I signed up.
Should be fun.

On Wed, Nov 11, 2009 at 2:37 PM, Dustin Puryear <[email protected]> wrote:
> Looks fun!
>
> -----Original Message-----
> From: Dayle Alsbury [mailto:[email protected]]
> Sent: Thursday, November 05, 2009 12:10 PM
> To: Dustin Puryear; [email protected];
> [email protected]
> Subject: TigerTrap.org
>
> Dustin:
> Please forward this information to any of your IT pros that may want to
> participate in the upcoming Tiger Trap cybersecurity event.  I have
> added Tome Frazier and Stacy Manning to this email.  If you need more
> information or documents, we will be happy to help.  You can find
> information on the rules, scenarios, schedules and sign up contacts at
> http://www.tigertrap.org .
>
>
> As a fellow IT Professional, I want to reach out to you and extend an
> invitation to participate in the upcoming 2010 Tiger Trap cybersecurity
> event.  This FREE cybersecurity learning exercise will be held in Baton
> Rouge next spring.  It is an exciting and extremely valuable opportunity
> to learn and train with cybersecurity professionals from across the
> state.  Tiger Trap is annual Louisiana InfraGard sponsored 'Capture the
> Flag' cybersecurity event designed as an information sharing and
> hands-on learning opportunity for business, university, state & local
> government, law enforcement and defense agencies.  Participants are
> vetted by FBI and come from the information security field in such
> specialties as cyberwarfare, systems & network management, computer
> programming, intrusion & incident management, digital forensics,
> penetration testing, IT auditing, & communications security, engage in a
> real-world hack and defend exercise.
>
> How does it work?
>
> Each annual event simulates current cyber warfare and cybercrime
> scenarios which threaten critical cyber assets, information &
> infrastructure security.  The Attack (Red) teams seek to breach target
> systems constructed by (White Team) subject matter experts in an effort
> to hijack & control critical systems or steal sensitive information
> while the defense (Blue) teams attempt to actively defend the network,
> determine if breach(s) have occurred and counter-attack the Red Team.
> The annual Tiger Trap learning exercises conclude with classroom
> instruction by the White Team and round-table discussion on the
> successful tools & techniques to use and pitfalls to avoid in real world
> computing environments.
>
> The event is designed to foster networking with regional peers on the
> latest tools, resources and techniques in Information Security.  We
> bring together Technology Professionals from across the state to teach
> them how to better protect their computer systems from cyber thieves &
> organized crime.  For our 2010 event we have chosen the training theme
> to involve a fictional brewery because of the unique mixture of
> computing devices native to such an environment
> (Windows/Unix/SCADA/etc).  The event will culminate with a half-day
> training session, distribution of a Live CD toolbox, professional
> networking and a keynote presentation by Billy Austin, CTO of SAINT
> Corp.  SAINT and our other sponsors are contributing prizes and
> resources, so we expect this event to be both fun and competitive.
>
> You can find information on the rules, scenarios, schedules and sign up
> contacts at http://www.tigertrap.org .
>
> If you have any questions, please feel free to contact me at
> 225-229-0925 or you can email us at [email protected].
>
> If someone on your team may be interested in participating, please
> forward this message to them.
>
> Thank YOU!
>
>
> Dayle Alsbury
> Tiger Trap Planning Committee Secretary
> http://www.tigertrap.org
> [email protected]
> [email protected]
>
>
>
> _______________________________________________
> General mailing list
> [email protected]
> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>
>



-- 
Have Mercy & Say Yeah

_______________________________________________
General mailing list
[email protected]
http://mail.brlug.net/mailman/listinfo/general_brlug.net

Reply via email to