Unit 8200 CEO Takes Accelerated Learning to the Cyber Masses
Cybint's Roy Zur aims to bridge the talent gap in cybersecurity by providing highly technical online self-guided certification
January 16, 2018 at 08:00 AM
7 minute read
As a major in Unit 8200, the elite cybersecurity Israeli intelligence corps, Roy Zur was tasked with finding ways to rapidly train inexperienced young soldiers on the basics of cybersecurity technology. “How do you take 18-year-old kids and train them to become relevant within a few weeks for their two to three years of service in the army?” asks Zur.
Unit 8200, often compared with the credibility and capability (though not the scale) of the NSA in the United States, has traditionally been composed of 18 to 21-year-olds and even boasts a scouting program to entice and identify the appropriate talent as early as age 16. Due to the brevity of their expected years of service, the unit aims to recruit individuals with the aptitude to rapidly learn new skills. Zur was tasked with training the next generation of cybersecurity special forces.
“The need to develop new methods to allow someone to immediately start working productively is the definition of accelerated learning, which we have now applied to Cybint's process and technology for commercial consumption,” says Zur.
Cybint Solutions, a subsidiary of Barbri and parent company to the ACEDS certification in e-discovery, boasts three levels of training and certification. Level one focuses on cybersecurity awareness and integrates basic cyber disciplines in a nontechnical faculty. Two certifications can be achieved in level one, the CIC (Cyber Intelligence Certification) and the CSPC (Cyber Security Protection Certification). Level two develops hands-on technical skills through custom labs, real-time threat alert simulations, virtual mentors, hands-on practice scenarios and more. Level two students can achieve a CSAC (Cyber Security Analyst Certification). Level three at Cybint is about specialization and deals in an advanced itinerary of training for working threat analysts looking for greater nuance within their existing portfolio of skills.
Cybint's go-to-market strategy, like many security awareness and training companies, is focused on B2B and B2E rather than B2C client acquisition. For companies or educational institutions looking to give their employees or students tactical and technical SOC (security operation center) skills, level two is the ideal investment. “Level two training and the CSAC were designed to bridge the multimillion-person talent gap in cybersecurity,” says Zur.
The level two lab is both a learning and a practice environment. Students can work at their own pace and have unfettered access to content and virtual servers hosting a wide array of proprietary and open source technology. Users will interface with Snort IDS for intrusion detection and prevention, Nmap for network management, Sysinternals utilities to help troubleshoot and diagnose Windows systems and applications, Cuckoo Sandbox for automated malware analysis, Metasploit for penetration testing and other software and operating systems like Wireshark, MySQL, Linux, and more. “We chose the easiest tools to teach and believe once they learn these, students can quickly pick up equivalent tools that address similar solutions,” adds Zur. “If you can learn to read logs for anti-virus in one tool, you can learn them in any tool.”
Students also receive simulated threat alerts in their dashboard where they can practice incident response best practices and techniques. Cybint has employed a variety of experts to craft the lab alerts from PhD's in accelerated learning and gamification to CISOs from major corporations and consulting firms. The lab alerts indicate a cyberthreat on the user's screen that then triggers the user to complete a series of actions to problem-solve the threat. All alerts are based on real-life cybersecurity events. Each alert initiates a different case scenario and engages the student on different technology in the portfolio. These tasks may be as simple as dealing with infected files, learning how to quarantine or delete them, and not only gives intelligence on what to do and how to do it, but also explains the pros and cons of each solution option and why some are better than others.
There are 12 core scenarios built into the Cyber Security Analyst Certification curriculum. These include identifying suspicious FTP/HTTP traffic or unusual activity by a domain administrator from a VPN connection, troubleshooting an endpoint and server machine trying to log in with the same username and password at the same time, writing vulnerability assessments of an enterprise email server, building graphic dashboards to detect statistical anomalies and remediating an attack on a cloud service server. “Working as a cyber analyst is really hands-on technical work,” articulates Zur, “and our scenarios are teaching users how to be proactive in reactive situations by delivering triggers that force a response.”
While scenario 12 of 12 focuses on penetration testing, the core of Cybint's level two training is largely on incident response. When asked why the training emphasis has been placed on the reactive arts of cybersecurity, Zur states simply, “Because that's where the biggest demand in the job market exists.” Not only is demand high and supply low for incident response talent, breach remediation is quickly becoming the most expensive and potentially brand damaging variable in a complicated cybersecurity and risk management equation.
Cybint is determined for its program to ultimately help people get jobs, so much so that the final exam for the CSAC is a mock interview based on real interviews with CISOs. Zur proclaims, “The CSAC training builds confidence around job interviewing, because users have to actually solve real problems on the spot in the final exam.”
The CSAC level two training can be used not only to educate and prepare more novice talent for a career in cybersecurity, but also to validate and measure the skills of existing employees within an organization. Cybint boasts an ongoing assessment functionality that allows employers to identify the gaps in knowledge bases for threat analysts. This allows some users to test out of specific lab scenarios and accelerate their training to more sophisticated areas of expertise. Zur comments, “We have found that larger organizations hiring top talent sometimes have internal training programs, but many organizations don't know how to assess the talent they have on staff or are looking to hire.”
Level two also has a virtual mentor built into its process that helps students with “what to do next” if they hit roadblocks in their training. The virtual mentor accompanies each user through the entire training to understand the implication of each alert, create awareness around the known and unknowns of each scenario and question user thinking and decision-making along the way. There is also a group chat discussion portal for SOC teams to collaborate and communicate if taking the training as a unit.
Cybint does not want to be a school but rather to augment the curriculum of universities with cybersecurity programs. “A computer science major may not get the skills or tool exposure that we provide, and the CSAC training helps fill the gaps in hands-on technology skills needed to be employed in the industry,” professes Zur. Many of Cybint's flagship customers are in fact universities. “Higher education institutions are adopting our training and integrating Cybint into their computer science departments to make their degree programs more hands-on.”
While many large financial institutions can and will pay top dollar for experienced professionals, many midsize companies will have to find other ways to elevate or train talent to meet increasing regulatory requirements related to security. Hiring managers will need to be more open-minded about hiring for people with promise and potential and not just proven experience. Security experts may become experts by stepping up and into the role, and some organizations will need programs like Cybint to pave the way for those professionals to add value quickly. Otherwise, employers will need to open their wallets to meet the salary demands of those who are already established as experts in the field—at least for now.
Cybint will be offering eight free CSAC passes through the TRU Scholarship Program in 2018. Applications will be open for the program in late January.
Jared Coseglia is the founder and CEO of TRU Staffing Partners, an Inc 5000 Fastest Growing American Company 2016 and National Law Journal's #1 Legal Staffing Agency, and has over 13 years of experience placing thousands of professionals in e-discovery, litigation support, cybersecurity and broadly throughout legal and technology staffing.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllIs International Regulation of AI Moving in the Right Direction or Moving at All?
4 minute readLegal IT Professionals: Beware the Seven Deadly Vulnerabilities of Domain Names
Natural Language Processing and Survey Data: LDA and the Importance of Topic Modeling
6 minute readNatural Language Processing and Survey Data: Word Clouds, Associations, Sentiment and Bigrams
7 minute readTrending Stories
- 1Infant Formula Judge Sanctions Kirkland's Jim Hurst: 'Overtly Crossed the Lines'
- 2Abbott, Mead Johnson Win Defense Verdict Over Preemie Infant Formula
- 3Preparing Your Law Firm for 2025: Smart Ways to Embrace AI & Other Technologies
- 4Greenberg Traurig Initiates String of Suits Following JPMorgan Chase's 'Infinite Money Glitch'
- 5Data-Driven Legal Strategies
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250