Cyber Polygon
Cyber Polygon
Polygon
International online training
for raising global cyber resilience
cyberpolygon.com 2020
Contents
Introduction 3
Executive
Summary 7
Participants
and Partners 16
Live Stream 20
Technical
Training 32
2
Cyber Polygon Report
of the Russian Federation
3
Cyber Polygon Report
Chairman, World Economic Forum
4
The 2020 pandemic has further accelerated digital
Cyber Polygon Report
5
This year has demonstrated that a crisis can occur
Cyber Polygon Report
6
Executive
Summary
7
About
Cyber Polygon Report
Cyber Polygon
Cyber Polygon is a unique event that combines
the world's largest cybersecurity exercise
for corporate technical teams and an online
conference featuring high-profile speakers.
Goals:
2020
9
Structure
Cyber Polygon Report
Live Stream
2020
10
The live stream also featured Herman Gref, CEO,
Cyber Polygon Report
5 million spectators
from 57 countries
11
Technical Training
Cyber Polygon Report
reputation.
the attacks.
120 organisations
from 29 countries
12
The exercise included two scenarios:
Cyber Polygon Report
1. Defence
In the first scenario, the participants practised
repelling a massive cyberattack in real time.
2. Response
2020
13
How Did It Go
Cyber Polygon Report
on a continuous basis.
14
What Is Next?
Cyber Polygon Report
15
Participants
and Partners
16
Cyber Polygon 2020 attracted a variety of organisations
Cyber Polygon Report
Partners
2020
IBM
A global technology and innovation company and the
largest technology employer in the world, delivering
services in 170 countries. IBM’s cognitive solutions and
cloud platforms help transform institutions, communities
Participants and Partners
ICANN
A not-for-profit public-benefit corporation and a global
community. ICANN’s mission is to ensure a stable,
secure, and unified global Internet. The company
oversees unique identifiers that allow computers on the
Internet to locate one another. ICANN ensures universal
resolvability — users receive the same predictable results
when they access the network from anywhere in the world.
17
Participants
Cyber Polygon Report
Latvia
Austria
Germany
Russia
Belgium
Ireland
Kazakhstan
Switzerland
Croatia
USA Uzbekistan
Spain
Azerbaijan
Participants and Partners
more than 10
Australia
6–10
3–5
less than 3
18
The teams represented organisations
Cyber Polygon Report
Financial institutions 26 %
IT 15%
Government agencies 14%
Healthcare 6%
Education 6%
Telecom 5%
2020
Energy 5%
Media 3%
Metal 3%
Law enforcement 3%
Retail 3%
NPO 2%
Participants and Partners
Construction 2%
Chemical industry 2%
Audit and consulting 1%
Transportation 1%
International organisations 1%
Aerospace engineering 1%
Robotics 1%
19
Live
Stream
20
Technology
Cyber Polygon Report
and New Reality
The world won't
be the same again
The pandemic has spurred digitalisation: many people
have transitioned to remote work and are more and
more reliant on electronic services. Effective interaction
2020
21
Cyber Polygon Report
‘5G will be the platform for the society, for hospitals, for public
transport, for everything that is to be connected. You need
2020
22
State structures
Cyber Polygon Report
to embrace technological
revolution
Governments need to adapt more quickly
to the ongoing changes: not only to search
for new tools and ways of interacting with people
and businesses, but also to ensure the safety
of such interaction. A digital identity can become
one of the effective ways of communication
between the state and individual citizens. However,
2020
23
Threats and Risks
Cyber Polygon Report
Cybercriminals taking
advantage of new digital reality
Since early 2020, the number of data breaches,
phishing attacks and registrations of malicious
sources has increased, and the trend is predicted to grow.
2020
24 1
W. Whitmore, source: IBM X-Force
Critical infrastructure
Cyber Polygon Report
companies exposed
to highest risk
Healthcare, the financial industry, government agencies,
manufacturing, IT and telecom are at greatest risk. Being
the most frequent targets of attacks, such organisations incur
enormous losses. However, healthcare and manufacturing
are the least protected due to the use of outdated equipment.
Further, their IT infrastructure is often unable to quickly detect
an intrusion as well as manage its consequences.
2020
challenge for society
Information spreads through digital communication
channels at record speeds. However, data on the web
is not always trustworthy. In the era of digitisation,
fake news has become a dangerous weapon
being used by cybercriminals to attack people
and organisations.
2020
26
How to Prepare
Cyber Polygon Report
27
Training and awareness
Cyber Polygon Report
across all levels
Businesses should take measures to enhance their cyber
resilience: implement best practices in risk management
and conduct regular security audits of their systems.
They need to create strong teams to ensure secure
operations as well as develop, test and implement crisis
management and business continuity plans.
28
Training, education and preparation of every
Cyber Polygon Report
29
Effective protection builds
Cyber Polygon Report
on trust and collaboration
A critical situation cannot be tackled
by an organisation or a lone individual.
In a highly interconnected world, a single cyber
attack can spread exponentially across the global
community. This situation can be prevented
by promoting collaboration between the public
and private sectors and law enforcement agencies.
Furthermore, efficient interaction requires
2020
30
Cyber Polygon Report
31
Technical
Training
32
Scenarios
Cyber Polygon Report
33
The training had a range of distinctive features:
Cyber Polygon Report
34
Scenario 1. Defence
Cyber Polygon Report
35
They were allowed to apply any methods Attack-Defence CTF —
Cyber Polygon Report
Red Teaming —
vulnerability is exploited, was done a cybersecurity exercise
for good reason: web applications that simulates an attack
on the existing corporate
remain one of the most popular attack infrastructure by imitating
vectors. According to the Verizon Data real-life conditions
and methods applied
Breach Investigations Report 2020, they by hacker groups.
36
Scenario 2. Response
Cyber Polygon Report
37
According to the second-round legend, Endpoint Detection
Cyber Polygon Report
and Response (EDR) —
following a cybersecurity incident, a solution designed
to detect and respond
CyberCorp purchased and rolled out an to cybersecurity
EDR (Endpoint Detection and Response) incidents at endpoints
(workstations and
solution in its infrastructure, with servers). EDR collects,
agents installed on all the workstations processes and analyses
extended telemetry
and servers. The extended telemetry from endpoints with
the purpose of detecting
gathered by such endpoints was sent abnormal activity;
to the centralised Threat Hunting and provides a variety
of tools to respond
platform for proactive threat detection. to such activity (both
automatically and upon
The company also invited a team of expert request).
analysts to build a detection process
2020
38
There was some information published on the
Cyber Polygon Report
and Threat Hunting, and the increased
focus on endpoint monitoring have also
contributed to the improvement. Thus,
around 70% of the SANS respondents
ascribe the decrease in Dwell Time to
the implementation of Threat Hunting
at their organisations.
101 to 56 days
Dwell Time reduced
during 2017–2019
40
Results
Cyber Polygon Report
Financial
1 Team 29
institutions
1329 207 552 570
Financial
5 Team 41
institutions
857 227 495 135
Financial
6 Team 33
institutions
753 243 480 30
Audit and
8 Team 3
consulting
633 0 351 282
42
Specialists are better prepared
Cyber Polygon Report