National Teams Engage In NATO’s Annual Cyber Challenge

More than 1,000 international cyber defenders and decision-makers will take part in Locked Shields 2019. This is organised by the NATO Cooperative Cyber Defence Centre of Excellence in Estonia, the event uses a game-based approach, enabling participants to take on roles in fictional response teams. 

Their goal is increase awareness and improve understanding of decision makers and IT experts and to be able to assess an IT crisis situation, maintain services and defend networks that have fallen victim to cyber-attacks. 

Participants train as national cyber rapid reaction teams that are deployed to assist Berylia in handling a large-scale cyber-incident. While the aim of the tech game is to maintain the operation of various systems under intense pressure, the strategic part addresses the capability to understand national coordination mechanisms, law enforcement options and strategic communication.

In the exercise scenario, the fictitious country Berylia faces coordinated cyber-attacks against its civilian infrastructure, while it is holding national elections.

The job of NATO’s team will be to help contain the damage and protect the networks from further attacks. The exercise takes place in a laboratory environment. Cyber exercises like Locked Shields are valuable opportunities for national and NATO cyber experts to practice protecting their IT systems and critical infrastructure against severe cyber-attacks. 

This kind of training also promotes understanding and cooperation between civilian and military experts and decision-makers involved in responding to cyber threats.

NATO:             SC Magazine

You Might Also Read:

NATO Live-Fire Cyber Exercise:                              

Cyber Attribution Could Tear Apart NATO:

 

« The Quantum Computer Threat To Encryption Should Be Taken Seriously
Thales Spends £4.8Bn To Deliver Full - Range Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

Motive Managed Services

Motive Managed Services

Motive Managed Services take the complexity out of IT, Cybersecurity, and Network Operations, so you can focus on growing your business.