File
2023_eCTF_Flyer.pdf


File
eCTF_Flyer_2022.pdf


Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.
George Washington called West Point, “the key to the continent.” The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.