Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

ENISA Issues Report on ‘Cyber Europe 2010’ Cyber Security Exercise

The European Network and Information Security Agency (ENISA), Europe’s cyber security agency, today released its final report on the first Pan-European cyber security exercise, “Cyber Europe 2010”. The exercise was conducted back in November 2010 as a way to trigger communication and collaboration between countries and as a step for strengthening Europe’s cyber defenses in the event of large-scale cyber-attacks.

The European Network and Information Security Agency (ENISA), Europe’s cyber security agency, today released its final report on the first Pan-European cyber security exercise, “Cyber Europe 2010”. The exercise was conducted back in November 2010 as a way to trigger communication and collaboration between countries and as a step for strengthening Europe’s cyber defenses in the event of large-scale cyber-attacks.

Cyber Europe 2010 – Evaluation ReportThroughout the exercise, over 70 cyber defense experts from various public bodies worked together to defend over 300 simulated cyber attacks aimed at paralyzing the Internet and critical online services across Europe. Included in the exercise was a simulated loss of Internet connectivity between the countries, that required cross-border cooperation to avoid a (simulated) total network crash.

ENISA noted that during the exercise, there were a few minor technical and communication problems. For example, some injects were delayed or slowed, along with some minor difficulties with the use of government emails in combination with VPNs. The agency suggested that in the future, dedicated exercise hardware, as well as adherence to strict requirements that would be communicated beforehand, could help in eliminating the technical issues. Additionally, the agency noted that communication between those involved didn’t always work well due to language barriers. However, one of the objectives of the exercise was to identify the level of the communication capability between responders.

Evaluation of the exercise was conducted at three levels: National, Pan-European, and Overall.

According to the report’s key findings:

• Member States’ Information Technology bodies communicate in a wide variety of ways. Harmonization of standard operating procedures would lead to more secure and efficient communications between them.

• The ability of participants to find the relevant points of contact within organizations varied. In the event of a real crisis, some 55 % of countries were not confident they would be able to quickly identify the right contact, even with the available directories.

• Participants were evenly divided about if a ‘Single Point of Contact’ (SPOC) or ‘Multiple Points of Contact’ (MPOC) would be better. A SPOC would be easier; however, realistically today there are multiple points of contact. Having MPOC also avoids there being a single point of failure.

The report’s main recommendations include that:

• Europe should continue to hold exercises in Critical Information Infrastructure Protection (CIIP): 86% of the participants found the ‘dry run’ either ‘very’ or ‘extremely’ useful.

• The ‘Lessons Identified’ should be exchanged with those holding other (national or international) exercises.

• Member States should be well organized internally by, for example, developing and testing national contingency plans and exercises. European countries are organized nationally in a variety of ways. Given the differences in structures and process, it is vital to know whom to contact. The dialogue on the necessity of a SPOC or MPOC at the EU level should continue, and ENISA can be the facilitator of this.

• A roadmap for pan-EU exercises should be created. This would include a definition of standard procedures and structures for large scale events

The exercise didn’t attempt to simulate the actions of the private sector, nor did it attempt to engage participants in acting as the private sector. EINISA did note, however, that after the exercise it was almost unanimously agreed that in order to achieve more realistic exercises, the private sector must be involved in future, giving the exercises a broader scope and being more realistic, enabling testing measures beyond cross country communication.

The full report can be downloaded here. (47-Pages PDF)

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.