On 2024-05-21
Cybersecurity

Airbus team again takes part in the world’s largest live fire cyber defence exercise ‘Locked Shields’

Airbus Protect at Locke Shield
Summary

We reached a significant milestone last year when a team from Airbus took part in the NATO ‘Locked Shields’ exercise for the first time. The exercise, which has been conducted annually since 2010 by the Cooperative Cyber Defense Center of Excellence (CCDCOE), is the world’s largest live cyber defence exercise with over 3,500 participants from 32 nations. Participating at the invitation of the ‘Centre for Cyber Security in the Bundeswehr’ was an instructive experience that showed us how important international cooperation is in the field of cybersecurity. 

 

We are proud that our efforts were recognised and that we were again invited to Locked Shields 2024.

Again this year at Locked Shields, we were faced with challenges that reflect the complexity of real-world cyber defence, including critical thinking, strategic decision making, legal considerations, crisis communication and strategic planning, all with the aim of strengthening cyber defence capabilities.

The uniqueness of the exercise lies in its comprehensive approach, combining technical skills with strategic, legal and communication expertise to develop a versatile defence strategy. Participants are encouraged to utilise their collective skills and foster an environment where collaboration is key to overcoming complex cyber challenges. 

 

The Airbus team, consisting of cyber security experts from Airbus Protect and Airbus Defence & Space, can confirm this from their own experience. 

‘The intensity of Locked Shields is unrivalled. Every attack is a new challenge that needs to be mastered. The close collaboration with experts from all over the world has opened up new perspectives for me and my skills have been put to the test time and again,’ reports Frank Reckziegel, Cybersecurity Architect.

Markus Neumaier, Forensics Specialist, adds: ‘Locked Shields is not just about the technology, but also about the big picture. The forensic investigations under time pressure showed me how important details are and how they can influence the big picture’.

‘Locked Shields was like a chess game against invisible opponents. Every move and its consequences had to be carefully considered. It was an honour to be part of a team that worked so hard together to protect our system without losing sight of its function,’ says Philipp Schönberger, Cybersecurity Software Architect, summarising his impressions.

 

The increasing participation of different nations and partners shows the global reach and importance of Locked Shields.

This underlines the role of the exercise in improving international cooperation in the field of cyber defence. We look forward to capitalising on our experiences from this and last year, taking on new challenges and continuing to contribute to the protection of the digital world.

  • Share

More on Cybersecurity

MQTT Hidden talks Cybersecurity

Whispers of the Machines: Exposing MQTT Hidden Talks

Why does IoT need to be secure? With over 15 billion IoT (Internet of Things) devices interconnected worldwide, machines can now ‘talk’ to each other seamlessly. This is enabled by protocols like Message Queuing Telemetry Transport (MQTT), which orchestrate our smart homes, cities and critical infrastructure. The extensive use of MQTT, a lightweight machine-to-machine protocol [...] Read more
AI in the OT realm in the future Cybersecurity

Future Tech, Future Threat, Future Ready? Artificial Intelligence & OT

As we’re planning our attendance at the UK’s flagship cyber security event Cyber UK 2024, the strapline of “Future Tech, Future Threat, Future Ready” has given us the opportunity to think about the future trends in OT Security and what they could mean for the industry. You can’t have not noticed the proliferation of Artificial [...] Read more
Supply chain attacks and how to fight them Cybersecurity

Airbus Protect explains: Supply Chain attacks and how to fight them

Supply Chain attacks are an underestimated risk for companies, where cyber threat actors can hack into a software vendor’s network, posing a significant danger to many companies. Who may be affected by these attacks? Every company of every branch who is in a business relationship to a third-party vendor who offers services or software to […]

Read more