Much like a forensic investigator captures evidence from the scene of a crime, a digital forensic examiner gathers evidence found on computers, phones, and other digital devices.
While in play and once per round, when an opponent’s Attack targets an Asset that is not a Personnel, perform this effect. Draw 3 cards, discard any of those cards that is not a Defense.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.