Christmas Is Cancelled: EU Running A Big Cyberwar Simulation

Public and private sector cyber officials from 30 European nations have kicked off a massive cyber war game that includes hacks against internet-connected infrastructure and the cyber-induced blackout of an entire nation—during Christmas, no less.

The two-day war game, known as Cyber Europe 2016, will also incorporate drones, cloud computing, cyberattacks against mobile devices and ransomware, according to a news release from the European Union Agency for Network and Information Security, known as ENISA.

In a ransomware attack, hackers seize and scramble an organization’s records and won’t unscramble them unless the organization pays up.

This is the EU’s third biennial cyber exercise. The exercises revolve around fictional scenarios including cyberattacks that technology, policy and political leaders must respond to.

The 2014 exercise scenario, for example, centered on a series of increasingly sophisticated cyberattacks aimed at destabilizing EU energy markets and preventing EU leaders from passing a new tax to promote green energy, according to an after-action report.    

The 2016 scenario, for the first time, will include simulated news coverage and social media responses aimed at “bringing in the public affairs dimension associated with cyber crises” and “increasing realism to a level never seen before in cybersecurity exercises,” ENISA said.  

ENISA shared few details about the 2016 scenario beyond the Christmas season attack. The agency did, however, release a slick video announcing the exercise that appears to portray a cyberattack against a nation’s electricity grid, replete with lightning flashes, sweaty brows, flashing computer code and an ominous figure in a hoodie. One scene in the video shows the lights going out across an urban landscape.

All 28 EU member nations will participate in the exercise along with Switzerland and Norway, ENISA said. Participants come from more than 300 organizations, including nations’ cybersecurity agencies, EU offices, internet, software and cloud computing companies, the agency said.

An after action report on the exercise is due out in 2017. The biennial exercises are vital to help EU member nations stay prepared to combat evolving cyber threats, ENISA Director Udo Helmbrecht said in a statement.

“We are better prepared than we were, but that does not mean we have done enough and the work must continue,” Helmbrecht said. He added that “cyberattacks are more sophisticated than before” and “cybersecurity is not a state it is a process.”

NextGov:
 

 

« Using The Internet Competitor Analysis Effectively (£)
Meet The Fancy Bears »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.