Locked Shields: NATO Holds Major Cyber-Security Drill

CommsInf_300.jpg

Organized by the NATO Cooperative Cyber Defense Center of Excellence the largest cybersecurity exercise ever held in Estonia is underway. More than 400 computer experts and teams from 16 countries, as well as the NATO Computer Incident Response Capability (NCIRC), will participate in the cybersecurity drill, dubbed Locked Shields 2015.

Colonel Artur Suzik, director, NATO Cooperative Cyber Defense Center of Excellence said, “Locked Shields prepares computer emergency response specialist for the ever-changing cyber security landscape. Uniquely, we use realistic technologies, networks, and attack methods.”

New technologies added to the cybersecurity drill annually
Col. Suzik added that new technologies and attack vectors were added every year to keep the cybersecurity drill at pace with real-world developments. Last year, Android devices, IP cameras, and VoiP attacks were added to the cybersecurity exercises.

The Locked Shields 2015 included ICS/SCADA Systems, Windows 8 and 10 operating systems and an element of active defense, according to Col. Suzik. He explained that the cybersecurity drills is scenario-based.

The NATO Cyber Defense Center of Excellence started the annual cybersecurity drill in 2010. The Government of Canada provided the financial grant for Locked Shield 2015. The grant will be used to purchase technical equipment for the cyber lab and supporting services to increase the capacity of the cybersecurity drill.

President Barack Obama and other world leaders decided to boost partnerships in cyber defense capabilities during a NATO summit in September. The world leaders also warned that a cyberattack against NATO members could trigger a collective defense response similar to a military aggression.

NATO advances efforts against cyber threats
NATO is advancing its efforts to address the wide range of cyberattacks targeting its networks on a daily basis. According to the organization, protecting its communications and information systems (CIS) is an urgent task given the growing sophistication of cyberattacks. According to NATO, its cybersecurity program highlights the following:

1.    Cyber defense is part of NATO’s core task of collective defense. NATO approved its first cyber defense policy in January 2008 following the cyberattacks against Estonia.
2.    NATO is responsible for the protection of its communication networks.
3.    Nations are and remain responsible for the security of their communications networks that need to be compatible with NATO’s and with each other.
4.    Allies are committed to enhancing information sharing and mutual assistance in preventing, mitigating and recovering from cyberattacks.
5.    NATO is intensifying its cooperation with industry.
6.    NATO enhances its capabilities for cyber education, training and exercises.

Separately, the U.S. Army and Estonia soldiers are part of the NATO Tornado military drills. According to RT News, NATO will use a laser training system to simulate actual battles during the military drills, which is the largest in the history of Estonia.

Almost 2,000 Estonian soldiers and divisions of US paratroopers will start the five-day Tornado drills, which will demonstrate the level of their readiness for larger Siil [Hedgehog] military exercises,” according to General Staff of Estonia’s Defense Forces. In May, 13,000 soldiers will participate in the Siil war games.

According to the report, NATO will use different versions of the Multiple Integrated Laser Engagement System (MILES) during the Tornado drills. The presence of the US soldiers in the Baltic region is part of the Atlantic Resolve, which demonstrates the commitment of the United States to NATO members across Eastern Europe. The US is committed to international training and security cooperation.

Russia’s General Staff, Lieutenant General Andrey Kartapolov noted that the operational combat training activities of NATO near the borders of the country increased by 80% last year. According to him, the military drills have a “clear anti-Russian orientation.”

Valuewalk

 

« Russian Hackers Have Been Reading Obama’s Emails
UK Rail Signals Can Be Hacked To Cause Crashes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

RecoLabs

RecoLabs

Reco’s proprietary AI technology dynamically maps business interactions within your collaboration tools to identify sensitive assets shared and uncover incidents that are relevant to your business.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe