Dear All,
As T9.1 is approaching the final stage and most of the work is done, the
team would like to invite all interested SPARTA partners to the final
alignment workshop.
The workshop is intended to be organized as one day or two half days event
on-site at MRU. Preliminary agenda is attached. Those, who can join the
workshop remotely, connection will be organized.
The preliminary dates set are 6th / 7th of November (preliminary 5th was
set, but it was moved). Please, mark your interest and availability on:
https://doodle.com/poll/2diuwnzbunwvmtmm until the 25th of October.
We would like to have as many participants on-site. Presence of
cybersecurity end user organizations is especially relevant (e.g. NASK, LMT,
KTU Litnet). We will also invite some associated partners (NCC group) and
other national and international organizations (ECSO, Lithuanian
Cybersecurity center, Lithuanian Arm forces CERT, etc.).
The introductory materials for the workshop are also attached to the message
(also available at SVN).
Best regards,
Edmundas & T9.1 team
Dear All WP9 Partners,
The SPARTA days in Rome take place the next week, with the main WP9 event at 13:30 on Wednesday 25th. The goal of the meeting is to present the achievements done so far by each partner and to get synchronised.
Although I hope most of you will join us personally at 13:30 at the official SPARTA WP9 event, I’d like to ask you to confirm your attendance and also suggest other times, when you are available (for a telco, at least): https://doodle.com/poll/kyurn6gbqmaacqip <https://doodle.com/poll/kyurn6gbqmaacqip>
Your feedback will help me to organise a more productive event.
Thank you!
Jan Hajny
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
Dear WP9 Partners,
Soon, we will be starting activities focused on practical training and lab federations. Furthermore, we will be working on better hands-on training environments.
At this moment, I’d like to ask you about your experience with cyberrange software tools. Does anyone has any experience? What tools are you using to realise your cyberranges?
Anyone uses open tools, like Open-Source AWS Cyber Range or Open Cyber Challenge Platform?
Thank you,
Kind regards,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
Hi,
For your information, ECSO is launching a campaign to gather information
on simulation based competence development. Since the mail says it has
been released in collaboration with SPARTA, some of you might be aware
of it.
I believe it would be great if you sent the link to the SPARTA partners?
Jan, can you see if there is a plan to share the link with other part
Best regards,
olivier
-------- Forwarded Message --------
Subject: [edu-aware] New survey with EC Pilots on simulation based
competence development: deadline: 5th October
Date: Wed, 18 Sep 2019 11:55:50 +0200
From: Nina Olesen <nina.olesen(a)ecs-org.eu>
To: edu-aware(a)ecs-org.eu
Dear WG5 members,
As you may have seen on our social media channels, we have just released
a survey on simulation based competence development in collaboration
with the EC pilot projects ECHO, SPARTA, CONCORDIA and CyberSec4Europe.
The survey is aimed at the European cybersecurity community at large so
please spread the word (and fill it in yourself of course😉). The more
responses we get, the better solutions we will be able to deliver to fit
the needs of European organisations in raising cyber resilience and
awareness. The link is as follows https://bit.ly/2kOjjka and the
deadline for responses is 5th October.
Twitter post: https://twitter.com/ecso_eu/status/1173927205375791110
LinkedIn post:
https://www.linkedin.com/posts/ecso-cyber-security_cybersecurity-activity-6…
The ECHO project will consolidate the responses to the survey and
produce an analysis paper in collaboration with ECSO and the other
pilots of the Competence Centre Network. A first output is expected at
the beginning of November 2019.
Many thanks in advance for your support.
Kind regards,
Nina Olesen
Senior Policy Manager
European Cyber Security Organisation (ECSO)
10, Rue Montoyer
1000 –Brussels
Belgium
Tel : +32 (0) 2 777 02 51
Mob : +32 (0) 486 05 37 87
E-mail : <mailto:nina.olesen@ecs-org.eu> nina.olesen(a)ecs-org.eu
Website : <http://www.ecs-org.eu/> www.ecs-org.eu
ECSO is registered at the EU Transparency registry: 684434822646-91
Dear WP9 members,
On October 22nd, I will be at Brussels for an ECSO WG5 meeting. Several
points on the agenda (see the attached file) are interesting for WP9. I
will of course write some notes to share with the group, but I might
need some input from you, especially from the task leaders, to better
represent SPARTA at the meeting.
Here is my wish list:
- WP9: a short executive summary of WP9 activities (Jan from BUT has
planned to write something and the task leaders will review it)
- T9.1: as recently discussed with L3CE, if you have a document to
share, or a survey to broadcast, ECSO WG5 might be an interesting forum.
Don't hesitate to send me something before October 22nd.
- T9.2: we are planning a telco to prepare the discussion about the
new ENISA cybersecurity education map, but I think we might have
something to prepare/discuss about cyberranges; I believe the point
might start with the first results of the survey I sent you a link to
earlier, but if you think of other ideas, I can be your spokesman.
- T9.3: I think we might still not have many information/results to
share at this moment with ECSO.
- T9.4: The task will not have started yet.
However, regarding T9.4, I believe you might be interested in an
Awareness Workshop they organized in June (I'll send you a link to the
documents).
Best regards,
olivier
Thank you Algimantas,
Do you think that your CyberRange can be replicated by other partners and used to create a federated infrastructure hosted at multiple labs at different countries?
In WP9, we have mostly resources for integration and deployment, not for software development. Though, we should run the pilot for such a federated infrastructure.
Than you,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
> 12. 9. 2019 v 8:35, Algimantas Venckauskas <algimantas.venckauskas(a)ktu.lt>:
>
> Dear Jan,
>
> KTU have a lot of experience in conducting cyber range exercises in the public and education sectors. We have been conducting a similar type of cyber exercise for four years. Cyber security exercise Cyber range take place in Lithuania. Over 300representatives of more than 40 Lithuanian state, cyber incident management and investigation, scientific, energy, communications operators, and other agencies, will practice responding to cyber incidents at the exercise.
>
> Roles. Targeted to public and private sectors that manage the country’s information resources or critical infrastructure. Cyber protection, network defence, forensic analysis, tactics, techniques and procedures defence against cyber-attacks, hackers, or other criminals
>
>
> <image003.jpg>
> The roles of Cyber Range exercise general infrastructure
>
> Blue Team: friendly forces. Real-life system administrators and computer security specialists.
> Red Team: hostile forces. Almost no limitations on virtual battlefield.
> Green Team: technical infrastructure. Designs, hosts network infrastructure
> White Team: game management. Writes game scenario, rules, scoring system. Makes in-game adjustments.
>
> Idea. “First and foremost, the goal of this exercise is to develop a closer cooperation in cyber security among Lithuanian institutions and to train representatives of those institutions so that they could have experience necessary for countering a real-lifecyber threat,” made by some of Our Team members. According to the Lithuanian Minister of National Defence, it is essential to hold exercises like that countrywide because cyber threats and attacks occur increasingly more often and in moresophisticated forms, while their harmful effect may damage operation of national information systems and infrastructure.
>
> <image004.png>
> The idea of topology for simulation Cyber Range virtual exercise
>
> Representatives of the participating institutions will form 50 teams and will work to protect a virtual information system created for the exercise and to ensure provision of its services. The teams will take part in the exercise from training sites in Kaunas(Lithuania) which were installed for the exercise with assistance of Kaunas University of Technology developers, who are members of our team.
> Prevention, detection and management of cyber incidents during the exercise will be implemented on the basis of the endorsed national cyber security management plan and organisation and technical cyber security requirements.
> The next exercise can be organised with Development of the LITNET’s IT services for the education and research institutions (CERT LITNET).
>
> What tools are we using to realise our cyber ranges?
>
> OpenStack can replicate your network infrastructure, offering rich, multi-segment virtual replicas of enterprise IT and OT networks that include application servers, database servers, email servers, Scada (based on modbus protocol). There are no mobile phones or switches We can help to prototyping training environment to include the exact cybersecurity tools your team uses every day, including SIEM, Firewall, endpoint security, or forensic tools, to achieve hyper-realistic training in real-life settings.
>
> Based on the KTU Cybersecurity Exercise Framework, we are proposing to build the Pilot of Cyber training & exercise Framework (Ct&eF, D9.4) of the SPARTA project.
> By developing Ct&eF, other tools, like Open-Source AWS Cyber Range or Open Cyber Challenge Platform, can be used and / or integrated.
>
>
> Regards,
> Algimantas Venčkauskas
>
> From: network.training-awareness <network.training-awareness-bounces(a)server.sparta.eu> On Behalf Of Jan Hajny
> Sent: Friday, September 6, 2019 4:43 PM
> To: SPARTA WP9 ML <network.training-awareness(a)internal.sparta.eu>
> Subject: [SPARTA - network.training-awareness] CyberRange Tools
>
> Dear WP9 Partners,
>
> Soon, we will be starting activities focused on practical training and lab federations. Furthermore, we will be working on better hands-on training environments.
>
> At this moment, I’d like to ask you about your experience with cyberrange software tools. Does anyone has any experience? What tools are you using to realise your cyberranges?
>
> Anyone uses open tools, like Open-Source AWS Cyber Range or Open Cyber Challenge Platform?
>
> Thank you,
> Kind regards,
>
> Jan
>
> ——
> doc. Ing. Jan Hajný, Ph.D.
> Advanced Cybersecurity
> Brno University of Technology
> Phone: +420 541 146 961
> WWW: http://crypto.utko.feec.vutbr.cz <http://crypto.utko.feec.vutbr.cz/>
Dear WP9 Members,
Please let me inform you that we updated the study program overview templates. The main change is that we distinguish mandatory and voluntary subjects now.
You can find the current templates on SVN and attached.
If you already finished the analysis using the old templates, we will handle the update, just let us know.
Finally, please let me remind you that the deadline for delivering the study program overview is close - Q3/2019.
Thank you,
Kind regards,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz
Dear all,
I would like to ask you for the inputs on T9.1 implementation as described
below:
At this stage we are reviewing all Cybersecurity Skills Framework Model
relevant EU, non-EU and national documents, initiatives and other materials.
This is made in order:
* To align our activities with other initiatives;
* Avoid duplication of action;
* Identify best practice, to be used as a background for further
activities.
For this we need your insights on relevant documents. Attached (also
available in SVN under T9.1) file contains primary list of documents.
Please add any documents or links you know (can be just some identification
and send by mail to me or put in the file or the file on SVN) that can be
relevant to cybersecurity skills topic.
There is also space for national documents, if any is available at your
country (e.g. we use materials of call for training of National
cybersecurity centre as a base for identification of gaps).
We plan to have the final list by the end of August.
Note: updated work plan T9.1 is also available in SVN.
Best regards,
Edmundas
Dear WP9 members,
Here are some notes about an ECSO (European Cyber Security
Organisation) meeting I attended last week (Wednesday June 19th) in
Brussels. The meeting was about WG5 which deals with awareness,
skills, education and training in cybersecurity (the exact scope of
SPARTA WP9).
I am sorry to have written rather long minutes for the day, but I
believe some pointers might be useful for SPARTA WP9. I added comments
using brackets, beyond what was discussed on Wednesday.
I am at your disposal for any comments and I plan to share the
documents I will be allowed to with you as soon as I get them.
Best regards,
olivier
= CyberRange =
The first item discussed was about cyber ranges, which, as you know,
are being developed in many institutions and training centers.
== CR14 : NATO Cyber Range (A. Rebane - Estonia Ministry of Defence) ==
A. Rebane presented the CR14, facilities located in the center of
Tallin, consisting of 10 classrooms.
Estonia has been organizing LockShield, a massive annual exercise (24
teams across different countries, of 15 people each) for several years.
With their infrastructure, they mainly target governments, but also
industry and academia. In particular, they opened a new program this
year called Open Cyber Range for SMEs and startups
Later this year, they will organize an exercise to show how to
federate cyber ranges across countries.
One aof the four pilot, ECHO, has a package on federation of
cyberranges. ECSO WG5 has been invited by ECHO on July 12th (in
Brussels) to a meeting on the topic. [At this time, I don't plan to
attend].
== Draft paper on definition of cyber ranges ==
ECSO plans to produce a paper on cyber ranges. The table of contents
is a WIP, but it should be available for comments soon (in July).
The goal is a 10 to 20-page document with definitions, guidelines on
how to mount a cyber range, business models and legal/ethical aspects.
== Cyber range workshops and collaboration with EC Pilots ==
There is work in progress with the EDA (European Defence Agency) about
cyberrange federation.
As a side note, ECSO representatives told us they will act as a
coordinator between the 4 pilots and the commission, especially when
it comes to trainings/cyberranges.
There was an argument about the word defence, since the ECSO Board of
Directors firmly said that they should not work on military/offensive
aspects of cyberranges. This may change in the future and we might be
able to work with industrial in the defense industry in a more open
fashion.
To be able to work more easily, we will use the paper to include a
glossary in the draft paper.
= Education and training activities (Parish Rathod) =
A recent study tells that 142,000 professionals are missing in Europe
(350,000 in 2022), 63% of the businesses questionned need more staff,
and 59% of the companies are currently considered at risk.
We are thus facing a challenge to get the competent workforce. A lot
of efforts has already benn put, but they are scattered.
In Fance, we have trainings, but we need them to more attractive (a
recent initiative was discussed at ECSO general assembly concerning
10-18-year-old students)
In Italy, they have a 1-year training but it might be too long, since
we need people now.
CSI (Cyber Security Initiative) in Ireland aims at teaching hygiene
for small businesses (since it is difficult to have them in
trainings). They are looking at webinars. Moreover, leadership people
are not always technical people and they are lost in the
lingo. Academia has been asked to deliver trainings with industry
content (part-time trainings) and they mostly use online resources.
Italy also has cyberchallenge.it for students (16-23 years old).
The goal of the presentation is to push for an initiative, Towards
European Cybersecurity Professional Education and Training Framework.
Among the questions asked, we wondered how we could homogenize ECTS,
skills frameworks, etc. between countries? For skills, there is the
European Competence Framework... One big question is how can we
compare different trainings (e.g. masters degree) in differente
countries?
[Of interest for WP9 is a white paper on Gaps in Education &
Professional training
(https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf)]
There is currently existing certifications
- CISSP (see below)
- Certified Ethical Hacker
- Pentest and Security Analysis certificates
- Some Finnish certifications?
- CompTIA
[I need to get the slides to be more precise about these certifications,
but at the time of writing, I did not receive them yet.]
The presentation also presented a paper on online cybersecurity
education and professional training [There again, I did not have time
to take the reference, but I will ammend the minutes as soon as
possible].
== ENISA / education mapping ==
ENISA is starting a new task on training and education database. ECSO
agreed to collaborate on this with ENISA. It would certainly be useful
that the four EC pilots also participate. There is some information
available at
https://www.enisa.europa.eu/topics/cybersecurity-education/nis-in-education…
[This might be useful for SPARTA T9.2 and perhaps for T9.3. We should
try and be consistent with the ENISA templates if possible?]
= EHR4CYBER =
The afternoon was dedicated to the EHR4CYBER Workshop. The EHR4CYBER
task force aims at producing a body of knowledge and skills to enable
setting up education and training programs, and to verify skills in
programs.
The related initiatives are :
- US NICE Framework
- Australian approach
- Cybok
- CEN e-CF (http://ecompetences.eu/wp-content/uploads/2014/02/European-e-Competence-Fra…)
- ENISA work on education mapping
[These documents might be of interest for T9.1, but also T9.2 and T9.3]
To define a minimum skill set for cybersecurity, European Digital
Competence Framework (developed by GRC)
The goal could be to define EU-wide minimum curricula for
cybersecurity with 3 different levels:
- secondary vocational
- bachelor
- master
=> but we should still leave room for the different specialisations
of universities and training centers
== Word from the pilots ==
ECHO, Sparta and Concordia were represented at the meeting. We were
asked to present our position.
For Sparta, I presented the different work packages and a high-level
description of our goals in WP9. One immediate feed back was an
invitation to not neglect existing documents (from ECSO, ENISA and
other reports).
Concerning education and training, Concordia is working on CyberRanges
and aims at building a European ecosystem for cybersecurity. Here are
some Their target is not only technical people. Currently, they have a
map with the courses handled by Concordians. They are also trying to
gather what is needed on the market, to then develop micro masters
aimed at the professionals. One of Concordia partners is TUV, a
certification body. Finally, they plan to teach the teachers.
Regarding ECHO, they only focus on 4 sectors. Their planned
methodology is the following:
- Work from what we want to have, and then build
- Focus on hands-on training (cyberranges)
- Work on the methodology of training
- Mix F2F training and online courses
A recurring question during the workshop was to know how ECSO can work
with the pilots to avoid doing the same tasks four times. ECSO would
like to assume the role of coordinator layer between the pilots and
the commission. We should especially focus on what ECSO can
disseminate.
[This is why I proposed we ask the coordination level of SPARTA how we
will work with the other pilots on education and training.]
The four pilots were also asked to produce a short document to
describes the tasks and the deliverables to share with ECSO and the
other pilots. [This was discussed on the WP9 Steering Committee on
Friday June 24th]
[For T9.1], we were invited to try and not reinvent the wheel. That is
why it might be useful to consider existing frameworks such as e-CF.
== Word from (ISC)2 ==
(ISC)2 was represented by Yves Le Roux, who presented their
certifications [which should be an input for T9.3 of SPARTA I guess]:
- SSCP is the basis
- CISSP is the well known certification
- 3 specializations (Engineering, Architecture and Management) on
top of CISSP
- a Healthcare-specific certification
- CCSP : a cloud certification with a lot of legal stuff (it was
done with the Cloud Security Alliance, CSA)
For CISSP, 5 years of experience are required, but it is possible to
have the qualification and work then to gain the experience needed.
(ISC)2 also presented their Charitable Arm Center for Cyber Safety and
Education, aimed at teaching the teachers (the material is based on
the commic strip Garfield)
Finally, there exists a mapping between (ISC)2 certifications and the
NICE framework. We should be able to get it when (ISC)2 shares it with
ECSO.
== Miscellaneous and wrap-up ==
On a related note, the UK has launched its National Cybersecurty
Center which delivers the CCP, to certify people on 4 different job
titles.
Finally, there seems to be an interesting document to read: ENISA
Stock Taking, which describes the gap between trainings and needs from
the industry. It is available here:
https://www.enisa.europa.eu/publications/stock-taking-of-information-securi…
The next deliverable for ECSO WG5 is a standard EU-wide minimum
curriculum for information/cyber security on different EQF
levels. This curriculum will however allow universities and training
centers to keep their specializations.