NEW YORK--(BUSINESS WIRE)--CYBERGYM, a global network of cyber-warfare qualification and training arenas, today announced a timely program to train organizations on how to mitigate the impact of cyber attacks on their organizational hardware. Effective today, the new program is available in all of CYBERGYM’s cyberwarfare Arenas across the globe.
The training program was developed in response to media allegations that Chinese intelligence agencies installed surveillance chips in servers used across global critical civilian infrastructures, the US military and intelligence corps, as well as companies like Apple and Amazon. According to CYBERGYM experts, the threat posed to organizations by hackers infiltrating their infrastructure via hardware supply chains and 3rd party suppliers - is significant. For that reason, CYBERGYM’s R&D center in Israel has developed a training program that provides organizations with effective strategies for defending against this type of complex, hardware-based attack.
Identifying and defending against hacks that occur at a hardware or infrastructure level requires advanced forensic analysis and extensive training. CYBERGYM’s newly-developed program encompasses all forensic layers - memory, network, PLC and operating system - and enhances an organization’s anomaly detection skillset. Its unique multi-layered training not only imparts key personnel with critical forensics data collection skills, but also helps organizations to analyze, mitigate and even remediate some of the attack’s damage.
To make the training program as realistic as possible, CYBERGYM engineers and white-hat hackers have developed a virtual model of the surveillance chip identified in the Bloomberg report, in order to emulate its actual attack scenario, enabling trainees to respond to a real-life chain of events.
"Our program is based on multi-layered forensics and is designed to fundamentally enhance both human training and policy implementation", said Ofir Hason, CEO of CYBERGYM. "The story, while contested, has nevertheless brought into sharp focus the very real likelihood of organization’s suffering infrastructure infiltration at the hands of hackers. To fight this type of core and complicated attack, organizations need to be able to quickly analyze the events, collect the relevant forensics, and work collaboratively with their IT supply chain partners to mitigate and prevent escalation - processes that are benefited greatly by access to hands-on real-world training scenarios.”