Results: NATO’s 2021 Cyber War Game

The team from Sweden ranked highest at the largest and most complex international live-fire cyber defence exercise Locked Shields 2021. Blue Teams from Finland and the Czech Republic took second and third place respectively.

The importance of international collaboration in cyber security has become increasingly evident and the 2021 exercise highlighted the growing need to enhance dialogue between technical experts, civil and military participants and decision-making levels.

The event was organised by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) based in Tallinn, Estonia. The CCDCOE integrates the technical and strategic game, enabling participating nations to practice the entire chain of command in the event of a severe cyber incident involving both civilian and military players.

 For the first time, the exercise also included satellite mission control systems needed to provide real time situational awareness to facilitate military decision-making. 

Military cyber security specialists play-out the largest cyber war game in the world, that used a fictional NATO member state of Berylia that came under attack. The scenario was based on an attack on the fictional country of Berylia and an adversary called Crimsonia that is creating some artificial islands.

In the exercise, non-NATO member “Crimsonia” attacks vital infrastructure such as water supplies and mobile networks on the island state of “Berylia,” as well as the financial sector.  In addition to maintaining more than 150 complex IT systems per team, the Blue Teams had to be efficient in reporting incidents, executing strategic decisions, solving forensic, legal and media challenges and dealing with hostile information operations. Crimsonia is also engaging in information warfare, persuading the people of Berylia that their government is responsible for a series of accidents through fake news and social media posts.

Understanding the interdependencies of national IT systems is at the heart of protecting a nation under a massive cyber attack.

The exercise tested NATO allies and other states’ abilities to protect vital services and critical infrastructure. Technical and strategic games will facilitate participating nations with whole-command-chain rehearsals in the context of a major cyber incident, affecting both military and civilian systems.

Merle Maigre, head of government relations at CybExer Technologies commented that “The exercise scenario consolidates a number of real-life situations and follows recent threat trends which show that cyber criminals are targeting vital service providers more and more often... Our critical information infrastructure companies will be extremely vulnerable in a situation where long supply chains, unclear procurement mechanisms and, more often than not, saving pennies will result in purchasing security solutions from the countries whose software and developers we never see, know or monitor.”

More than 2000 participants from 30 nations test and train their entire chain of command in the event of a severe cyber incident, ranging from the strategic to the operational and tactical levels and involving both civilian and military capabilities.

Reflecting real world cyber threats, the exercise deals with the protection of vital services and critical infrastructure that are fundamental for modern societies to operate, including critical information infrastructure, power and water supply and national defence systems.

The exercise was taking place alongside a real-world cyber defense conference in Tallinn at which NATO Deputy Secretary-General Mircea Geoana on Thursday 15th April warned that the pandemic has made countries more vulnerable to cyber attacks. “Russia and China have tried to use the COVID-19 crisis to exploit vulnerabilities, including those in cyberspace, with cyber-enabled disinformation campaigns, designed to sow distrust and division in our democratic societies,” he said.

“Congratulations to the teams, whose strategy proved to be the best, however every single participating team is a winner for tackling the unrivaled complex cyber challenges of Locked Shields exercise,” said Carry Kangur, Head of Cyber Exercises at the CCDCOE. “This year the exercise involved in total more than 5000 virtualised systems that had to be defended against over 4000 attacks.

CCDOE:   e-Estonia:     The Defense Post:       European Defence Agency:      Sky:     I-HLS:      

You Might Also Read: 

NATO Live-Fire Cyber Exercise

 

« Trump's Family Get Blocked On Facebook
Maritime Cyber Security Has Missing Parts »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.

Core42

Core42

Core42 provides a full-spectrum of AI enablement solutions covering cloud, data, cybersecurity and digital services designed for customer success.

Cybermindz

Cybermindz

Many cyber security professionals are under sustained and increasing stress. We set about providing direct support to restore and rebuild emotional and cognitive health.

Night Lion Security

Night Lion Security

Night Lion Security provides discreet and bespoke investigation and incident response recovery services.

Arms Cyber

Arms Cyber

Arms Cyber is redefining ransomware defense with advanced solutions that stop attacks before they start.

Promptfoo

Promptfoo

Promptfoo helps developers and enterprises build secure, reliable AI applications.