An Information Security Analyst (ISA) is responsible for the protection of several computer systems and networks.
Choose one:
At the start of each round, select one of your Defense cards in play. It cannot be discarded this round by any opponent while this card is in play.
OR
Select an Asset card from your discard pile that is not a Personnel type and shuffle it into your deck. Discard this card at the end of the round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.