Cyber War Exercise in Central London

 

 

Forty-two amateur cyber defenders gathered on the HMS Belfast in London this week to take part in a cyber terrorist attack simulation run by the Cyber Security Challenge UK.
The competition, known as the Masterclass and developed by a group of cyber experts led by BT, is now in its fifth year and aims to plug the skills shortage currently affecting both governments and UK businesses. The competition essentially invites participants to put their skills to the test and experience a dramatized version of events faced by regular cybercrime fighting professionals. It also allows sponsors of the competition such as BT, Lockheed Martin, and Airbus, to hover on the sidelines and cherry pick the next cybercrime busting whizz kids.
In 2014, the competition took place in an underground bunker of the Churchill War Rooms, with prizes worth £100,000 going toward educational and career advancement opportunities.
This year, organizers aimed to stoke interest among both the public and would-be cyber defenders by upping the dramatic narrative of the competition. Aboard the HMS Belfast, cyber defenders competed to regain control of the naval guns system, taken over by fictitious cyber terrorist network, the Flag Day Associates.
"I wanted to design a realistic challenge that used the kind of computer systems and networks that cyber defenders have to defend in real life," Robert Partridge, Head of BT Security Academy, told WIRED UK. "But I also wanted to make it exciting and put some Hollywood into it as well," says Partridge, while noting that he wanted to "de-geekify" the image of cyber security.
"There will be more jobs than candidates for [cyber defense jobs] in the next 20 years, and we need to lift the profile of cyber securities careers in the UK to address this skills gap," he continued.
Over the course of two days (March 12 to 13), the amateur cyber defenders were tasked with finding the vulnerabilities and flaws placed in the operating system set up by the competition developers. Primarily, the competitors had to race against the clock to regain control of the ship's gun systems. Secondly, they searched for weaknesses within the IT system of fictitious physical infrastructures, such as water treatment plants and manufacturing facilities, in order to defend these against the rogue cyber terrorist group.
As countries the world over make a push to establish smart cities, the physical infrastructures sustaining our societies are increasingly under threat from cyber attacks. As more systems are brought online, maintaining the security and stability of critical national infrastructure becomes paramount.
As part of the competition, Airbus' SCADA Challenge Brief encourages competitors to conduct a security validation test in real time. This allows competitors to practice sussing out what the flaws and best cyber security solutions are before they are deployed in the real world—or in this case within the fictive one created by the challenge.
"Airbus group understands that the industrial controls system that underpin our critical national infrastructures, such as water treatment facilities, electricity grids, and our logistics and supply chains, must also be considered for the cybersecurity solutions that we bring in place," Kevin Jones, Head of Cyber Operations Research Team of Airbus Group, told WIRED UK.
"As these systems go online and become increasingly interconnected, we also need to take action to secure them," he adds. The cyber attack, which physically affected the furnaces of a German steel mine back in December 2014, demonstrates the extent to which Internet crimes are infiltrating physical structures, he explains.
"Cyber attackers are looking to perform malicious actions against such industrially controlled systems, and as security professionals, we have to make sure we're building up the defenses," adds Jones.
Ein news http://ow.ly/KIPPW

« Europe’s Data Privacy Laws Annoy US Tech Companies
Jobs for Cyber Superstars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

FaceFirst

FaceFirst

FaceFirst provide face recognition technology solutions to detect and deter real time threats,

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.