Defense in Depth
B’More Secure
GenCyber Train the Trainer�Camp 2025
Objectives
Participants will:
Cybersecurity Learning Standards:
Role Reversal
Back to the gold bar heist: Mary has seen the error of her ways and hired you to help her protect the gold bars.
Create a security plan for the gold bars to ensure that no one can steal, damage, or prevent Mary from accessing them. Make sure that you include multiple layers of defenses.
How much protection is enough?
Defense Testing
Exchange your security plan with another group. Read through their plan and then see if you can come up with a plan to steal their gold bars!
Reinforcing your Defenses
Consider the feedback you just received.
How does the gold bar heist relate to cybersecurity?
Cybersecurity Concepts Hand Model
Confidentiality
Integrity
Availability
Defense
in Depth
Think like
an Adversary
Keep it Simple
Defense in Depth
BYOD (Bring Your Own Device) Security
Different Elements of a Defense-in-Depth System
From https://www.fortinet.com/resources/cyberglossary/defense-in-depth
Castle 6 layers
Five Security
Layers
Cyber Career Spotlight
What are your layers of defense?
Return to your list of assets from the previous section. How do you protect those assets?
Keep It Simple:
Write a student policy on how to make a sure password, but keep it simple!