Data driven cybersecurity is about figuring out how to extract, normalize, and apply data to accelerate security operations—ideally faster than adversaries.
While in play, if your opponent has more Attack cards on the field than you have Defense cards, you may draw one card from your deck and reveal it to your opponent. If it’s not a Defense card, shuffle it back into your deck. This effect can only happen once per round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.