Training Orchestration Automation and Response Logo White

Introducing TOAR

The cyber security industry has clearly shown practice-based talent development to be the crucial contributor to cyber capability and resilience for organizations and nations.

MITRE ATT&CK Defender™ (MAD) Purple Teaming Initiatives and CYBER RANGES Collaboration

A conversation with Chriss Knisley of MITRE Engenuity and Almerindo Graziano CEO of CYBER RANGES

CYBER RANGES TOAR MicroFocus Interview – What is TOAR?

Partnering Together. The Value Of TOAR. Al Graziano, CYBER RANGES & D’Arcy Moynaugh, Deloitte Canada

The TOAR Quadrant

The TOAR Quadrant

Abilities and experience are recognized as key to competence development, beyond the supply and acquisition of mere knowledge and skills. Competence being the behavioral cornerstone of the ‘human firewall’ and the ‘human perimeter’ that underpin an organization’s cyber resilience.

To be cost and time effective cyber security talent development must be: up to date on the latest and
most complex attack vectors, hands-on and experiential to acquire muscle memory, very realistic
as to exercise infrastructure and scenarios, easy to access, scalable to large audiences, and repeatable, based on deep-dive technologies such as simulation (in the future, AI and VR), measurable and shareable.

The TOAR Quadrant

TOAR Quadrant Training Orchestration Automation and Response TOAR Quadrant

Abilities and experience are recognized as key to competence development, beyond the supply and acquisition of mere knowledge and skills. Competence being the behavioral cornerstone of the ‘human firewall’ and the ‘human perimeter’ that underpin an organization’s cyber resilience.

To be cost and time effective cyber security talent development must be: up to date on the latest and
most complex attack vectors, hands-on and experiential to acquire muscle memory, very realistic
as to exercise infrastructure and scenarios, easy to access, scalable to large audiences, and repeatable, based on deep-dive technologies such as simulation (in the future, AI and VR), measurable and shareable.

This translates into TOAR, the platform developed by Silensec for Training Orchestration Automation and Response, which ensures that:

  • Training benefits of the latest threat intelligence inputs.
  • Gamified exercises occur in a sandbox environment where the latest threats can be safely detonated in a replica environment according to an engaging slate of roll-out activities and events, designed, built, and deployed to reflect real-life use contexts, to apply any available tools of trade, to engage numbers of users and teams over a meaningful period of time.
  • Such a slate of exercises runs on seamless functionalities based on high orchestration and high automation, in order to meet the requirements for cost and time-efficient deployment of resources, participants, events.
  • Participants’ performance is full tracked and observed before, during and post exercises, with gathering and analysis of metrics, against a competency framework and other applied criteria.
  • This also includes processes and technologies tested in an exercise. All resulting data is captured and made shareable with other internal / external business systems, such as for Learning Management, Human Capital, proof of concepts towards development roadmaps, for policy and regulations compliance, and collaboration and coordination frameworks.

CYBER RANGES provides the TOAR-enabled next-generation App-built simulation platform that provides a fully-featured sandbox environment to apply the latest threat data to the development of complex exercise scenarios that can denotate complex attack simulations into true-to-life IT/OT networks and are run by even large numbers of players, both individuals and teams, anytime anywhere. Through APIs then the resulting data is managed and exported to other stakeholders of an organization’s cyber security ecosystem.

Training Orchestration Automation and Response Logo White
TOAR enables CYBER RANGES to play the industry-wide role of ecosystem platform for for effective cyber security capability and resilience building.
Scroll to Top

Introducing Threat-eX™

6-Event Cyberdrill Program

Threat-eX™ is a comprehensive 6-month program of Live Webinars and CYBER RANGES simulations, delivering effective, threat-informed operations training, professional development and certification