that works best for your team. IMPORTANT: Please have a team of three to four players identified prior to registration. The event planner will reach out to you upon registration to verify your teammates.

Goals and Objectives

A nefarious, secret collective of bad actors and hackers have infiltrated your organization and seized control of critical business applications and are demanding ransom in exchange for relinquishing control. Using any means necessary, your team has 72 hours to scan your organization's environment, identify compromised systems and footholds, and brief your leadership team on how best to mitigate or eliminate the breach.

Who should attend?

Hands-on security practitioners involved in day-to-day defense or offense.

Invite people to join this event

© World Wide Technology. All Rights Reserved
  • About
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies