Locked Shields: NATO Holds Major Cyber-Security Drill

CommsInf_300.jpg

Organized by the NATO Cooperative Cyber Defense Center of Excellence the largest cybersecurity exercise ever held in Estonia is underway. More than 400 computer experts and teams from 16 countries, as well as the NATO Computer Incident Response Capability (NCIRC), will participate in the cybersecurity drill, dubbed Locked Shields 2015.

Colonel Artur Suzik, director, NATO Cooperative Cyber Defense Center of Excellence said, “Locked Shields prepares computer emergency response specialist for the ever-changing cyber security landscape. Uniquely, we use realistic technologies, networks, and attack methods.”

New technologies added to the cybersecurity drill annually
Col. Suzik added that new technologies and attack vectors were added every year to keep the cybersecurity drill at pace with real-world developments. Last year, Android devices, IP cameras, and VoiP attacks were added to the cybersecurity exercises.

The Locked Shields 2015 included ICS/SCADA Systems, Windows 8 and 10 operating systems and an element of active defense, according to Col. Suzik. He explained that the cybersecurity drills is scenario-based.

The NATO Cyber Defense Center of Excellence started the annual cybersecurity drill in 2010. The Government of Canada provided the financial grant for Locked Shield 2015. The grant will be used to purchase technical equipment for the cyber lab and supporting services to increase the capacity of the cybersecurity drill.

President Barack Obama and other world leaders decided to boost partnerships in cyber defense capabilities during a NATO summit in September. The world leaders also warned that a cyberattack against NATO members could trigger a collective defense response similar to a military aggression.

NATO advances efforts against cyber threats
NATO is advancing its efforts to address the wide range of cyberattacks targeting its networks on a daily basis. According to the organization, protecting its communications and information systems (CIS) is an urgent task given the growing sophistication of cyberattacks. According to NATO, its cybersecurity program highlights the following:

1.    Cyber defense is part of NATO’s core task of collective defense. NATO approved its first cyber defense policy in January 2008 following the cyberattacks against Estonia.
2.    NATO is responsible for the protection of its communication networks.
3.    Nations are and remain responsible for the security of their communications networks that need to be compatible with NATO’s and with each other.
4.    Allies are committed to enhancing information sharing and mutual assistance in preventing, mitigating and recovering from cyberattacks.
5.    NATO is intensifying its cooperation with industry.
6.    NATO enhances its capabilities for cyber education, training and exercises.

Separately, the U.S. Army and Estonia soldiers are part of the NATO Tornado military drills. According to RT News, NATO will use a laser training system to simulate actual battles during the military drills, which is the largest in the history of Estonia.

Almost 2,000 Estonian soldiers and divisions of US paratroopers will start the five-day Tornado drills, which will demonstrate the level of their readiness for larger Siil [Hedgehog] military exercises,” according to General Staff of Estonia’s Defense Forces. In May, 13,000 soldiers will participate in the Siil war games.

According to the report, NATO will use different versions of the Multiple Integrated Laser Engagement System (MILES) during the Tornado drills. The presence of the US soldiers in the Baltic region is part of the Atlantic Resolve, which demonstrates the commitment of the United States to NATO members across Eastern Europe. The US is committed to international training and security cooperation.

Russia’s General Staff, Lieutenant General Andrey Kartapolov noted that the operational combat training activities of NATO near the borders of the country increased by 80% last year. According to him, the military drills have a “clear anti-Russian orientation.”

Valuewalk

 

« Russian Hackers Have Been Reading Obama’s Emails
UK Rail Signals Can Be Hacked To Cause Crashes »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.

DigiGlass

DigiGlass

DigiGlass is a cutting-edge cybersecurity service provider powered by Redington Gulf, a leading technology distributor in the Middle East and Africa.