Ваш браузер є застарілим і не підтримує сучасні веб-стандарти, а так само становить потенційну загрозу вашої безпеки.
Будь ласка, встановіть сучасний браузер

National Security and Defense Council of Ukraine

HomeNewsOrganization of the National Security and Defense Council of Ukraine29.03.2021, 17:44

The NCCC at the NSDC of Ukraine hosts cyber intelligence training for public sector specialists

The two-day seminar was organized by the National Coordination Center for Cybersecurity at the National Security and Defense Council of Ukraine with the support of the U.S. Civilian Research and Development Foundation (CRDF Global) and the U.S. Department of State. Representatives of the main subjects of Ukraine’s cybersecurity were invited to participate.

The main areas during the exercises were: tactics and counteraction to cyberespionage groups of the Russian Federation, cyber intelligence using open sources CTI/OSINT, and attribution (identification of attackers).

After completing the theoretical part of the training, participants had the opportunity to practice their skills.

According to Deputy Secretary of the NSDC of Ukraine Serhiy Demedyuk, identification of the attacking party is one of the vital components of the country’s protection against cyber threats. It is not properly developed in Ukraine today. Therefore, the NCCC at the NSDC of Ukraine has attracted international partners and experts from one of the best international cybersecurity companies FireEye to hold such a seminar for public sector employees.

“It is easier to prevent an attack and prepare for it than to react to the consequences. This requires high-quality cyber intelligence, which so far has not been developed at a sufficient level. This seminar provided an opportunity to improve practical skills and gain experience of leading private cybersecurity organizations to protect our country from cyber threats”, - he said.

Earlier, the NCCC under the NSDC of Ukraine reported a high level of cyber threat in Ukraine due to a large-scale cyber attack on SolarWinds in December 2020 in the United States. The threat is still active today and can be equated to the 2017 attack (NotPetya). Therefore, cybersecurity experts remind about the need to test one’s systems starting from March 2021 and update them immediately.