CyStar

Add Your Heading Text Here

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Filter by Categories
Article
Bootcamp
Ceremony
Hackathon
Workshop
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Filter by Categories
Article
Bootcamp
Ceremony
Hackathon
Workshop

IITM Cyber Netrik

Offensive Strategies for Defensive Readiness!
Cyber Range Training for Banking CISOs, CIOs, CTOs and their teams, SOC members, and security practitioners to secure cloud and hybrid environments

In today’s evolving threat landscape, passwords, policies, and passive tools are no longer enough. Cyberattacks are increasingly exploiting cloud identities, automation pipelines, endpoint misconfigurations, and hybrid environments – with devastating consequences.

The Cyber Netrik by IIT Madras is a hands-on, immersive training program designed for senior technology and security leaders in the Banking sector. This is not a classroom lecture – it’s a live-fire simulation environment where you’ll walk through the attacker’s playbook to strengthen your own defense.

Program Structure

  • Dates: Friday, July 18 – Saturday, July 19, 2025
  • Duration: 2 Full Days
  • Format: In-person, guided, hands-on labs
  • Mode: Fully interactive, team-based learning
  • Trainers: Security researchers and practitioners from academia and industry
Participants will engage with simulated real-world attack environments, using the same tactics, techniques, and procedures (TTPs) employed by advanced threat actors — all within a safe and ethical lab setting.

Program Curriculum

Identity & Credential Threats in Enterprise Environments (Cloud & On-prem)

Abusing Cloud Automation & Platform Services

Endpoint and Enterprise Device Exploitation

Hybrid Identity & Active Directory Attacks

Multi-Factor Authentication Bypass Techniques

Cross-Cloud Attack Paths and Token Replay Techniques

Full Attack Chain Simulation in Azure

Threat Detection and Hunting Across Cloud Platforms

Web Application Vulnerabilities Enabling Cloud Exploits

IAM Role Misuse and Privilege Escalation in AWS

Red Team vs Blue Team Exercise

Hardening and Security Best Practices

Note: The modules listed are indicative and may vary based on time constraints and participant profiles. Facilitators will strive to ensure a high-impact learning experience tailored to the cohort, but may not cover every listed scenario in every session. Modules will be selected to best match the cohort’s background, expertise, and interests and maximize practical learning.

Program Schedule

Day 1: Understanding the Adversary

Time Session
10:00 – 10:30 Welcome & Opening Remarks
10:30 – 11:30 Intro: Adversary Mindset – How Hackers Think
11:30 – 11:45 Tea Break
11:45 – 13:00 Session -1
13:00 – 14:00 Lunch Break
14:00 – 15:30 Session -2
15:45 – 17:15 Session -3
17:15 – 18:00 QnA over Tea

Day 2: Detection, Response & Defense

Time Session
09:00 – 10:15 Session -4
10:15 – 11:30 Session -5
11:30 – 11:45 Tea Break
11:45 – 13:00 Session -6
13:00 – 14:00 Lunch Break
14:00 – 15:00 Session -7
15:00 – 17:30 Session -8
17:30 – 18:00 Feedback & Wrap-Up

Why Participate?

  • Curated by Experts at IIT Madras using insights from real-world red team and cloud security research
  • Focused on Banking threats entailing high-impact and financially motivated attack vectors
  • Built for CISOs, CIOs, CTOs and their teams, SOC members, and security practitioners, this hands-on Cyber Range empowers leaders to defend today’s enterprise environments (including cloud & on-prem)
  • Stay ahead of threats with exposure to attacker tradecraft and develop defense strategies

Requirements and Prerequisites

IIT Madras will provide access to a secure, cloud-hosted Cyber Range environment, including backend infrastructure, guided lab scenarios, and real-world attack simulations.

Participants are required to bring the following:

  • A personal laptop (latest version preferred)
  • Administrative privileges on the device (to allow installation of VPN and any required tools or configurations)
  • Basic familiarity with Windows and Linux environments
  • Mode: Comfort using the command line interface (CLI) on both platforms
  • Google Chrome or Microsoft Edge browser installed
There are no strict prerequisites for this workshop. It is designed for professionals across roles – CISOs, CIOs, CTOs and their teams, SOC members, and security practitioners – in cybersecurity, IT, and risk within the Banking sector. Whether you’re technical or strategic, if you work with digital systems and care about securing them, you’re in the right place.

All you need is an open mind, curiosity, and a willingness to learn and engage with real-world challenges. The hands-on exercises are guided, and no prior offensive security experience is required.

Registration

This is a closed-door, limited-capacity cohort curated exclusively for leaders and professionals in the banking and financial sector. As part of our foundational rollout, participation is by invitation only.

Deadline: Sunday, July 13th, 2025, 11:59 PM IST
[To ensure commitment, a refundable caution deposit of INR 5,000 is collected.]

Contact Us

For any questions or clarifications, feel free to reach out to us at info@cystar.iitm.ac.in
Follow us for updates and announcements:

Sponsors

IDBI Bank

Information Security Education and Awareness

MeitY

Scroll to Top