RU

Global cooperation exercise for tackling digital threats

22
days
22
hours
22
minutes
22
seconds

LEFT TO GO

Watch Livestream

Concept

Commitment to increase the level of international cooperation between industries through extensive cyber exercise. The course is focused on determining methods of identifying cybersecurity incidents as well as developing tactics for responding to them and mitigating damage in the aftermath of an attack. Further attention is also directed at upgrading technical and structural cooperation.


Training Goals

1

Set roles and tasks

Galvanize cooperation between cybersecurity divisions to ensure efficient exchange of information in practice

2

Assess the efficiency of processes

Upgrading processes used for sharing information on cyberthreats, improvement of strategies used for identifying cybersecurity incidents and development of methods for incident response and mitigation

3

Outline areas for development

Producing suggestions for improving cooperation in concerted efforts when responding to large-scale cyberattacks.

WATCH LIVESTREAM

Attack and Defence Teams

Red Team

To fulfill the role of the aforementioned threat actors the organizers assign a team who’s responsibility it is to prepare the infrastructure for playing out each cyberattack scenario launched in accordance with the plan of action on the day of the training. Threat actor activities are regulated by the Training Coordination Centre. The assigned team is located in Moscow, at the BI.ZONE office.

Blue Team

The role of defence is to be enacted by the actual cybersecurity divisions of participating organizations, which have to be notified of the events in advance. As part of preparation for the training exercises, each organization appoints a person responsible for prepping the technical infrastructure side of the exercise and managing team relations within their company, employing necessary resources in each phase.

Training Infrastructure Layout

The dedicated segment must be connected to event monitoring and incident analysis as a separate IT system, in order to allow SOC to use real tools and processes.
This needs be so, as it is necessary to achieve maximum similarity with every-day situations, just as it is necessary to distance away from synthetic scenarios, in order to evaluate the effectiveness of measures in practice, and provide recommendations for improving them.

Participants

Organizers

Red Team

Livestream Subscription

Subscriber's full name

Company

Position held at the company

Email

By submitting this information the user gives permission to handle their personal data, which will enable the user to receive updates and notifications from the Cyber Polygon website

Your message has been sent

Thank you for expressing interest. Please, standby for our specialists to contact you shortly.