I signed up. Should be fun. On Wed, Nov 11, 2009 at 2:37 PM, Dustin Puryear <[email protected]> wrote: > Looks fun! > > -----Original Message----- > From: Dayle Alsbury [mailto:[email protected]] > Sent: Thursday, November 05, 2009 12:10 PM > To: Dustin Puryear; [email protected]; > [email protected] > Subject: TigerTrap.org > > Dustin: > Please forward this information to any of your IT pros that may want to > participate in the upcoming Tiger Trap cybersecurity event. I have > added Tome Frazier and Stacy Manning to this email. If you need more > information or documents, we will be happy to help. You can find > information on the rules, scenarios, schedules and sign up contacts at > http://www.tigertrap.org . > > > As a fellow IT Professional, I want to reach out to you and extend an > invitation to participate in the upcoming 2010 Tiger Trap cybersecurity > event. This FREE cybersecurity learning exercise will be held in Baton > Rouge next spring. It is an exciting and extremely valuable opportunity > to learn and train with cybersecurity professionals from across the > state. Tiger Trap is annual Louisiana InfraGard sponsored 'Capture the > Flag' cybersecurity event designed as an information sharing and > hands-on learning opportunity for business, university, state & local > government, law enforcement and defense agencies. Participants are > vetted by FBI and come from the information security field in such > specialties as cyberwarfare, systems & network management, computer > programming, intrusion & incident management, digital forensics, > penetration testing, IT auditing, & communications security, engage in a > real-world hack and defend exercise. > > How does it work? > > Each annual event simulates current cyber warfare and cybercrime > scenarios which threaten critical cyber assets, information & > infrastructure security. The Attack (Red) teams seek to breach target > systems constructed by (White Team) subject matter experts in an effort > to hijack & control critical systems or steal sensitive information > while the defense (Blue) teams attempt to actively defend the network, > determine if breach(s) have occurred and counter-attack the Red Team. > The annual Tiger Trap learning exercises conclude with classroom > instruction by the White Team and round-table discussion on the > successful tools & techniques to use and pitfalls to avoid in real world > computing environments. > > The event is designed to foster networking with regional peers on the > latest tools, resources and techniques in Information Security. We > bring together Technology Professionals from across the state to teach > them how to better protect their computer systems from cyber thieves & > organized crime. For our 2010 event we have chosen the training theme > to involve a fictional brewery because of the unique mixture of > computing devices native to such an environment > (Windows/Unix/SCADA/etc). The event will culminate with a half-day > training session, distribution of a Live CD toolbox, professional > networking and a keynote presentation by Billy Austin, CTO of SAINT > Corp. SAINT and our other sponsors are contributing prizes and > resources, so we expect this event to be both fun and competitive. > > You can find information on the rules, scenarios, schedules and sign up > contacts at http://www.tigertrap.org . > > If you have any questions, please feel free to contact me at > 225-229-0925 or you can email us at [email protected]. > > If someone on your team may be interested in participating, please > forward this message to them. > > Thank YOU! > > > Dayle Alsbury > Tiger Trap Planning Committee Secretary > http://www.tigertrap.org > [email protected] > [email protected] > > > > _______________________________________________ > General mailing list > [email protected] > http://mail.brlug.net/mailman/listinfo/general_brlug.net > >
-- Have Mercy & Say Yeah _______________________________________________ General mailing list [email protected] http://mail.brlug.net/mailman/listinfo/general_brlug.net
