cyberspace remains a daunting challenge due to the complexity and
highly-dynamic nature of the cyber environment, and the planning and conduct of
large-scale cyber exercises requires significant expertise.
Our approach to cyber exercises recognizes the difference between training and
exercising. We follow our own exercise development methodology, where no two exercises
are ever the same as the key factors and issues are taken into consideration. This allows us to help our clients find their specific optimal
exercise, the sweet spot for the maximum benefit at the most reasonable cost.
Defending the Core
Exercise general cyber defence skills and knowledge.
DTC allows participants to exercise perishable cyber defence skills on a cyber range. The scenario and exercise are adapted to the business operations of the client and the specific risks it faces. Includes simulated debriefs that exercise communications between technical and management staff.
In NITH, participants must detect and eradicate an APT that is still covertly acting in a simulated IT environment within the timeframe of the exercise. NITH is a slower pace, highly technical exercise focused on honing the most advanced cyber defence skills and techniques.
Exercise defending critical infrastructure Industrial Control Systems (ICS).
The SL exercise includes critical infrastructure ICS under cyber-attack. Defenders must detect and prevent the attacks from succeeding within the allocated timeframe in order to avoid catastrophic consequences.
Feeding the Lions
Exercise senior executive and board engagements.
FTL is a scenario-driven table-top exercise in which senior executives must decide how to handle various cyber-attacks and communicate with stakeholders. It also offers middle managers the opportunity to exercise briefing executives.
Exercise communication, coordination, and government decision-making during a nation-wide cyber crisis.
CR is a custom
exercise developed specifically for the requesting government. It allows
participants to exercise their specific responsibilities during a time of cyber
crisis, offering senior government officials a chance to validate processes and
procedures as well as crisis management plans.
Exercise cross-sector collaboration and information
NR is the most ambitious exercise. Custom-designed for the needs of a Nation, it allows government and critical infrastructure providers the opportunity to exercise information sharing, coordination, and collaboration during a simulated nation-wide cyber crisis.