IT Security Consultants advise organizations how to best protect their cybersecurity objectives in a cost-effective manner.
When played, draw 1 card and show your opponent that card. If it’s a Defense card, draw another card. Otherwise, you gain 1 point at the end of the round. Discard this card at the end of the round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.