{"id":190622,"date":"2017-05-02T22:43:26","date_gmt":"2017-05-03T02:43:26","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nato-cyberwar-games-shows-the-u-s-needs-more-practice-techtarget\/"},"modified":"2017-05-02T22:43:26","modified_gmt":"2017-05-03T02:43:26","slug":"nato-cyberwar-games-shows-the-u-s-needs-more-practice-techtarget","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nato-2\/nato-cyberwar-games-shows-the-u-s-needs-more-practice-techtarget\/","title":{"rendered":"NATO cyberwar games shows the U.S. needs more practice &#8211; TechTarget"},"content":{"rendered":"<p><p>    The U.S. team scored the most improved in this year's NATO    Locked Shields cyberwar games, but experts said that result    might not be reason to celebrate.  <\/p>\n<p>    The Locked Shields event is a \"live-fire\" cyberdefense exercise    organized by the NATO Cooperative Cyber Defence Centre of    Excellence in which teams are \"tasked to maintain the services    and networks of a military air base of a fictional country,    which, according to the exercise scenario, will experience    severe attacks on its electric power grid system, unmanned    aerial vehicles, military command and control systems, critical    information infrastructure components and other operational    infrastructure.\"  <\/p>\n<p>    During the cyberwar games, there were more than 2500 possible    attacks that could be carried out against more than 3000    virtualized systems meant to simulate military air     command and control systems, drone and ground control, a    large-scale     SCADA system controlling the power grid and     programmable logic controllers.  <\/p>\n<p>    Nathaniel Gleicher, head of cybersecurity strategy at Illumio    and former director of cybersecurity policy for the White    House, said this type of cyberwar practice is \"essential to    effective cybersecurity.\"  <\/p>\n<p>    \"Exercises like this are an important way that security teams    can build experience for real threats. The Locked Shields war    game is interesting in that it focuses entirely on defense:    teams compete to protect their networks, with third parties    playing the intruders,\" Gleicher told SearchSecurity. \"This is    an especially useful form of wargame -- defense is much more    difficult than offense, and any opportunity our teams get to    improve their skills in defense is a great opportunity.\"  <\/p>\n<p>    John Bambenek, threat research manager at Fidelis    Cybersecurity, said it was especially important for the        cyberwar games to be \"live-fire.\"  <\/p>\n<p>    \"Defenders learn best in a live-fire environment.When the    'red team' can simulate what adversarial nations are doing,    that's even better,\" Bambenek told    SearchSecurity.\"Tabletop    exercises can only take learning so far.Operators    need valuable experience, and they need to do so under fire.\"  <\/p>\n<p>    The U.S. Army Cyber Brigade was one of 25 countries to compete    in the Locked Shields 2017 cyberwar games and    finished 12th, which is a marked improvement from the 2016    event where the U.S. was last out of 19 countries    participating.  <\/p>\n<p>    However, Bambenek said \"given the threats we face as a nation,    we simply can't accept anything less than number one.\"  <\/p>\n<p>    \"That said, the improvement from last place to the middle of    the pack shows an increase in capability. It also shows that    they are learning.That's exactly the point of these    exercises,\" Bambenek said and noted that enterprises should    take a lesson from the games. \"Training, particularly hands-on    training, is crucial for the continued improvement and    development of defenders.Enterprises should set aside    funds to participate in third-party exercises so their team can    practice. Always use events within an organization as    training.Successful, yet minor, breaches should not    resort in blamestorming sessions. Instead, they should be used    to help defenders improve.\"  <\/p>\n<p>    Gleicher said the U.S. team's results offer an important lesson    -- \"everyone struggles with defense.\"  <\/p>\n<p>    \"To be honest, the cards are stacked against defenders from the    beginning. The teams are placed in an unfamiliar environment to    make life more difficult for them, but the truth is that most    defenders are operating in an unfamiliar environment anyway,    because most organizations understand surprisingly little about    the applications that they are protecting,\" Gleicher said. \"If    there's any lesson from this exercise and others like it, it's    that we need to substantially increase our ability to    understand and control the environments we are protecting.\"  <\/p>\n<p>    Learn about the benefits of a     cybersecurity training center.  <\/p>\n<p>    Find out why pen testing should     focus on risk not box-ticking.  <\/p>\n<p>    Get info on how cyberwar games are beneficial to     test enterprise security.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/searchsecurity.techtarget.com\/news\/450418089\/NATO-cyberwar-games-shows-the-US-needs-more-practice\" title=\"NATO cyberwar games shows the U.S. needs more practice - TechTarget\">NATO cyberwar games shows the U.S. needs more practice - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The U.S. team scored the most improved in this year's NATO Locked Shields cyberwar games, but experts said that result might not be reason to celebrate. The Locked Shields event is a \"live-fire\" cyberdefense exercise organized by the NATO Cooperative Cyber Defence Centre of Excellence in which teams are \"tasked to maintain the services and networks of a military air base of a fictional country, which, according to the exercise scenario, will experience severe attacks on its electric power grid system, unmanned aerial vehicles, military command and control systems, critical information infrastructure components and other operational infrastructure.\" During the cyberwar games, there were more than 2500 possible attacks that could be carried out against more than 3000 virtualized systems meant to simulate military air command and control systems, drone and ground control, a large-scale SCADA system controlling the power grid and programmable logic controllers <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nato-2\/nato-cyberwar-games-shows-the-u-s-needs-more-practice-techtarget\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94882],"tags":[],"class_list":["post-190622","post","type-post","status-publish","format-standard","hentry","category-nato-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190622"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=190622"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190622\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=190622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=190622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=190622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}