'Cyber Ranges' Improve Corporate Security

Accenture has recently started some practice ranges in which companies can test how they respond to cyber-attacks. These new "cyber ranges" are focused on helping industrial companies in the oil and gas, chemicals, utilities, and manufacturing industries to improve their cybersecurity.

What are Cyber-Ranges

A cyber range is a virtual environment that is used for cyberwarfare training and cyber technology development. It provides tools that help strengthen the stability, security and performance of cyberinfrastructures and IT systems used by government and military agencies.

Cyber ranges function like shooting or kinetic ranges, facilitating training in weapons, operations or tactics. Thus, cyber warriors and IT professionals employed by various agencies train, develop and test cyber range technologies to ensure consistent operations and readiness for real world deployment.

Accenture’s Ranges

Each site is a controlled, interactive, and hyper-realistic environment for cybersecurity training and software development used to assess network and other technical vulnerabilities of industrial control systems (ICS).

Such systems are commonly used to automate processes in critical infrastructure industries, such as utilities, petrochemicals, oil and gas, and industrial manufacturing.

One of the ranges, sited inside Accenture's Industry X.0 Innovation Center in Essen, Germany, is dedicated to the utilities and chemicals industries, with a particular focus on electric distribution networks and chemical plants.

The other two ranges have been established on American soil. The first, located in Accenture’s Cyber Fusion Center in Washington, DC, is aimed specifically at helping companies in the utilities industry learn how to protect themselves from threat actors. The second US cybersecurity testing facility has been opened up inside one of Accenture's innovation hubs in Houston, Texas. Named the Industrial Control Systems (ICS) Cyber Range, this site is intended to support leading oil and gas companies in their cybersecurity efforts.

Early next year, Accenture will open its first ICS Cyber Fusion Center, also in Houston, Texas. The center, which is currently under construction, is being created with the intention to help the company's clients protect their industrial networks and plants assets better.

"The energy industry has the largest installed base of industrial control systems around the world, and the cyber risk has never been greater," Luis Luque, ICS cybersecurity global lead at Accenture Security tol Infosecurity Magzine,

Accenture:       Infosecurity Magazine:      Techopedia:  

You Might Also Read:

Five Features Of The Changing Threat Landscape:

 

 

 

« Manufacturing And The Industrial IoT
The Growing Cost Of Cyber Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

MultiQoS

MultiQoS

MultiQoS is a software development company that provides web and mobile app development solutions. We deliver business IT solutions and related services to customers worldwide.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.