'Cyber Ranges' Improve Corporate Security

Accenture has recently started some practice ranges in which companies can test how they respond to cyber-attacks. These new "cyber ranges" are focused on helping industrial companies in the oil and gas, chemicals, utilities, and manufacturing industries to improve their cybersecurity.

What are Cyber-Ranges

A cyber range is a virtual environment that is used for cyberwarfare training and cyber technology development. It provides tools that help strengthen the stability, security and performance of cyberinfrastructures and IT systems used by government and military agencies.

Cyber ranges function like shooting or kinetic ranges, facilitating training in weapons, operations or tactics. Thus, cyber warriors and IT professionals employed by various agencies train, develop and test cyber range technologies to ensure consistent operations and readiness for real world deployment.

Accenture’s Ranges

Each site is a controlled, interactive, and hyper-realistic environment for cybersecurity training and software development used to assess network and other technical vulnerabilities of industrial control systems (ICS).

Such systems are commonly used to automate processes in critical infrastructure industries, such as utilities, petrochemicals, oil and gas, and industrial manufacturing.

One of the ranges, sited inside Accenture's Industry X.0 Innovation Center in Essen, Germany, is dedicated to the utilities and chemicals industries, with a particular focus on electric distribution networks and chemical plants.

The other two ranges have been established on American soil. The first, located in Accenture’s Cyber Fusion Center in Washington, DC, is aimed specifically at helping companies in the utilities industry learn how to protect themselves from threat actors. The second US cybersecurity testing facility has been opened up inside one of Accenture's innovation hubs in Houston, Texas. Named the Industrial Control Systems (ICS) Cyber Range, this site is intended to support leading oil and gas companies in their cybersecurity efforts.

Early next year, Accenture will open its first ICS Cyber Fusion Center, also in Houston, Texas. The center, which is currently under construction, is being created with the intention to help the company's clients protect their industrial networks and plants assets better.

"The energy industry has the largest installed base of industrial control systems around the world, and the cyber risk has never been greater," Luis Luque, ICS cybersecurity global lead at Accenture Security tol Infosecurity Magzine,

Accenture:       Infosecurity Magazine:      Techopedia:  

You Might Also Read:

Five Features Of The Changing Threat Landscape:

 

 

 

« Manufacturing And The Industrial IoT
The Growing Cost Of Cyber Crime »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Obrela Security Industries (OSI)

Obrela Security Industries (OSI)

Obrela manage cyber exposure, risks, and compliance. We identify, predict and prevent cyber threats, in real time. As a service, personalized, on demand.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Digital Forensics Myanmar

Digital Forensics Myanmar

Digital Forensics Myanmar is the first blog for digital forensics in Myanmar. This blog describes basic digital forensics technology and outlines a first responder guide in the Myanmar language.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.