Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

200 Organizations Take Part in Largest European Cybersecurity Exercise to Date

Today, the European Union Agency for Network and Information Security (ENISA) is conducting the biggest and most complex European cybersecurity exercise to date.

Today, the European Union Agency for Network and Information Security (ENISA) is conducting the biggest and most complex European cybersecurity exercise to date.

According to the agency, more than 200 organizations and 400 experts from a total of 29 European Union and EFTA countries will participate in Cyber Europe 2014, a large-scale event that’s organized every two years. The exercise takes place at several centers all over Europe and is coordinated from a central control center.

Representatives of national CERTs, telecoms and energy companies, cyber security agencies, financial institutions, Internet service providers and other private and public sector organizations will put their skills to the test in a realistic simulation of a cybersecurity scenario.

Participants will be presented with over 2,000 incidents, including defacements, data theft, denial-of-service (DoS), intelligence and media reports on malicious cyber operations, and attacks on critical infrastructure. The goal is to test not only the procedures and capabilities of each participant, but also the effectiveness of cooperation in the European Union.

European cybersecurity exercise Cyber Europe 2014 also aims at testing the procedures related to sharing operational information in case of a cyber crisis, as outlined in the EU-Standard Operational Procedures (EU-SOPs) guide.

“Five years ago there were no procedures to drive cooperation during a cyber-crisis between EU Member States,” noted Udo Helmbrecht, ENISA’s executive director. “Today we have the procedures in place collectively to mitigate a cyber-crisis on European level. The outcome of today’s exercise will tell us where we stand and identify the next steps to take in order to keep improving.”

The exercise has three stages: technical, operational/tactical, and strategic. The first phase, which involves detection, investigation, mitigation and information exchange in case of a cyber incident, was completed in April. The third phase, focusing on strategic objectives, will take place in early 2015.

Today’s exercise, which represents the second phase, tests the ability of participants to deal with crisis assessment, alerting, coordination, cooperation, tactical analysis, advice and information exchange at operational level.

Advertisement. Scroll to continue reading.

“The sophistication and volume of cyber-attacks are increasing every day. They cannot be countered if individual states work alone or just a handful of them act together,” said Neelie Kroes, the vice president of the European Commission. “I’m pleased that EU and EFTA Member States are working with the EU institutions with ENISA bringing them together. Only this kind of common effort will help keep today’s economy and society protected.”

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Training & Awareness

Google has announced a new training program for cybersecurity analysts and those who graduate will get a professional certificate from Google.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet