File
2023_eCTF_Flyer.pdf
![Benjamin Janis](/sites/cps-vo.org/files/profile_images/picture-18634.png)
![Benjamin Janis](/sites/cps-vo.org/files/profile_images/picture-18634.png)
File
eCTF_Flyer_2022.pdf
![Benjamin Janis](/sites/cps-vo.org/files/profile_images/picture-18634.png)
![Benjamin Janis](/sites/cps-vo.org/files/profile_images/picture-18634.png)
Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.
George Washington called West Point, “the key to the continent.” The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.