{"id":21846,"date":"2016-11-16T13:00:16","date_gmt":"2016-11-16T21:00:16","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21846"},"modified":"2016-12-02T07:01:23","modified_gmt":"2016-12-02T15:01:23","slug":"gov-cyber-ready-think-heres-22-nations-militaries-testing-readiness","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/11\/gov-cyber-ready-think-heres-22-nations-militaries-testing-readiness\/","title":{"rendered":"Are We as Cyber-Ready as We Think? Here\u2019s How 22 Nations\u2019 Militaries Are Testing Readiness"},"content":{"rendered":"<p><em>Palo Alto Networks was proud to again be part of the Cyber Endeavor for the network defense in this year\u2019s Cyber Range for the annual Pacific Endeavor. Pacific Endeavor is an annual workshop hosted by U.S. Pacific Command (PACOM) and an alternating Asia-Pacific co-host nation \u2013 this year, Australia \u2013 to simulate communications necessary in the wake of a humanitarian assistance and disaster relief (HADR) scenario. Let\u2019s have a look back at this exercise and why it\u2019s important.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-21849 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/Pacific_1.png\" alt=\"pacific_1\" width=\"241\" height=\"185\" \/>In the event of such a natural disaster, local nations must come together to support the affected nation. The annual Pacific Endeavor gathering ensures \u201cmultinational risk reduction and communications interoperability, information sharing, and capacity building\u201d planning.\u00a0 The Cyber Range portion of the workshop, run by partner <a href=\"http:\/\/www.cybertestsystems.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Test Systems<\/a>, facilitates information sharing among military cyber personnel from across 22 nations. These personnel defend their mock networks against myriad threats while maintaining critical applications to communicate in the HADR environment. Cyber Test Systems uses real threats, pulled from their research across the internet, and then regenerates them realistically using their Cyber Test Systems Network Traffic Generator CTS-NTG, acting as Green, Yellow and Red Teams. This Cyber Range gives cyber professionals acting as Blue Teams the opportunity to <u>work together<\/u> with other nations to thwart each cyberattack scenario. The 2016 Cyber Range consisted of the following cyberattacks scenarios:<\/p>\n<ul>\n<li>Advanced\/Zero-day malware for several different operating systems including ransomware<\/li>\n<li>Botnet communications between command and control (C&amp;C) and bots<\/li>\n<li>Server-side vulnerabilities and exploits<\/li>\n<li>Client-side vulnerabilities and exploits<\/li>\n<li>Malicious domains<\/li>\n<li>Malicious websites<\/li>\n<li>Malicious phishing websites<\/li>\n<li>Denial of service (DoS)<\/li>\n<li>Distributed denial of service (DDoS)<\/li>\n<li>Reflective denial of service (RDoS)<\/li>\n<li>Distributed reflective denial of service (DRDoS)<\/li>\n<\/ul>\n<p>The nations appreciate the readiness, and the cyber operators appreciate the hands-on opportunity that simple presentations don\u2019t afford.<\/p>\n<p>Participating nations also have the opportunity to see the Palo Alto Networks Next Generation Security Platform \u2013 using next-generation firewall, IPS, network antivirus, URL filtering and zero-day attack detection and mitigation in one platform \u2013 in action. Once new malware is detected in the platform using WildFire WF-500, signatures are generated within five minutes and reprogram the next-generation security appliances \u2013 pushing URL updates for any new domains associated with the attacks and the freshly generated signatures. (See what participants had to say about the abbreviated Cyber Range at our <a href=\"https:\/\/www.youtube.com\/watch?v=v35k-8bYJSw\" rel=\"nofollow,noopener\"  target=\"_blank\">2016 Ignite User Conference<\/a>.)<\/p>\n<p>Many nations who send their operators to such ranges appreciate the readiness so much that they have begun scheduling Cyber Range exercises for their own nations. Yet others \u2013 across military, education and even law enforcement \u2013 have now begun purchasing the Mobile Cyber Range kits to maintain their readiness and operate ongoing Cyber Range exercises for their cyber staff.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/Pacific_2.png\"><div style=\"max-width:100%\" data-width=\"1013\"><span class=\"ar-custom\" style=\"padding-bottom:40.77%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-21852 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/Pacific_2.png\" alt=\"pacific_2\" width=\"1013\" height=\"413\" \/><\/span><\/div><\/a><\/p>\n<p>To learn more about Cyber Range, visit our <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/cyber-range-cyber-defense-training-center-exercises\" target=\"_blank\">website<\/a> or the resources below. Cyber Range will also be returning to our Ignite Conference in 2017 \u2013 <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\" target=\"_blank\">register now to join us in Vancouver<\/a>!<\/p>\n<ul>\n<li><a href=\"https:\/\/www.dvidshub.net\/video\/481471\/pacific-endeavor-2016-overall-eng-story\" rel=\"nofollow,noopener\"  target=\"_blank\">Pacific Endeavor 2016 <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/cyber-range-cyber-defense-training-center-exercises\" target=\"_blank\">Cyber Range<\/a><\/li>\n<li><a href=\"http:\/\/www.cybertestsystems.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Test Systems<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=v35k-8bYJSw\" rel=\"nofollow,noopener\"  target=\"_blank\">Ignite 2016 Cyber Range<\/a><\/li>\n<li><a href=\"https:\/\/ignite.paloaltonetworks.com\/\" target=\"_blank\">Ignite 2017<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks was proud to again be part of the Cyber Endeavor for the network defense in this year\u2019s Cyber Range for the annual Pacific Endeavor. Pacific Endeavor is an annual &hellip;<\/p>\n","protected":false},"author":47,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484],"tags":[718,536,3043,1819,3003,658,69],"coauthors":[717],"class_list":["post-21846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","tag-cyber-endeavor","tag-cyber-range","tag-cyber-test-systems","tag-ignite","tag-military","tag-pacific-endeavor","tag-wildfire"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21846"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21846\/revisions"}],"predecessor-version":[{"id":21909,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21846\/revisions\/21909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21846"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}