NATO Cyber War Games 2017: Czechs Win

The Czech Republic team wins the largest and most complex international live-fire cyber defence exercise Locked Shields 2017.  The Estonian team and NATO Computer Incident Response Capability (NCIRC) team from NATO take second and third place respectively.

The defensive team from Czech Republic also takes home the special prize for the scenario inject. NCIRC team scored the highest in the legal game of the exercise, while the German team came out on top of forensic challenges and the team from the United Kingdom achieved the highest scores in handling the strategic communication challenges

The US team scored the most improved in this year's NATO Locked Shields cyber war games, but experts said that result might not be reason to celebrate.

The Locked Shields event is a "live-fire" cyber defense exercise organised by the NATO Cooperative Cyber Defence Centre of Excellence in which teams are "tasked to maintain the services and networks of a military air base of a fictional country, which, according to the exercise scenario, will experience severe attacks on its electric power grid system, unmanned aerial vehicles, military command and control systems, critical information infrastructure components and other operational infrastructures."

During the cyber war games, there were more than 2,500 possible attacks that could be carried out against more than 3,000 virtualised systems meant to simulate military air command and control systems, drone and ground control, a large-scale SCADA system controlling the power grid and programmable logic controllers.

Nathaniel Gleicher, head of cyber-security strategy at Illumio and former director of cyber-security policy for the White House, said this type of cyber war practice is "essential to effective cyber-security."
"Exercises like this are an important way that security teams can build experience for real threats. The Locked Shields war game is interesting in that it focuses entirely on defense: teams compete to protect their networks, with third parties playing the intruders," Gleicher told SearchSecurity. "This is an especially useful form of wargame, defense is much more difficult than offense, and any opportunity our teams get to improve their skills in defense is a great opportunity."
John Bambenek, threat research manager at Fidelis Cybersecurity, said it was especially important for the cyber-war games to be "live-fire."
"Defenders learn best in a live-fire environment. When the 'red team' can simulate what adversarial nations are doing, that's even better," Bambenek told SearchSecurity. "Tabletop exercises can only take learning so far. Operators need valuable experience, and they need to do so under fire."

The US Army Cyber Brigade was one of 25 countries to compete in the Locked Shields 2017 cyberwar games and finished 12th, which is a marked improvement from the 2016 event where the US was last out of 19 countries participating.
However, Bambenek said "given the threats we face as a nation, we simply can't accept anything less than number one."
"That said, the improvement from last place to the middle of the pack shows an increase in capability. It also shows that they are learning. That's exactly the point of these exercises," Bambenek said and noted that enterprises should take a lesson from the games. 

"Training, particularly hands-on training, is crucial for the continued improvement and development of defenders. Enterprises should set aside funds to participate in third-party exercises so their team can practice. Always use events within an organisation as training. Successful, yet minor, breaches should not resort in blamestorming sessions. Instead, they should be used to help defenders improve."

Gleicher said the US team's results offer an important lesson, "everyone struggles with defense."
"To be honest, the cards are stacked against defenders from the beginning. The teams are placed in an unfamiliar environment to make life more difficult for them, but the truth is that most defenders are operating in an unfamiliar environment anyway because most organisations understand surprisingly little about the applications that they are protecting,"

Gleicher said. "If there's any lesson from this exercise and others like it, it's that we need to substantially increase our ability to understand and control the environments we are protecting."

SearchSecurity:   NATO CCDCOE:     

You Might Also Read: 

Forget Trident & Welcome To Cyber Warfare:

Locked Shields 2015: NATO Holds Major Cyber-Security Drill

Handbook Of Russian Information Warfare:

NATO Cyberwar: Establishing Rules Of Engagement:

 

 

« The Cybersecurity Threats That Keep Banks Alert
Hackers Stole A £60,000 BMW »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.