Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
The U.S. Air Force is the world’s preeminent force in air, space and cyberspace. The USAF personnel are responsible for preventing, detecting and repelling cyber attacks and ensuring the security of computer networks and online communications. From programming to hardware, these experts keep the USAF systems and information safe.
The rare USAF booster pack, which was designed specifically for their internal use, contains cards that focus on internet-connect devices and emerging, targeted threats that effect citizens.
Using Two-Factor Authentication (2FA) for access to all sensitive information on your network, in conjunction with other security policies, will contribute to a more secure network.
While in play, this card prevents and counters Attack – Hack cards with a value of -1 or -2.
A mobile device that enables the customer to use mobile applications. This product is larger but similar in style to smartphones.
You gain 1 point each round.
A Smishing attack is a Phishing attack that goes through SMS messaging, or text messaging, which occurs most commonly through phones.
Target an opponent’s Asset – Mobile or Asset – Wireless System. That opponent loses 2 points at the end of the round.
A pocket-sized consumer device that allows for mobile connectivity to the Internet through cellular and wireless networks. Offers voice, VoIP and video calling, as well as messaging and access to mobile applications.
Mobile device management software allows devices to be remotely disabled in the event they have been stolen, lost or are inappropriately used on the network.
While in play, you may use this card’s effect once per round to return a System, Wireless System or Mobile Asset card from your field to your deck and shuffle.
Your opponent downloaded a malicious app application onto their mobile device, which sends out their information when executed.
Select an Asset – System or Asset – Mobile card that your opponent has in play. That opponent loses 1 point per round.
The security systems administrator is in charge of system monitoring, running regular backups, and setting up, deleting and maintaining individual user accounts.
Prevents Attack – Hack, Data Breach and Phishing type cards from being played. Discard this card after 3 rounds.
Security Managers create and execute security strategies based on the input from the Security Director and/or the CISO. They must also test and implement new security tools, lead security awareness campaigns and administer both budgets and staff schedules.
Before your draw phase, you may choose to put 1 card from your hand at the bottom of your deck and then draw 1 card.
Your opponent responded to an email asking for their security/login information. The attacker can now access your opponent’s account and system.
Select an opponent. That opponent loses two (2) points each round for two (2) rounds. Remove this card from play after two rounds.
Your opponent picked a bad or weak password. An attacker was able to guess the password and has accessed their accounts and system.
Select an opponent. That opponent loses one (1) point each round for two (2) rounds. Remove this card from play after two rounds.
You attended a special security training course that taught you all about popular email scams so that you don’t fall victim to those attacks.
Select a Phishing or Spear Phishing attack card that is in play and affecting you. Both this card and the target card are discarded.
One of your opponent’s policies is outdated and has become useless. As technologies and threats evolve, it is important to ensure that policies are kept updated with relevant information and procedures for handling these changes.
Select a Defense – Policy card that an opponent has in play. The target card and this card are immediately discarded.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.