Cyber Polygon Report Results 2020 en v1 1
Cyber Polygon Report Results 2020 en v1 1
Cyber Polygon Report Results 2020 en v1 1
Polygon
International online training
for raising global cyber resilience
cyberpolygon.com 2020
Contents
Introduction 3
Executive
Summary 7
Participants
and Partners 15
Live Stream 19
Technical
Training 31
2
Cyber Polygon Report
2020
3
Cyber Polygon Report
2020
4
The 2020 pandemic has further accelerated digital
Cyber Polygon Report
5
This year has demonstrated that a crisis can occur
Cyber Polygon Report
6
Executive
Summary
7
About
Cyber Polygon Report
Cyber Polygon
Cyber Polygon is a unique event that combines the world's
largest cybersecurity exercise for corporate technical teams
and an online conference featuring high-profile speakers.
Goals:
x develop the teams′ competencies in repelling cyberattacks
2020
8
Concept 2020
Cyber Polygon Report
9
Structure
Cyber Polygon Report
Live Stream
The live stream featured top officials from international
organisations and tech corporations who met online to analyse
the current cybersecurity trends and risks, and discuss how
to avoid a ‘digital pandemic’.
Executive Summary
5 million spectators
from 57 countries
10
Technical Training
Cyber Polygon Report
120 organisations
Executive Summary
from 29 countries
11
The exercise included two scenarios:
Cyber Polygon Report
1. Defence
In the first scenario, the participants practised repelling
a massive cyberattack in real time.
They had to manage the attack as fast as possible
and minimise the amount of information stolen while
maintaining availability of the infrastructure.
2020
2. Response
The second scenario involved investigating the identified
incident by applying traditional forensics as well as
Threat Hunting — a method whereby specialists
continuously hunt for threats by manually analysing
security events from various sources, rather than waiting
Executive Summary
12
How Did It Go
Cyber Polygon Report
better for the training. This laid the foundation of our public
knowledge library, which is being enriched on a continuous
basis.
The event featured the world′s first public exercise for corporate
teams where the Threat Hunting method was applied.
We are especially pleased to realise that for many teams
Cyber Polygon became the first opportunity to master
this technique and thereby gain new practical experience.
Executive Summary
13
What Is Next?
Cyber Polygon Report
14
Participants
and Partners
15
Cyber Polygon 2020 attracted a variety of organisations
Cyber Polygon Report
Partners
2020
IBM
Participants and Partners
ICANN
A not-for-profit public-benefit corporation and a global
community. ICANN’s mission is to ensure a stable, secure,
and unified global Internet. The company oversees unique
identifiers that allow computers on the Internet to locate one
another. ICANN ensures universal resolvability — users receive
the same predictable results when they access the network
from anywhere in the world.
16
Participants
Cyber Polygon Report
Latvia
Austria
Germany
Russia
Belgium
Ireland
Kazakhstan
Switzerland
Participants and Partners
Croatia
USA Uzbekistan
Spain
Azerbaijan
Bosnia and Herzegovina
Turkey
Serbia Mongolia
Bahrain
Qatar India
UAE
Oman
Columbia
Malaysia
Nigeria
Mozambique Singapore
Teams distribution Philippines
more than 10
Australia
6–10
3–5
less than 3
17
The teams represented organisations
Cyber Polygon Report
Financial institutions 26 %
IT 15%
Government agencies 14%
Healthcare 6%
Education 6%
2020
Telecom 5%
Energy 5%
Media 3%
3%
Participants and Partners
Metal
Law enforcement 3%
Retail 3%
NPO 2%
Construction 2%
Chemical industry 2%
Audit and consulting 1%
Transportation 1%
International organisations 1%
Aerospace engineering 1%
Robotics 1%
18
Live
Stream
19
Technology
Cyber Polygon Report
and New Reality
20
Cyber Polygon Report
‘5G will be the platform for the society, for hospitals, for public
transport, for everything that is to be connected. You need to have
absolute trust in the underlying infrastructure, hence there
is a high demand for security. Today, we cannot even imagine
what capabilities the new 5G network will enable, and artificial
intelligence will obviously be one of the key features of our
technologies and tools in the development of new application
services. AI can be used for predictive analytics to improve
performance, maintenance and security of the network’.
21
State structures
Cyber Polygon Report
to embrace technological
revolution
Governments need to adapt more quickly to the ongoing
changes: not only to search for new tools and ways
of interacting with people and businesses, but also to ensure
the safety of such interaction. A digital identity can become
one of the effective ways of communication between the state
and individual citizens. However, this is only possible provided
that privacy and data protection is properly regulated.
2020
22
Threats and Risks
Cyber Polygon Report
Cybercriminals
taking advantage
of new digital reality
Since early 2020, the number of data breaches, phishing
2020
companies exposed
to highest risk
Healthcare, the financial industry, government agencies,
manufacturing, IT and telecom are at greatest risk. Being
the most frequent targets of attacks, such organisations incur
enormous losses. However, healthcare and manufacturing
are the least protected due to the use of outdated equipment.
Further, their IT infrastructure is often unable to quickly detect
an intrusion as well as manage its consequences.
2020
Jeremy Jurgens, Chief Business Officer and Member of the Managing Board,
World Economic Forum
24 2
D. Thakkar, source: Trend Micro
Fake news poses
Cyber Polygon Report
a major challenge
for society
Information spreads through digital communication
channels at record speeds. However, data on the web
is not always trustworthy. In the era of digitisation, fake
news has become a dangerous weapon being used
by cybercriminals to attack people and organisations.
2020
25
How to Prepare
Cyber Polygon Report
Having an emergency
plan is essential
2020
‘A cyber incident or attack can turn into a crisis if you have little
capability or capacity to deal with it. If you are well-prepared, you
can be more resilient and effective in responding and mitigating
such events’.
26
Training and awareness
Cyber Polygon Report
across all levels
Businesses should take measures to enhance their cyber
resilience: implement best practices in risk management
and conduct regular security audits of their systems. They
need to create strong teams to ensure secure operations
as well as develop, test and implement crisis management
and business continuity plans.
2020
‘I do not believe that we can put the expectation for security on each
individual. I think we need to make them aware of what the risks
and the challenges are, but we actually also have to move towards
models that are not dependent on single individuals who can
be manipulated or perhaps fail to understand the implications
and therefore put entire organisations and institutions at risk’.
Jeremy Jurgens, Chief Business Officer and Member of the Managing Board,
World Economic Forum
28
Effective protection
Cyber Polygon Report
builds on trust
and collaboration
A critical situation cannot be tackled by an organisation
or a lone individual. In a highly interconnected world, a single
cyber attack can spread exponentially across the global
community. This situation can be prevented by promoting
collaboration between the public and private sectors and
law enforcement agencies. Furthermore, efficient interaction
requires the implementation and regulation of a range
2020
29
Cyber Polygon Report
‘We at ICANN understand the domain name system and the DNS
industry probably as much or better than anybody else out there.
2020
So one of the things we can do, is to work with those who combat
criminality to help them understand the effects of their actions
and to make sure that they get the results they intend’.
3
W. Whitmore, source: IBM X-Force
30
Technical
Training
31
Scenarios
Cyber Polygon Report
32
Scenario 1.
Cyber Polygon Report
Defence
According to the first scenario, CyberCorp’s infrastructure Flag — a string with a strictly defined
format, which is used in CTF (Capture
included a public service, which processed confidential client
the Flag) cybersecurity competitions.
information. This service became the subject of interest The players’ main goal is to locate
to an APT group. Cybercriminals were going to steal the hidden string, i.e. ‘capture the flag’.
confidential user data in order to receive financial benefits
and cause damage to company reputation. The APT group
studied the target system in advance, discovered a number Attack-Defence CTF — a CTF competition
where teams are required to defend
of critical vulnerabilities and carried out an attack.
their services (i.e. prevent them from
The participants had to confront the actions of cybercriminals being attacked by other participants)
2020
33
Scenario 2.
Cyber Polygon Report
Response
The second scenario consisted of two rounds, each of which Endpoint Detection and Response
(EDR) — a solution designed to detect
included tasks aimed at practising response actions
and respond to cybersecurity incidents
to the identified cybersecurity incident, though, with different at endpoints (workstations and servers).
approaches applied. EDR collects, processes and analyses
extended telemetry from endpoints
According to the first-round legend, CyberCorp discovered with the purpose of detecting abnormal
that its infrastructure had been compromised given activity; and provides a variety of tools
to respond to such activity (both
the number of anomalies in the outbound traffic. The character
automatically and upon request).
of those anomalies suggested that the attack might be
associated with a widely known APT1337 group. CyberCorp’s
2020
34
There was some information published on the web about a new
Cyber Polygon Report
101 to 56 days
Dwell Time reduced
during 2017–2019
35
Results
Cyber Polygon Report
Financial
1 Team 29
institutions
1329 207 552 570
Technical Training
Financial
5 Team 41
institutions
857 227 495 135
Financial
6 Team 33
institutions
753 243 480 30
Audit and
8 Team 3
consulting
633 0 351 282
It was not clear until the end of the exercise who would take
the first place. Different teams were leading at different
stages, which means that none of them could fully utilise
the techniques at their disposal.
The exercise allowed the participants to identify their strengths
and weaknesses. We hope that the received information
will help them create plans for developing the necessary
competencies and improve their results in the future.
Technical Training
37
The Threat Hunting approach
Cyber Polygon Report
38
cyberpolygon.com