This meeting was run as a Webinar which was combined with the official launch of the amazing new Cyber College Cymru initiative.
Bridgend College, in partnership with Coleg Gwent and the University of South Wales, were launching a scheme which will start in September 2020 that will form a new qualification in cyber security. The initiative will offer learners hundreds of hours of industry input with big-name industry partners and members of the Cyber Wales Ecosystem(that means you!).
The Cyber College Cymru launch started at 17:30 and there were introductory talks by Admiral, Thales and Fujitsu and, to provide an example of cyber learning in action, there was a follow-along walk-through of the infamous WannaCry Randsomware by Leanne Davies from Cyber Wales, Cyber Security Lecturer at Glyndwr University (using Immersive Labs).
After a Q&A the Launch event closed and the web-session flowed seamlessly into the CTF Cluster meeting where we continued the WannaCry theme with a walk-through of another Immersive Lab on how to find and trip the Kill Switch in the WannaCry source code delivered by Jason from Cyber Wales and the North Wales CYber Cyber Securoty Cluster.
We were also treated to a session from Cyber Wales member Nick Lambe from Gordalex, who is ex-military intelligence who talked about how getting the basics of OSINT right can be a lot more powerful that you might think - especially around associations and the wider OSINT environment - and he used a real live example to illustrate his points.