First EU Cyber Defence Exercise

EU Defence Ministers participate in “EU CYBRID 2017”, a strategic table-top cyber defence exercise. The exercise, the first of its kind, is organised by the Estonian Presidency of the Council of the European Union, the Estonian Ministry of Defence and the European Defence Agency (EDA). 
 
In the simulation, hackers sabotaged the EU’s naval mission in the Mediterranean and launched a campaign on social media to discredit the EU operations and provoke protests. 
 
Each of the defense ministers tried to contain the crisis over the course of the 90-minute, closed-door exercise in Tallinn that officials sought to make real by creating mock news videos giving updates on an escalating situation. German Defence Minister Ursula von der Leyen said the “extremely exciting” war game showed the need for EU governments to be more aware of the impact of cyber-attacks on critical infrastructure in the EU.
 
EU CYBRID 2017
The objective of EU CYBRID 2017 is to raise awareness of cybersecurity incident coordination at political level and of the potential effects of offensive cyber-campaigns. It focuses on situational awareness, crisis response mechanisms and strategic communication. 
 
Cyber is widely recognised as a major threat in the EU’s Common Security and Defence Policy (CSDP), yet there has been limited attention to EU missions and operations’ resilience. 
 
To address cyber threats in CSDP, Estonia organised in cooperation with the European Defence Agency a strategic table-top cyber-exercise “EU CYBRID 2017” for EU Ministers of Defence during their informal meeting in Tallinn on 7 September 2017. 
“Cyber, the fifth domain of warfare, must be given as much attention as land, air, sea and space. There is no 100% protection in cyber. It is imperative that EU Defence Ministers test their cyber defence mechanisms. The buy-in of Member States is key for the EU to have the necessary skills, technology and capabilities”, Jorge Domecq, Chief Executive of the European Defence Agency, said.
 
The scope of the exercise is crisis response to a major offensive cyber campaign against EU military structures in a hybrid warfare context. The objectives of the exercise are: 
 
• Situational awareness. Use the EU Intelligence and Situation Centre (INTCEN) to ensure a common understanding of the crisis and the impact of hybrid attacks on EU military structures and to give initial assessment/context for the cyber-campaign. 
• Crisis Response. Raise awareness of the instruments available to the EU in to give strategic guidance on the response to a major offensive cyber-campaign against CSDP structures in a hybrid warfare context. 
• STRATCOM. To coordinate initial messages among EU Member States at political level. 
• Cyber defence. Raise awareness on cybersecurity incident coordination at political level and demonstrate potential effects of offensive cyber-campaigns. 
• Trigger discussions at Council level with a view to examine possible measures in response to specific events, drawn from the crisis scenario. 
 
About the Exercise
EU CYBRID 2017 is a table-top cyber exercise focused on strategic choices and considerations at the EU ministerial level. The goal of the exercise is to highlight a number of strategic concerns and topics that arise in connection with any hypothetical cyber crisis. This exercise should serve as a forum for discussion at ministerial level and provide strategic guidance to address future crises. The exercise scenario included an orchestrated cyber-attack campaign against an EU-led military operation affecting both an EU Headquarter in Rome (OHQ Rome) and its subordinated maritime assets. 
Multiple cyber-attacks covering a range of cyber threats combined with other incidents took place over the course of the exercise. The exercise scenario refers to fictitious countries, organisations and operations. 
 
Cyber Defence and the European Defence Agency
Cyber defence is one of the priorities of the EDA’s capability development plan and of the NATO-EU Joint Declaration. A project team consisting of EDA and its participating Member States' representatives is responsible for jointly developing cyber defence capabilities within the EU CSDP, supported by R&T experts. 
 
The Agency’s main focus is on supporting member states in building a skilled military cyber defence workforce and in ensuring the availability of proactive and reactive cyber defence technology. The EDA for example develops, pilots and delivers a variety of cyber security & defence courses and exercises from basic awareness over expert level to decision maker training.
 
European Defence Agency:           Reuters
 
You Might Also Read: 
 
NATO Cyber War Games 2017: Czechs Win:
 
Cybercrime In The EU -  Where Are You Safe?:
 

 

 

 

 
 
 
« The New GDPR Rules Focus On Consumer Protection
In Demand: Cybersecurity Specialists »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

BlackScore

BlackScore

BlackScore is a technology company seeking to disrupt risk assessment using AI-driven technology.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Labyrinth Technology

Labyrinth Technology

Labyrinth Technology is an IT support company based in London specialising in cyber security for small to medium sized businesses.

Kloke

Kloke

Kloke specializes in data protection solutions, focusing on securing information over locations.