File
2023_eCTF_Flyer.pdf


File
eCTF_Flyer_2022.pdf


Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.
George Washington called West Point, “the key to the continent.” The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.
Feedback
Feedback
If you experience a bug or would like to see an addition or change on the current page, feel free to leave us a message.