Biggest EU cyber security exercise taking place today
Posted on 28 April 2014.
Today European countries kick off the Cyber Europe 2014 (CE2014), a sophisticated cyber exercise, involving more than 600 security actors across Europe.

More than 200 organizations and 400 cyber security professionals across Europe join forces. Twenty-nine EU and EFTA countries are participating.

In this phase, participants are called upon to resolve several technical cyber security incidents, similar to recent real life cases. In this context, exercise players from the public (Cyber security Agencies, national/governmental CERTs, Ministries and Institutions) and private (Energy and Telecommunications) sectors are asked to investigate and analyze several scenarios which could impact the confidentiality, integrity or availability of sensitive information or critical infrastructures.

The exercise is organized bi-annually by the European Union Agency for Network and Information Security in cooperation with all EU Member States and the European Free Trade Association (EFTA). Compared to the previous two exercises, executed in 2010 and 2012, Cyber Europe 2014 has grown considerably in scope, scale and complexity. It will take place in three phases: technical (today), and later during the year; at 2. operational/tactical and 3. strategic/political levels.

The Executive Director of ENISA, Professor Udo Helmbrecht, commented, “The incidents in Cyber Europe 2014 are very realistic, mimicking unrest and political crisis at a pan-European level, disrupting services for millions of citizens across Europe. Cyber Europe 2014 represents a major milestone in the efforts to strengthen cyber crisis cooperation, preparedness and response across Europe. This improves the resilience of Europe’s critical information infrastructures”.

The objectives of Cyber Europe 2014 include:
  • Testing of the existing standard cooperation procedures and mechanisms for managing cyber-crises in Europe
  • Enhance national-level capabilities
  • Explore the existing cooperation between the private and public sector
  • Analyze the escalation and de-escalation processes (technical, operational and strategic level)
  • Understand the public affairs issues linked to large scale cyber-attacks.





Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //