Dear All WP9 Partners,
The SPARTA days in Rome take place the next week, with the main WP9 event at 13:30 on Wednesday 25th. The goal of the meeting is to present the achievements done so far by each partner and to get synchronised.
Although I hope most of you will join us personally at 13:30 at the official SPARTA WP9 event, I’d like to ask you to confirm your attendance and also suggest other times, when you are available (for a telco, at least): https://doodle.com/poll/kyurn6gbqmaacqip <https://doodle.com/poll/kyurn6gbqmaacqip>
Your feedback will help me to organise a more productive event.
Thank you!
Jan Hajny
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
Dear WP9 Partners,
Soon, we will be starting activities focused on practical training and lab federations. Furthermore, we will be working on better hands-on training environments.
At this moment, I’d like to ask you about your experience with cyberrange software tools. Does anyone has any experience? What tools are you using to realise your cyberranges?
Anyone uses open tools, like Open-Source AWS Cyber Range or Open Cyber Challenge Platform?
Thank you,
Kind regards,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
Hi,
For your information, ECSO is launching a campaign to gather information
on simulation based competence development. Since the mail says it has
been released in collaboration with SPARTA, some of you might be aware
of it.
I believe it would be great if you sent the link to the SPARTA partners?
Jan, can you see if there is a plan to share the link with other part
Best regards,
olivier
-------- Forwarded Message --------
Subject: [edu-aware] New survey with EC Pilots on simulation based
competence development: deadline: 5th October
Date: Wed, 18 Sep 2019 11:55:50 +0200
From: Nina Olesen <nina.olesen(a)ecs-org.eu>
To: edu-aware(a)ecs-org.eu
Dear WG5 members,
As you may have seen on our social media channels, we have just released
a survey on simulation based competence development in collaboration
with the EC pilot projects ECHO, SPARTA, CONCORDIA and CyberSec4Europe.
The survey is aimed at the European cybersecurity community at large so
please spread the word (and fill it in yourself of course😉). The more
responses we get, the better solutions we will be able to deliver to fit
the needs of European organisations in raising cyber resilience and
awareness. The link is as follows https://bit.ly/2kOjjka and the
deadline for responses is 5th October.
Twitter post: https://twitter.com/ecso_eu/status/1173927205375791110
LinkedIn post:
https://www.linkedin.com/posts/ecso-cyber-security_cybersecurity-activity-6…
The ECHO project will consolidate the responses to the survey and
produce an analysis paper in collaboration with ECSO and the other
pilots of the Competence Centre Network. A first output is expected at
the beginning of November 2019.
Many thanks in advance for your support.
Kind regards,
Nina Olesen
Senior Policy Manager
European Cyber Security Organisation (ECSO)
10, Rue Montoyer
1000 –Brussels
Belgium
Tel : +32 (0) 2 777 02 51
Mob : +32 (0) 486 05 37 87
E-mail : <mailto:nina.olesen@ecs-org.eu> nina.olesen(a)ecs-org.eu
Website : <http://www.ecs-org.eu/> www.ecs-org.eu
ECSO is registered at the EU Transparency registry: 684434822646-91
Dear WP9 members,
On October 22nd, I will be at Brussels for an ECSO WG5 meeting. Several
points on the agenda (see the attached file) are interesting for WP9. I
will of course write some notes to share with the group, but I might
need some input from you, especially from the task leaders, to better
represent SPARTA at the meeting.
Here is my wish list:
- WP9: a short executive summary of WP9 activities (Jan from BUT has
planned to write something and the task leaders will review it)
- T9.1: as recently discussed with L3CE, if you have a document to
share, or a survey to broadcast, ECSO WG5 might be an interesting forum.
Don't hesitate to send me something before October 22nd.
- T9.2: we are planning a telco to prepare the discussion about the
new ENISA cybersecurity education map, but I think we might have
something to prepare/discuss about cyberranges; I believe the point
might start with the first results of the survey I sent you a link to
earlier, but if you think of other ideas, I can be your spokesman.
- T9.3: I think we might still not have many information/results to
share at this moment with ECSO.
- T9.4: The task will not have started yet.
However, regarding T9.4, I believe you might be interested in an
Awareness Workshop they organized in June (I'll send you a link to the
documents).
Best regards,
olivier
Thank you Algimantas,
Do you think that your CyberRange can be replicated by other partners and used to create a federated infrastructure hosted at multiple labs at different countries?
In WP9, we have mostly resources for integration and deployment, not for software development. Though, we should run the pilot for such a federated infrastructure.
Than you,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
> 12. 9. 2019 v 8:35, Algimantas Venckauskas <algimantas.venckauskas(a)ktu.lt>:
>
> Dear Jan,
>
> KTU have a lot of experience in conducting cyber range exercises in the public and education sectors. We have been conducting a similar type of cyber exercise for four years. Cyber security exercise Cyber range take place in Lithuania. Over 300representatives of more than 40 Lithuanian state, cyber incident management and investigation, scientific, energy, communications operators, and other agencies, will practice responding to cyber incidents at the exercise.
>
> Roles. Targeted to public and private sectors that manage the country’s information resources or critical infrastructure. Cyber protection, network defence, forensic analysis, tactics, techniques and procedures defence against cyber-attacks, hackers, or other criminals
>
>
> <image003.jpg>
> The roles of Cyber Range exercise general infrastructure
>
> Blue Team: friendly forces. Real-life system administrators and computer security specialists.
> Red Team: hostile forces. Almost no limitations on virtual battlefield.
> Green Team: technical infrastructure. Designs, hosts network infrastructure
> White Team: game management. Writes game scenario, rules, scoring system. Makes in-game adjustments.
>
> Idea. “First and foremost, the goal of this exercise is to develop a closer cooperation in cyber security among Lithuanian institutions and to train representatives of those institutions so that they could have experience necessary for countering a real-lifecyber threat,” made by some of Our Team members. According to the Lithuanian Minister of National Defence, it is essential to hold exercises like that countrywide because cyber threats and attacks occur increasingly more often and in moresophisticated forms, while their harmful effect may damage operation of national information systems and infrastructure.
>
> <image004.png>
> The idea of topology for simulation Cyber Range virtual exercise
>
> Representatives of the participating institutions will form 50 teams and will work to protect a virtual information system created for the exercise and to ensure provision of its services. The teams will take part in the exercise from training sites in Kaunas(Lithuania) which were installed for the exercise with assistance of Kaunas University of Technology developers, who are members of our team.
> Prevention, detection and management of cyber incidents during the exercise will be implemented on the basis of the endorsed national cyber security management plan and organisation and technical cyber security requirements.
> The next exercise can be organised with Development of the LITNET’s IT services for the education and research institutions (CERT LITNET).
>
> What tools are we using to realise our cyber ranges?
>
> OpenStack can replicate your network infrastructure, offering rich, multi-segment virtual replicas of enterprise IT and OT networks that include application servers, database servers, email servers, Scada (based on modbus protocol). There are no mobile phones or switches We can help to prototyping training environment to include the exact cybersecurity tools your team uses every day, including SIEM, Firewall, endpoint security, or forensic tools, to achieve hyper-realistic training in real-life settings.
>
> Based on the KTU Cybersecurity Exercise Framework, we are proposing to build the Pilot of Cyber training & exercise Framework (Ct&eF, D9.4) of the SPARTA project.
> By developing Ct&eF, other tools, like Open-Source AWS Cyber Range or Open Cyber Challenge Platform, can be used and / or integrated.
>
>
> Regards,
> Algimantas Venčkauskas
>
> From: network.training-awareness <network.training-awareness-bounces(a)server.sparta.eu> On Behalf Of Jan Hajny
> Sent: Friday, September 6, 2019 4:43 PM
> To: SPARTA WP9 ML <network.training-awareness(a)internal.sparta.eu>
> Subject: [SPARTA - network.training-awareness] CyberRange Tools
>
> Dear WP9 Partners,
>
> Soon, we will be starting activities focused on practical training and lab federations. Furthermore, we will be working on better hands-on training environments.
>
> At this moment, I’d like to ask you about your experience with cyberrange software tools. Does anyone has any experience? What tools are you using to realise your cyberranges?
>
> Anyone uses open tools, like Open-Source AWS Cyber Range or Open Cyber Challenge Platform?
>
> Thank you,
> Kind regards,
>
> Jan
>
> ——
> doc. Ing. Jan Hajný, Ph.D.
> Advanced Cybersecurity
> Brno University of Technology
> Phone: +420 541 146 961
> WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
Dear WP9 Members,
Please let me inform you that we updated the study program overview templates. The main change is that we distinguish mandatory and voluntary subjects now.
You can find the current templates on SVN and attached.
If you already finished the analysis using the old templates, we will handle the update, just let us know.
Finally, please let me remind you that the deadline for delivering the study program overview is close - Q3/2019.
Thank you,
Kind regards,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz