SlideShare una empresa de Scribd logo
1 de 32
UNICANE Cyberexercise: searching for
the Unicorn
Jordi Guijarro & Maria Isabel Gandía
CSUC/CATNIX (@CSUC_info)
TNC19
Tallinn, 19-6-2019
What Is CSUC?
CSUC is a Consortium of 10 Universities and the Catalan Government.
“Collaborating and Sharing to Improve the University System“
CSUC: What Do We Do?
Anella Científica: Regional Networks in Spain & Year of Creation
2003
1993
2008
2005
2006
2004
1996
1989
1993 RREN in
Catalonia
2003
1993
2008
2005
2006
2004
1996
1989
1993 RREN in
Catalonia
Anella Científica: Regional Networks in Spain & Year of Creation
 You are quietly working on a GDPR document while your colleagues
are having lunch.
 Suddenly, when you didn’t even have time to log in into the network
equipment…
 The race against the clock starts!!
Any Crisis Can Begin Like This
Experiencing a (Short) “Mini-Crisis”
 It all began at 13:00 on the 13th December.
 It affected Anella Científica.
 The network was sloooooooooow.
 In 45 minutes we received:
• 58 phone calls.
• 300 alerts about packet loss or down circuits to Anella Científica institutions.
• 7 e-mails from users.
• 1 tweet
 We checked around 400 graphs.
 It was a DDoS attack. It lasted for 3 hours and was directed to 2 IP
addresses (45 min affecting the network).
Why Did We Organize a Crisis Day?
 SURFnet: OZON
 Presentation in 2017 for Anella Científica (TAC).
 The Universities asked us to organize one.
 Géant: CLAW Crisis Management Exercise.
 CSUC participated in the “CLAW” 2017 and 2018.
Organizing a Crisis Management Exercise
 Organizing an Exercise like Ozon was expensive for us.
 But, hey! We like doing things in a collaborative manner!
 The Security Group from the universities worked on it.
 We based our case in the CLAW, but for a hypothetical university in
Poland: The University of the Pyrenees (yes, we know it’s not there).
 Our team recorded audios and videos simulating we were members of
the university team, the journalists, the Government…
The Governement
Our CEO
Crackovia News Journalist
Our Promotion Expert
UPIRINEUS NOC
Our NOC Expert Leader
Presidentship Office
Our Finance Manager
CSUP-CSIRT
Our Cybersecurity Leader
Polodiario Journalist
Our Promotion Manager
CSUP NOC
Our NOC Manager
The Dean
Our Webmaster
Presidentship Office
Our e-Administration Manager
We Called it UNICANE
Unicane, like a University Hurricane…or was it Unicorn Hurricane?
 More than 40 participants from the Universities.
 Experts from different fields:
• Network
• IT Management
• Communication
• IT Security
• …and some unicorns!
The Case I
The University of
the Pyrenees
The Case II
UNICANE
 The participants were distributed in 4 groups
 Distributed in 4 “War rooms”.
 7 roles were distributed:
• Crisis Coordinator.
• IT Director (CTO)
• Security Manager
• Communication Expert
• Secretary
• Network Manager
• Public Relations
 Other participants from the Universities acted as observers.
 Four CSUC members acted as leaders.
 And the exercise began…
Crisis Management Team from the University of the Pyrenees
Role Assignment
Role Assignment
Role Assignment…and Hierarchy
Reading the Case
Searching for Alternatives
Searching for Alternatives
Interpreting Clues
Interpreting Clues
Channels and Timeline
 Multimedia content previously uploaded to a Rocket channel.
 The leaders had a parallel channel and the same guidelines.
 We introduced information “capsules” simultaneously.
 The information was slowly flooding:
• 12:05: CSUP monitoring systems showed an increase on the traffic
• 12:07: Call from the Dean.
• 12:10: We access a weathermap from the university and another one from
CSUP.
Lessons Learned, from Crisis
 Having a Crisis Management Plan is a must! You can improve it later
(continuous improvement).
• Roles
• Communication flows
• Processes
 Regarding coordination:
• Even if the technical teams were exchanging information and working
together, we must involve the Marcomms team. The image of the University
is important!
• The telephone calls must be redirected to someone who can attend them
while the technicians try to solve the incident.
 On the communication side:
• Social networks are every day more relevant.
• The Marcomms team can not answer them without double checking with the
technical team first.
For Instance…
 13:20: A user tweets…
Hi @***, @***, @***. Peering problems?
For Instance…
 13:45: We answer the tweet: we are taking care of it.
As you see, there is a problem @**. We
are working to solve it. We will inform
once it’s solved.
For Instance…
Transit provider’s
twitter account
Hi user!
I just notified your situation to the
corresponding department. Thanks for
contacting us, it was very useful and we will
make sure it’s solved as soon as possible.
Regards,
Provider
Well, it was solved an hour after I sent
it, like 6 or 7 hours ago. Thanks anyway
Lessons Learned, from the Exercise
 All the teams found a creative solution, even if it was not perfect.
 The feedback was very positive.
 The Communication teams were the happiest!
 Interest in future editions.
 For the next ones:
• Interaction among teams during the exercise.
• Share feedback among groups at the end.
• Bring more participants from each university.
The Human Network, number one security tool!
Expectations and Milestones
Before beginning, they wanted to learn
The takeaways were knowledge and ideas
Was the Exercise Useful?
Thanks!
@csuc_info
Did you find the unicorns?
Q&A

Más contenido relacionado

Similar a UNICANE Cyberexercise: searching for the Unicorn

Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015Safecast
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685
Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685
Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685APNIC
 
Master ICT for Development and Social Good
Master ICT for Development and Social Good Master ICT for Development and Social Good
Master ICT for Development and Social Good Ong 2.0
 
Vision of the Future: Where will eLearning be in 2020?
Vision of the Future: Where will eLearning be in 2020?Vision of the Future: Where will eLearning be in 2020?
Vision of the Future: Where will eLearning be in 2020?Carol Skyring
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
 
Francesco Venier- Future Forum 2013
Francesco Venier- Future Forum 2013Francesco Venier- Future Forum 2013
Francesco Venier- Future Forum 2013Friuli Future Forum
 
People Have the Power - Patrizio Regis
People Have the Power - Patrizio RegisPeople Have the Power - Patrizio Regis
People Have the Power - Patrizio RegisOpenKnowledge srl
 
Crisiscamp Ireland Opening presentation
Crisiscamp Ireland Opening presentationCrisiscamp Ireland Opening presentation
Crisiscamp Ireland Opening presentationEvert Bopp
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
The State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About ItThe State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About ItJane Frankland
 
Slándáil Project Magazine 2015
Slándáil Project Magazine 2015Slándáil Project Magazine 2015
Slándáil Project Magazine 2015Victoria Macarthur
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudanHala Nur
 
Massively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the HypeMassively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the HypeCharles Severance
 
Information society
Information societyInformation society
Information societySelenaMarfon
 
Can data play a role in making the streets safer for women?
Can data play a role in making the streets safer for women?Can data play a role in making the streets safer for women?
Can data play a role in making the streets safer for women?Alex Gluhak
 

Similar a UNICANE Cyberexercise: searching for the Unicorn (20)

Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685
Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685
Finltenglish version-janog35-lt-yu.ppt 1423449310-1425507685
 
Master ICT for Development and Social Good
Master ICT for Development and Social Good Master ICT for Development and Social Good
Master ICT for Development and Social Good
 
Vision of the Future: Where will eLearning be in 2020?
Vision of the Future: Where will eLearning be in 2020?Vision of the Future: Where will eLearning be in 2020?
Vision of the Future: Where will eLearning be in 2020?
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
A Custom Computer for Older People by David Frohlich
A Custom Computer for Older People by David FrohlichA Custom Computer for Older People by David Frohlich
A Custom Computer for Older People by David Frohlich
 
Francesco Venier- Future Forum 2013
Francesco Venier- Future Forum 2013Francesco Venier- Future Forum 2013
Francesco Venier- Future Forum 2013
 
People Have the Power - Patrizio Regis
People Have the Power - Patrizio RegisPeople Have the Power - Patrizio Regis
People Have the Power - Patrizio Regis
 
Crisiscamp Ireland Opening presentation
Crisiscamp Ireland Opening presentationCrisiscamp Ireland Opening presentation
Crisiscamp Ireland Opening presentation
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
The State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About ItThe State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About It
 
Slándáil Project Magazine 2015
Slándáil Project Magazine 2015Slándáil Project Magazine 2015
Slándáil Project Magazine 2015
 
LCT in day2 day life
LCT in day2 day lifeLCT in day2 day life
LCT in day2 day life
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
Massively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the HypeMassively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the Hype
 
Information society
Information societyInformation society
Information society
 
Can data play a role in making the streets safer for women?
Can data play a role in making the streets safer for women?Can data play a role in making the streets safer for women?
Can data play a role in making the streets safer for women?
 
The Internet and Religion: The Great Disruption
The Internet and Religion: The Great DisruptionThe Internet and Religion: The Great Disruption
The Internet and Religion: The Great Disruption
 

Más de CSUC - Consorci de Serveis Universitaris de Catalunya

Más de CSUC - Consorci de Serveis Universitaris de Catalunya (20)

Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
Tendencias en herramientas de monitorización de redes y modelo de madurez en ...
 
Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)Quantum Computing Master Class 2024 (Quantum Day)
Quantum Computing Master Class 2024 (Quantum Day)
 
Publicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de RecercaPublicar dades de recerca amb el Repositori de Dades de Recerca
Publicar dades de recerca amb el Repositori de Dades de Recerca
 
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
 
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
Formació RDM: com fer un pla de gestió de dades amb l’eiNa DMP?
 
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
Com pot ajudar la gestió de les dades de recerca a posar en pràctica la ciènc...
 
Security Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademySecurity Human Factor Sustainable Outputs: The Network eAcademy
Security Human Factor Sustainable Outputs: The Network eAcademy
 
The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
 
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
 
La gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolasLa gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolas
 
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
 
Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...
 
Enginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fonsEnginyeria Informàtica: una cursa de fons
Enginyeria Informàtica: una cursa de fons
 
Transformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IATransformació de rols i habilitats en un món ple d'IA
Transformació de rols i habilitats en un món ple d'IA
 
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de BarcelonaDifusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
Difusió del coneixement a l'Il·lustre Col·legi de l'Advocacia de Barcelona
 
Fons de discos perforats de cartró
Fons de discos perforats de cartróFons de discos perforats de cartró
Fons de discos perforats de cartró
 
Biblioteca Digital Gencat
Biblioteca Digital GencatBiblioteca Digital Gencat
Biblioteca Digital Gencat
 
El fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusióEl fons Enrique Tierno Galván: recepció, tractament i difusió
El fons Enrique Tierno Galván: recepció, tractament i difusió
 
El CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físicsEl CIDMA: més enllà dels espais físics
El CIDMA: més enllà dels espais físics
 
Els serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUCEls serveis del CSUC per a la comunitat CCUC
Els serveis del CSUC per a la comunitat CCUC
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

UNICANE Cyberexercise: searching for the Unicorn

  • 1. UNICANE Cyberexercise: searching for the Unicorn Jordi Guijarro & Maria Isabel Gandía CSUC/CATNIX (@CSUC_info) TNC19 Tallinn, 19-6-2019
  • 2. What Is CSUC? CSUC is a Consortium of 10 Universities and the Catalan Government. “Collaborating and Sharing to Improve the University System“
  • 3. CSUC: What Do We Do?
  • 4.
  • 5. Anella Científica: Regional Networks in Spain & Year of Creation 2003 1993 2008 2005 2006 2004 1996 1989 1993 RREN in Catalonia
  • 6. 2003 1993 2008 2005 2006 2004 1996 1989 1993 RREN in Catalonia Anella Científica: Regional Networks in Spain & Year of Creation
  • 7.  You are quietly working on a GDPR document while your colleagues are having lunch.  Suddenly, when you didn’t even have time to log in into the network equipment…  The race against the clock starts!! Any Crisis Can Begin Like This
  • 8. Experiencing a (Short) “Mini-Crisis”  It all began at 13:00 on the 13th December.  It affected Anella Científica.  The network was sloooooooooow.  In 45 minutes we received: • 58 phone calls. • 300 alerts about packet loss or down circuits to Anella Científica institutions. • 7 e-mails from users. • 1 tweet  We checked around 400 graphs.  It was a DDoS attack. It lasted for 3 hours and was directed to 2 IP addresses (45 min affecting the network).
  • 9. Why Did We Organize a Crisis Day?  SURFnet: OZON  Presentation in 2017 for Anella Científica (TAC).  The Universities asked us to organize one.  Géant: CLAW Crisis Management Exercise.  CSUC participated in the “CLAW” 2017 and 2018.
  • 10. Organizing a Crisis Management Exercise  Organizing an Exercise like Ozon was expensive for us.  But, hey! We like doing things in a collaborative manner!  The Security Group from the universities worked on it.  We based our case in the CLAW, but for a hypothetical university in Poland: The University of the Pyrenees (yes, we know it’s not there).  Our team recorded audios and videos simulating we were members of the university team, the journalists, the Government…
  • 11. The Governement Our CEO Crackovia News Journalist Our Promotion Expert UPIRINEUS NOC Our NOC Expert Leader Presidentship Office Our Finance Manager CSUP-CSIRT Our Cybersecurity Leader Polodiario Journalist Our Promotion Manager CSUP NOC Our NOC Manager The Dean Our Webmaster Presidentship Office Our e-Administration Manager
  • 12. We Called it UNICANE Unicane, like a University Hurricane…or was it Unicorn Hurricane?  More than 40 participants from the Universities.  Experts from different fields: • Network • IT Management • Communication • IT Security • …and some unicorns!
  • 13. The Case I The University of the Pyrenees
  • 15. UNICANE  The participants were distributed in 4 groups  Distributed in 4 “War rooms”.  7 roles were distributed: • Crisis Coordinator. • IT Director (CTO) • Security Manager • Communication Expert • Secretary • Network Manager • Public Relations  Other participants from the Universities acted as observers.  Four CSUC members acted as leaders.  And the exercise began…
  • 16. Crisis Management Team from the University of the Pyrenees
  • 25. Channels and Timeline  Multimedia content previously uploaded to a Rocket channel.  The leaders had a parallel channel and the same guidelines.  We introduced information “capsules” simultaneously.  The information was slowly flooding: • 12:05: CSUP monitoring systems showed an increase on the traffic • 12:07: Call from the Dean. • 12:10: We access a weathermap from the university and another one from CSUP.
  • 26. Lessons Learned, from Crisis  Having a Crisis Management Plan is a must! You can improve it later (continuous improvement). • Roles • Communication flows • Processes  Regarding coordination: • Even if the technical teams were exchanging information and working together, we must involve the Marcomms team. The image of the University is important! • The telephone calls must be redirected to someone who can attend them while the technicians try to solve the incident.  On the communication side: • Social networks are every day more relevant. • The Marcomms team can not answer them without double checking with the technical team first.
  • 27. For Instance…  13:20: A user tweets… Hi @***, @***, @***. Peering problems?
  • 28. For Instance…  13:45: We answer the tweet: we are taking care of it. As you see, there is a problem @**. We are working to solve it. We will inform once it’s solved.
  • 29. For Instance… Transit provider’s twitter account Hi user! I just notified your situation to the corresponding department. Thanks for contacting us, it was very useful and we will make sure it’s solved as soon as possible. Regards, Provider Well, it was solved an hour after I sent it, like 6 or 7 hours ago. Thanks anyway
  • 30. Lessons Learned, from the Exercise  All the teams found a creative solution, even if it was not perfect.  The feedback was very positive.  The Communication teams were the happiest!  Interest in future editions.  For the next ones: • Interaction among teams during the exercise. • Share feedback among groups at the end. • Bring more participants from each university. The Human Network, number one security tool!
  • 31. Expectations and Milestones Before beginning, they wanted to learn The takeaways were knowledge and ideas Was the Exercise Useful?
  • 32. Thanks! @csuc_info Did you find the unicorns? Q&A