The EU Holds Its First Cyber War Game Exercise

European Union defense ministers have been taking part in a simulated cyber-attack exercise for the first time to practice strategic decision making and crisis-management under pressure of a mock cyber-attack against the bloc’s military structures.

The two-hour war game exercise, named EU CYBRID 2017, was held in Tallinn, Estonia, where the EU defense ministers were recently meeting for informal discussions on a range of security issues.

Cyber-attacks targeting and damage civilian infrastructure, such as power-plants, was not included in this particular exercise. Although recent malware activity, such as the Wannacry ransomware attacks, which locked some UK hospitals out of their IT systems and led to operations being canceled, likely contributed to the decision to run the exercise, said a minister of defense spokeswoman.She said the fictitious scenario focused on threats to military operations in the Mediterranean.

According to Reuters the exercise involved the EU’s naval mission in the Mediterranean being sabotaged by hackers who cripple the mission’s command on land while also launching a campaign on social media to discredit EU operations and provoke protests.

The exercise was generally aimed at giving ministers the chance to practice situational awareness, crisis management and strategic communication between member states, with the overarching goal of moving towards establishing a policy guideline for the European Union to adopt in the event of such a cyber war situation.

Increasing defense ministers’ awareness about the potential scale of risks posed by cyber-attacks appears to be an early take-away from the exercise, according to the spokeswoman.

“What we’ve seen is that the ministers were very interested in it, and it gave them an overview of the threat and what could happen actually because the scenario was built up in such a way that the situation is escalating,” she told us. “In the beginning it might seem like a small thing… It’s pretty hard to assess how big a deal it is. They got an overview that it can escalate to a very, very serious business and that can attack also the military operations.”

“The exercise wasn’t about finding a very concrete, one solution. It was just to get the [understanding] to watch this road,” she added, emphasising that it’s the first time such an exercise has taken place with defense ministers, and describing it as the “first step” on the road towards a better “common understanding”, which is the necessary base for the EU being able to establish guidelines to respond to (real) cyber-attacks against its military structures.

Commenting on the exercise in a statement, Estonia’s minister for defense, Jüri Luik, added: “The cyber world and cyber threats do not recognise national boundaries or the barriers between organisations.

“It is therefore important to perform joint exercises of this kind, between European Union member states as well as the EU and NATO. We must exchange information and have a common understanding, in order to ensure improved preparedness for dealing with cyber threats.”

Ein News

You Might Also Read: 

Which Countries Are Ready For Cyberwar?:

A Revolution In Warfare Made Possible By AI:

NATO Could Go To War In Response To A Cyber Attack:

 

« India’s Cyber Insurance Business Is Flourishing
Spy Chiefs Set Sights On AI And Cyber »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.