'Cyber Ranges' Improve Corporate Security

Accenture has recently started some practice ranges in which companies can test how they respond to cyber-attacks. These new "cyber ranges" are focused on helping industrial companies in the oil and gas, chemicals, utilities, and manufacturing industries to improve their cybersecurity.

What are Cyber-Ranges

A cyber range is a virtual environment that is used for cyberwarfare training and cyber technology development. It provides tools that help strengthen the stability, security and performance of cyberinfrastructures and IT systems used by government and military agencies.

Cyber ranges function like shooting or kinetic ranges, facilitating training in weapons, operations or tactics. Thus, cyber warriors and IT professionals employed by various agencies train, develop and test cyber range technologies to ensure consistent operations and readiness for real world deployment.

Accenture’s Ranges

Each site is a controlled, interactive, and hyper-realistic environment for cybersecurity training and software development used to assess network and other technical vulnerabilities of industrial control systems (ICS).

Such systems are commonly used to automate processes in critical infrastructure industries, such as utilities, petrochemicals, oil and gas, and industrial manufacturing.

One of the ranges, sited inside Accenture's Industry X.0 Innovation Center in Essen, Germany, is dedicated to the utilities and chemicals industries, with a particular focus on electric distribution networks and chemical plants.

The other two ranges have been established on American soil. The first, located in Accenture’s Cyber Fusion Center in Washington, DC, is aimed specifically at helping companies in the utilities industry learn how to protect themselves from threat actors. The second US cybersecurity testing facility has been opened up inside one of Accenture's innovation hubs in Houston, Texas. Named the Industrial Control Systems (ICS) Cyber Range, this site is intended to support leading oil and gas companies in their cybersecurity efforts.

Early next year, Accenture will open its first ICS Cyber Fusion Center, also in Houston, Texas. The center, which is currently under construction, is being created with the intention to help the company's clients protect their industrial networks and plants assets better.

"The energy industry has the largest installed base of industrial control systems around the world, and the cyber risk has never been greater," Luis Luque, ICS cybersecurity global lead at Accenture Security tol Infosecurity Magzine,

Accenture:       Infosecurity Magazine:      Techopedia:  

You Might Also Read:

Five Features Of The Changing Threat Landscape:

 

 

 

« Manufacturing And The Industrial IoT
The Growing Cost Of Cyber Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.