
Cyber Tactical Battle MapsTM
Build it right. Defend it always.
Where cyber practitioners battle threat actors through defensible architecture and engineering decisions.
Join architects and engineers worldwide shaping the future of cybersecurity through technical concepts, models, and our Defensible 10 Standards.

The Threat Map Experience
Brief, design, build, and demonstrate.
Every engagement begins with a threat actor briefing and a scenario hook that establishes constraints and objectives. The team then maps the likely compromise path and responds with a defensible design that can be scored and improved.
Three Card Systems
Our Cyber Capstones use Threat Vector Catalog cards to describe compromise paths, Threat Actor cards to anchor realistic behavior, and Defensible Engineering Catalog cards to guide the selection and placement of defensive mechanisms. This creates a repeatable language for training, evaluation, and executive reporting.

The Map Is the Battlefield
Architecture diagrams drive every decision.
Tactical Battle Maps treats architectural design as the primary instrument of cyber defense. Practitioners diagram the environment, mark trust boundaries and critical flows, overlay threat vectors, and produce a defensible build plan that identifies what must be protected and how it will be protected.

Get Started
For the School of Engineering Cyber Defense
Enroll in your program pathway and complete your capstone inside the Cyber War Center when you reach the submission stage.
Enroll as a Student | Learn About Capstones.
For Organizations
Contact us below to choose a simulation track and set your annual readiness and evaluation plan.
Activate your tech teams' ISAUnited membership | Member organizations receive discounted rates.



