Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Microsoft - Rethinking cyber learning? Consider gamification

#1
Rethinking cyber learning? Consider gamification

<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification.png" width="3917" height="1621" title="" alt="" /></div><div><p>As promised, I’m back with a follow-up to my recent post, <a href="https://www.microsoft.com/security/blog/2019/10/01/rethinking-how-we-learn-security/" target="_blank" rel="noopener noreferrer">Rethinking how we learn security</a>, on how we need modernize the learning experience for cybersecurity professionals by gamifying training to make learning fun. Some of you may have attended the recent Microsoft Ignite events in Orlando and Paris. I missed the conferences (ironically, due to attending a cybersecurity certification boot camp) but heard great things about the Microsoft/Circadence joint <a href="https://vimeo.com/370416459" target="_blank" rel="noopener noreferrer">Into the Breach</a> capture the flag exercise.</p>
<p>If you missed Ignite, we’re planning several additional <a href="https://www.microsoft.com/en-us/ignite-the-tour" target="_blank" rel="noopener noreferrer">Microsoft Ignite The Tour</a> events around the world, where you’ll be able to try your hand at this capture the flag experience. Look for me at the Washington, DC event in early February.</p>
<p>In the meantime, due to the great feedback I received from my previous blog—which I do really appreciate, especially if you have ideas for how we should tackle the shortage of cyber professionals—I’ll be digging deeper into the mechanics of learning to understand what it really takes to learn cyber in today’s evolving landscape.</p>
<p>Today, I want to address the important questions of how a new employee could actually ramp up their learning, and how employers can prepare employees for success and track the efficacy of the learning curriculum. Once again, I’m pleased to share this post with Keenan Skelly, chief evangelist at Boulder, Colorado-based <a href="http://www.circadence.com/" target="_blank" rel="noopener noreferrer">Circadence</a>.</p>
<p>Here are some of some of her recommendations from our Q&amp;A:</p>
<p><strong>Q:</strong> Keenan, in our last blog, you discussed Circadence’s “Project Ares” cyber learning platform. How do new cyber practitioners get started on Project Ares?</p>
<p><strong>A:</strong> The way that Project Ares is set up allows for a user to acquire a variety of different skill levels when launched. It’s important to understand <em>what kind of work roles</em> you’re looking to learn about as a user as well as w<em>hat kinds of tools</em> you’re looking to understand better before you get started on Project Ares. For example, if I were to take some of my Girls Who Code or Cyber Patriot students and put them into the platform, I would probably have them start in the Battle School. This is where they’re going to learn about basic cybersecurity fundamentals such as ports and protocols, regular expressions, and the cyber kill chain. Then they can transition into Battle Rooms, where they’ll start to learn about very specific tools, tactics, and procedures or TTPs, for a variety of different work roles. If you’re a much more skilled cyber ninja, however, you can probably go ahead and get right into Missions, but we do recommend that everyone who comes into Project Ares does some work in the Battle Rooms first, specifically if they are trying to learn a tool or a skill for their work role.</p>
<p>Project Ares also has a couple of different routes that an expert or an enterprising cybersecurity professional can come into that’s really focused more on their role. For example, we have an assessments area based entirely on the work role. This aligns to the NIST framework and the NICE cybersecurity work roles. For example, if you’re a network defender, you can come into that assessment pathway and have steps laid out before you to identify your skill level in that role as you see below:</p>
<p><a href="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification.png" target="_blank" rel="noopener noreferrer"><img class="alignnone wp-image-90211 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification.png" alt width="3917" height="1621"></a></p>
<p><i>Assessment pathway.</i></p>
<p><b>Q:</b> What areas within Project Ares do you recommend for enterprise cyber professionals to train against role-based job functions and prepare for cyber certifications?</p>
<p><b>A:</b> You might start with something simple like understanding very basic things about your work role through a questionnaire in the Battle School arena as seen in the illustrations below. You may then move into a couple of Battle Rooms that tease out very detailed skills in tools that you would be using for that role. And then eventually you’ll get to go into a mission by yourself, and potentially a mission with your entire team to really certify that you are capable in that work role. All this practice helps prepare professionals to take official cyber certifications and exams.</p>
<p><img class="alignnone wp-image-90205 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification.jpg" alt width="1920" height="1080"></p>
<p><i>Battle School questionnaire.</i></p>
<p><a href="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification-1.jpg" target="_blank" rel="noopener noreferrer"><img class="alignnone wp-image-90206 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification-1.jpg" alt width="1658" height="939"></a></p>
<p><em>Battle School mission.</em></p>
<p><strong>Q:</strong> Describe some of the gamification elements in Project Ares and share how it enhances cyber learning.</p>
<p><strong>A:</strong> One of the best things about Project Ares is gamification. Everyone loves to play games, whether it’s on your phone playing <em>Angry Birds</em>, or on your computer or gaming console. So we really tried to put a lot of gaming elements inside Project Ares. Since everything is scored within Project Ares, everything you do from learning about ports and protocols, to battle rooms and missions, gives you experience points. Experience points add up to skill badges. All these things make learning more fun for the user. For example, if you’re a defender, you might have skill badges in infrastructure, network design, network defense, etc. And the way Project Ares is set up, once you have a certain combination of those skill badges you can earn a work role achievement certificate within Project Ares.</p>
<p>This kind of thing is taken very much from <em>Call of Duty</em> and other types of games where you can really build up your skills by doing a very specific skill-based activity and earn points towards badges. One of the other things that is great about Project Ares is it’s quite immersive. For example, Missions allows a user to come into a specific cyber situation or cyber response situation (<em>e.g.</em>, water treatment plant cyberattack) and have multimedia effects that demonstrate what is going—very much reflective of that <em>cool guy</em> video look. Being able to talk through challenges in the exercises with our in-game advisor, Athena, adds another element to the learning experience as shown in the illustration below.</p>
<p>Athena was inspired by the trends of personal assistants like Cortana and other such AI-bots, which have been integrated into games. So things like chat bots, narrative storylines, and skill badges are super important for really immersing the individual in the process. It’s so much more fun, and easier to learn things in this way, as opposed to sitting through a static presentation or watching someone on a video and trying to learn the skill passively.</p>
<p><a href="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification-2.jpg" target="_blank" rel="noopener noreferrer"><img class="alignnone wp-image-90207 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification-2.jpg" alt width="1917" height="1080"></a></p>
<p><em>Athena</em><em>—the in-game advisor.</em></p>
<p><strong>Q:</strong> What kinds of insights and reporting capability can Project Ares deliver to cyber team supervisors and C-Suite leaders to help them assessing cyber readiness?</p>
<p><strong>A:</strong> Project Ares offers a couple great features that are good for managers, all the way up to the C-Suite, who are trying to understand how their cybersecurity team is doing. The first one is called Project Ares Trainer View. This is where a supervisor or manager can jump into the Project Ares environment, with the students or with the enterprise team members, and observe in a couple of different ways.</p>
<p>The instructor or the manager can jump into the environment as Athena, so the user doesn’t know that they are there. They can then provide additional insight or help that is needed to a student. A supervisor or leader can also jump in as the opponent, which gives them the ability to see someone who is just breezing by everything and maybe make it a little more challenging. Or they can just observe and leave comments for the individuals. This piece is really helpful when we’re talking about managers who are looking to understand their team’s skill level in much more detail.</p>
<p>The other piece of this is a product we have coming out soon called Dendrite—an analytics tool that looks at everything that happens at Project Ares. We record all the key strokes and chats a user had with Athena or any with other team members while in a mission or battle room. Cyber team leads can then see what’s going on. Users can see what they’re doing well, and not doing well. This feedback can be provided up to the manager level, the senior manager level, and even to the C-Suite level to demonstrate exactly where that individual is in their particular skill path. It helps the cyber team leads understand what tools are being used appropriately and which tools are not being used appropriately.</p>
<p>For example, if you’re a financial institution and you paid quite a bit of money for Tanium, but upon viewing tool use in Dendrite, you find that no one is using it. It might prompt you to rethink your strategy on how to use tools in your organization or look at how you train your folks to use those tools. These types of insights are absolutely critical if you want to understand the best way to grow the individual in cybersecurity and make sure they’re really on top of their game.</p>
<p><a href="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification-3.jpg" target="_blank" rel="noopener noreferrer"><img class="alignnone wp-image-90208 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/11/rethinking-cyber-learning-consider-gamification-3.jpg" alt width="8000" height="4500"></a></p>
<p><em>The Dendrite assessment and analysis solution.</em></p>
<p><strong>Q:</strong> How can non-technical employees improve their cyber readiness?</p>
<p><strong>A:</strong> At Circadence, we don’t just provide learning capabilities for advanced cyber warriors. For mid-range people just coming into the technical side of cybersecurity, we have an entire learning path that starts with a product called inCyt. Now, inCyt is a very fun browser-based game of strategy where players have some hackable devices they must protect—like operating systems and phones. Meanwhile, your opponent has the same objective: protect their devices from attacks. Players continually hack each other by gathering intel on their opponent and then launching different cyberattacks. While they’re doing this, players get a fundamental understanding of the cyber kill chain. They learn things like what reconnaissance means to a hacker, what weaponizing means to a hacker, what deploying that weapon means to a hacker, so they can start to recognize that behavior in their everyday interactions online.</p>
<p>Some people ask why this is important and I always say, “I used to be a bomb technician, and there is no possible way I could defuse an IED or nuclear weapon without understanding how those things are put together.” It’s the same kind of concept.</p>
<p>It’s impossible to assume that someone is going to learn cyber awareness by answering some questions or watching a five-minute phishing tutorial after they have already clicked a link in a suspicious email. Those are very reactive ways of learning cyber. inCyt is very proactive. And we want to teach you in-depth understanding of what to look for, not just for phishing but for all the attacks we’re susceptible to. inCyt is also being used by some of our customers as a preliminary gate track for those who are interested in cybersecurity. So if you demonstrate a very high aptitude within inCyt, we would send you over to our CyberBridge portal where you can start learning some of the basics of cybersecurity to see if it might be the right field for you. Within our CyberBridge access management portal, you can then go into <a href="https://www.circadence.com/store" target="_blank" rel="noopener noreferrer">Project Ares Academy</a>, which is just a lighter version of Project Ares.</p>
<p>Professional and Enterprise licenses in Project Ares pave more intricate learning pathways for people to advance in learning, from novice to expert cyber defender. You’ll be able to track all metrics of where you started, how far you came, what kind of skill path you’re on, and what kind of skill path you want to be on. Very crucial items for your own work role pathway.</p>
<h3>How to close the cybersecurity talent gap</h3>
<p>Keenan’s perspective and the solution offered by Project Ares really helps to understand how to train security professionals and give them the hands-on experience they require and want. We’re in interesting times, right? With innovations in machine learning and artificial intelligence (AI), we’re increasingly able to pivot from reactive cyber defense to get more predictive. Still, right now we’re facing a <a href="https://www.cpomagazine.com/cyber-security/cybersecurity-workforce-shortage-continues-to-grow/" target="_blank" rel="noopener noreferrer">cybersecurity talent gap of up to 4 million people</a>, depending on which analyst group you follow. The only way that we’re going to get folks interested in cybersecurity is to make it exactly what we have been talking about: a career-long opportunity to learn.</p>
<p>Make it something that they can attain, they can grow in, and see themselves going from a novice to a leader in an organization. This is tough right now because there are relatively few cybersecurity operators compared to demand, and the operators on the front lines are subject to burnout. With uncertain and undefined career paths beyond tactical SecOps, what is there to look forward to?</p>
<p>We need to get better as a community in cybersecurity, not only protect the cybersecurity defenders that we have already, but also help to bring in new cybersecurity defenders and offenders who are really going to push the boundaries of where we’re at today. This is where we have an excellent and transformational opportunity to introduce more immersive and gamified learning to improve the learning experience and put our people in a position to succeed.</p>
<h3>Learn more</h3>
<p>To learn more about how to close the cybersecurity talent gap, read the e-book: <a href="https://discover.microsoft.com/ciso-essentials-how-to-bridge-security-talent-gap/" target="_blank" rel="noopener noreferrer">CISO essentials: How to optimize recruiting while strengthening cybersecurity</a>. For more information on Microsoft intelligence security solutions, see <a href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener noreferrer">Achieve an optimal state of Zero Trust</a>.</p>
<p>You can also <a href="https://www.youtube.com/watch?v=C3VH1rM57eo&amp;feature=youtu.be" target="_blank" rel="noopener noreferrer">watch my full interview</a> with Keenan.</p>
<p>Bookmark the <a href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener noreferrer">Security blog</a> to keep up with our expert coverage on security matters and follow us at <a href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener noreferrer">@MSFTSecurity</a> for the latest news and updates on cybersecurity.</p>
</div>


https://www.sickgaming.net/blog/2019/11/...ification/
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016