New Rhode Island cyber range prepares students for real world danger lurking in cyberspace

South_agency via Getty Images

State leaders celebrated at a “powering up” ceremony at Rhode Island College Wednesday for a new state-of-the-art cyber range, where students gain hands-on learning experience to prevent and respond to cyber threats.

This story was originally published by the Rhode Island Current.

Picture this: You work for a cybersecurity team at a company that’s just had its network filleted open by a cyberattack. Your company’s CEO is calling. The press is calling. Other assorted stakeholders are calling with their immediate concerns. 

That was roughly the intense and hectic scenario described by Douglas Alexander, the director of Rhode Island College’s (RIC) Institute for Cybersecurity & Emerging Technologies, during a Wednesday walkthrough with press and state leaders of the institute’s new cyber range.

“As we all know, sometimes under pressure, we all don’t respond at our best,” Alexander said. 

The new cyber range is designed to help students learn how to perform within the unique gravity and demands of these scenarios in a more realistic way via staged cyber attacks. The range is the latest addition to the cyber institute, which opened in 2023 and is chaired by noted cybersecurity sage and former congressman Jim Langevin, who shared progress images of the range with Gov. Dan McKee earlier this year.

“I felt I was looking at ‘Star Wars’ or something like that,” McKee said during a public ceremony for the range’s grand opening before the walkthrough. 

The range relies on IBM’s Cloud Range platform to simulate cyberattacks and teach students how to respond to them. Simulations displayed as tiles on a screen at the range Wednesday sported difficulty levels ranging from novice to advanced, with titles pulled from real threat actors’ strategies or broader tactics like ransomware or website defacements. 

The Pawtucket-based firm LLB Architects — also enlisted recently by the Department of State to conduct a feasibility study for a state archives building — designed the classroom, which accommodates up to 24 students across four workstations. Each workstation has six computers, outfitted with Dell monitors and Alienware mice and keyboards that, on Wednesday at least, glowed with a futuristic blue. The room’s ceiling is outfitted with LED fixtures in similarly glowing hues, and the front wall sports a 24-foot-wide by 4-foot-tall screen that plays out the simulations.

The cyber range’s network is also isolated from the rest of the RIC network, to prevent spillover of any malware to other computers on campus. The school is also making it available to outside parties for “single-session engagements, annual multi-exercise programs, and comprehensive incident response plan stress tests,” according to an institute press release.

I felt I was looking at ‘Star Wars’ or something like that.

– Rhode Island Gov. Dan McKee

RIC is the third school to use the cyber range as part of the IBM Cyber Campus program, which is the company’s partnership with Cloud Range, the latter’s founder and CEO Debbie Gordon confirmed in an email Wednesday.

Wednesday’s ceremony also included a “powering up” — an electrified equivalent of a ribbon cutting, in which McKee and other state and university leaders joined together to press a big blue button before the cyber range’s 24-foot-wide screen lit up for ostensibly the first time.

Alas, the room has already seen some use this semester, Lindsay Russell, a spokesperson for RIC’s cyber institute, confirmed over phone Wednesday. 

But students and faculty have largely “been dipping their toes in,” Russell said, acquainting themselves with the space, and by next semester the classroom will be more fully integrated into the institute’s curriculum. 

The range’s home is on the first floor of Alger Hall. RIC intends, however, to move the simulation space to Whipple Hall once the renovations there are complete — including about $73 million for the makeovers drawn from the funds voters authorized via a 2024 ballot measure.

More Pressure on State and Local Leaders

During the speaking program before the cyber range’s ceremonial powering on, retired U.S. Rear Adm. Mark Montgomery highlighted the need for cybersecurity education amid looming and numerous international threat actors which are beginning to target U.S. infrastructure more and more frequently. 

“Really complicating this is that right now, Washington is tied up,” Montgomery said. “They’re tied up in knots, and they’re not able to proceed on a lot of these issues. So in my mind, that means the solutions have to push down to the state and local level, to the academics, to the nonprofits, to push these issues, to think of the solutions to drive change.” 

Alexander echoed that sentiment during his demonstration, and recalled a recent “60 Minutes” special that detailed how Littleton, a town of about 10,000 in western Massachusetts, had its electric and water utility system hacked by Volt Typhoon, a prolific cyber crime outfit with ties to the People’s Liberation Army Cyberspace Force. The U.S. Cybersecurity and Infrastructure Agency (CISA) first issued an advisory on the group in 2023, outlining Volt Typhoon’s playbook and its purported sponsorship by the People’s Republic of China, which has denied any connections to the group.

Volt Typhoon primarily uses living-off-the-land techniques, according to Microsoft and CISA. That means embedding within a network’s existing administrative toolbox to limit logging, avoid detection and then run scripts as needed. The group is known to use Windows’ native command line to gain a foothold in government and infrastructure networks. 

Volt Typhoon is also one of the simulations available in Cloud Range’s portfolio of exercises at RIC. It’s an advanced level simulation.

“This is the sword of Damocles that China has hanging over us, is ‘We could shut down your critical infrastructure, if we wanted to,’” Alexander said. “That is a heck of a leverage.”

But one does not have to go as far as Beijing or even as close as Massachusetts to find high-profile instances of cybercrime. Alexander gave the now canonical example of a large-scale data breach in Rhode Island, RIBridges. The breach of the state’s public benefits and health insurance marketplace in 2024 siphoned personal information of approximately 650,000 Rhode Islanders from state servers, which Alexander called “a fairly traumatic event for a sizable number of Rhode Island citizens.”

Two of the state’s top IT officials who wrestled with that breach — Chief Information Officer Brian Tardiff and Chief Information Security Officer Nathan Loura — attended Wednesday’s event. Both men left by the time Alexander gave his demo in the cyber range, which gave him permission to sing Tardiff and Loura’s praises. 

A wall-mounted screen in RIC’s cyber range displays the room’s camera feed during a walkthrough on Wednesday, Oct. 15, 2025. The smaller displays can be used for video calls and remote participation during drills. (Photo by Alexander Castro/Rhode Island Current)

“They actually were very proud of their command center and how they responded internally to that attack,” Alexander said. “It was a brutal time. It was clearly not optimal for them, but they pulled together.” 

Alexander credited Tardiff and Loura’s performance on the backend of the incident response as grounded in the pair’s “pre-existing relationships with each other that even predated their positions at the state.”

“Now, we still need to get their team in here to really test that out, because we’ve got some advanced scenarios so that could put them to the test,” Alexander said of the state IT team.

That teamwork is what hardens a war room against attack, Alexander said. The cyber range is geared toward giving students “a fairly immersive, pressure filled situation,” he said, which will replicate the intensity of a real-time cyberattack, rather than the abstraction of tabletop scenarios. 

Alexander likened tabletop scenarios to a game of Dungeon & Dragons — a pattern of action and response with a predictable pace, something lacking the “hands-on” experience a simulation can provide. 

“Those poor professional skills are often the make or break differentiator between a successful defense and a failed defense, or an attack that goes on for too long,” Alexander said.

The cyber range’s post-scenario evaluations include a rubric to indicate the quality of teamwork during a given exercise. Perhaps a team does well overall, but individual members didn’t communicate well with others or had conflicts that impacted their work.

“These are all very human responses, especially under pressure,” Alexander said. “But if we can do that in a safe space…we’re much better off than if that happens in a real life attack.”

Rhode Island Current is part of States Newsroom, a nonprofit news network supported by grants and a coalition of donors as a 501c(3) public charity. Rhode Island Current maintains editorial independence. Contact Editor Janine L. Weisman for questions: info@rhodeislandcurrent.com.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.