ANS Finland performed a cybersecurity exercise with JYVSECTEC 24 -25 January 2018. The aim of the exercise was to test the operation modes of the organization in accordance with the company specifications, learn to identify cyber risks and communicate with our co-operation partners.
Cyber incidents can be prepared for and threats mitigated through technology and technical expertise of personnel. Not all threats can be completely stopped beforehand. When technology and expertise of personnel are in good order then actions during a cyber-attack can be effectively exercised.
JYVSECTEC’s cyber range RGCE has been in development since 2011 aiming to provide a realistic exercise environment for organizations of different sizes and industry sectors. In recent years, the development has focused on building multiple business sector specific organization environments, which mimic technical and business functions of real organizations. These environments also have realistic dependencies with each other, like the cloud provider depends on connectivity provided by the internet service provider. All of the organizations are connected to the global RGCE Internet where the customers, partners and threat actors exist.
In this post, I will briefly describe each of the organizational environments and how they can be used for practicing different cyber security scenarios.
Dimecc:n Cyber Trust -projekti (http://www.cybertrust.fi) päättyi alunperin neljä vuotisesta jääden tyngäksi kaksi vuotiseksi. Tässä kirjoituksessa käyn nopeasti lävitse pääkohtia tuloksistamme ohjelmaan. En aukaise jokaista lyhennettä tähän kirjoitukseen vaan suosittelen lukijaa tutustumaan aiheeseen laajemmasta julkisesta dokumentaatiosta tämän kirjoituksen lopussa.
I am representing JAMK University of Applied Sciences in the ECSO Working Group 4 (WG4), which deals with SME issues. I participated the first WG4 meeting on December 2016. The main task for the WG4 is to support SMEs, coordination with countries (in particular East EU) and regions.