Working with Booz Allen Threat Hunters, you build a Hunt Methodology to mitigate the impact of advanced threats. Understanding how an attacker operates on a targeted network and what behavior they may exhibit can help to secure your network.
When played remove an Attack – Code Exploit, Hack, or Personnel card from play. This card prevents Attack – Hack cards from affecting you while in play.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.