PivotPoint Reinforces Perimeter Cybersecurity with CyberML & Cyber Architecture Training

FALLBROOK, Calif., July 8, 2014 (GLOBE NEWSWIRE) — via PRWEB – PivotPoint Technology Corporation, the Custom Model-Based Solutions™ company, today announced it is expanding its training services to include an Essential Cybersecurity Architecture Modeling Applied™ workshop. The new Cybersecurity Architecture Modeling training is aimed at clients who need to make smart tradeoffs among network performance, reliability, and cybersecurity in traditional and Cloud-based distributed computing environments.

The Essential Cybersecurity Architecture Modeling Applied workshop can be tailored for popular Agile and Lean development methods (Scrum is the default), mainstream visual modeling languages (UML™, OMG SysML™), and leading visual modeling tools. The hands-on cybersecurity training teaches model-based principles and techniques for precisely specifying network architectures and cybersecurity related features, such as firewalls, encryptor/decryptor devices, and Unified Threat Management (UTM) devices. The cybersecurity workshop also includes learning modules for modeling cyber attacks and defenses, cyber standards and frameworks, cyber penetration testing, and cyber simulations.

A major learning goal of the Cybersecurity Architecture Modeling training is to show how to specify architectural roadmaps for transitioning traditional network architectures with static, perimeter-based cyber defenses to next-generation network architectures with increased network “situational awareness” and improved cyber defense capabilities. The next-generation network architecture modeling emphasizes more dynamic and aggressive cyber countermeasures, consistent with the evolving concept of a Moving Target Defense (MTD).

The default specification language for the new workshop is CyberML™ (Cybersecurity Modeling Language™), a scalable Architecture Modeling Language for specifying secure distributed systems. CyberML is designed by Cris Kobryn, PivotPoint’s Founder and CEO, who is an internationally recognized visual modeling language expert known for successfully leading the UML 1, UML 2, and SysML modeling language design teams. CyberML is defined as a Lean subset of UML 2 diagrams and constructs that is extended to specify network architecture features, and includes reusable model libraries for defining cybersecurity attacks, defenses, frameworks, and “white hat” penetration tests. CyberML is small in terms of its total number of diagrams and constructs when compared with standard UML, but it is highly scalable when skillfully applied using the recursive design techniques taught during the cybersecurity workshop. CyberML is designed to be straightforward to implement in popular UML and SysML compliant tools that support the standard UML Profile mechanism.

“The recent cybersecurity breaches at Target, MtGox, eBay and the NSA are not anomolies, but rather harbingers of growing threats to our cyber-based economies and national defenses,” said Cris Kobryn, Founder and CEO of PivotPoint Technology. “Unfortunately, many executives and bureaucrats appear to be clueless and feckless about basic cyber hygiene, and are unwisely betting our cyber futures on static perimeter-based cyber defenses that rely on firewalls and anti-virus software. Such antiquated and unimaginative thinking is reminiscent of how the French Maginot Line static defense was foolishly positioned to stop the German blitzkrieg mobile offense at the start of WWII. Organizations that are serious about protecting their ‘crown jewel’ cyber assets – client data, intellectual property, and other valuable assets accessible via networks – need to re-assess and re-architect their static cyber defenses to prepare for future dynamic cyber attacks that are rapidly escalating in frequency, sophistication, and potency.

“An organization can only effectively protect its cyber assets from savvy cyber-criminals and cyber-warriors if it knows its own network architecture, cyber assets, and cyber defenses better than its adversaries do. Unfortunately, many organizations still specify their network architectures with low-fidelity and ambiguous Visio and Powerpoint diagrams, which don’t allow them to answer essential cybersecurity questions. PivotPoint’s new Cybersecurity Architecture Modeling workshop shows how to specify architectural roadmaps for migrating static, perimeter-based cyber defenses to more dynamic and aggressive cyber countermeasures, consistent with the evolving Moving Target Defense concept. Properly designed Moving Target Defenses should complement perimeter-based cyber defenses and reverse roles for cyber intruders, making them the hunted prey rather than the hunter.”

The Essential Cybersecurity Architecture Modeling Applied workshop is based on flexible learning modules that can be taken together, or blended with complementary language, architecture framework, and tool learning modules. Model-Based tool learning modules are offered for several popular visual modeling tools (Enterprise Architect™, MagicDraw™, UModel™, Visual Paradigm™, and Astah™), with new tool modules being added based on client demand. Clients can flexibly combine learning modules, and can also add adaptable Project Practicum modules, to tailor their training for their team and project needs.

The Essential Cybersecurity Architecture Modeling Applied workshop is available immediately, and the training can be delivered both onsite and online. All training can be followed up with comprehensive Consulting and Coaching services, also delivered onsite and online, to address specific team and project needs.

CUSTOM MODEL-BASED SOLUTIONS, CYBERML, CYBERSECURITY MODELING LANGUAGE and ESSENTIAL CYBERSECURITY ARCHITECTURE MODELING APPLIED are trademarks of PivotPoint Technology Corporation. UML and OMG SYSML are trademarks of the Object Management Group. ENTERPRISE ARCHITECT is a trademark of Sparx Systems Pty Ltd. MAGICDRAW is a trademark of No Magic, Inc. UMODEL is a trademark of Altova. VISUAL PARADIGM is a trademark of Visual Paradigm International. ASTAH is a trademark of Change Vision, Inc. All other trademarks are the property of their respective owners.

This article was originally distributed on PRWeb. For the original version including any supplementary images or video, visit

PivotPoint Technology Corporation

+1 (760) 728-9747

Source link

Most Popular

To Top