File
    2023_eCTF_Flyer.pdf
   Submitted by Benjamin Janis on September 15th, 2022
        Submitted by Benjamin Janis on September 15th, 2022
     Submitted by Benjamin Janis on September 15th, 2022
        Submitted by Benjamin Janis on September 15th, 2022
    File
    eCTF_Flyer_2022.pdf
   Submitted by Benjamin Janis on September 29th, 2021
        Submitted by Benjamin Janis on September 29th, 2021
     Submitted by Benjamin Janis on September 29th, 2021
        Submitted by Benjamin Janis on September 29th, 2021
    
              
        Submitted by Robert Zager on September 7th, 2018
    
Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.
      
              
        Submitted by Robert Zager on September 7th, 2018
    
              
        Submitted by Robert Zager on August 29th, 2017
    
              
        Submitted by Robert Zager on May 23rd, 2017
    
              
        Submitted by Robert Zager on May 22nd, 2017
    
George Washington called West Point, “the key to the continent.” The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.
      
              
        Submitted by Robert Zager on May 22nd, 2017
    
Feedback
  Feedback
        If you experience a bug or would like to see an addition or change on the current page, feel free to leave us a message.