{"id":556,"date":"2022-08-30T07:56:09","date_gmt":"2022-08-30T07:56:09","guid":{"rendered":"https:\/\/bdih.spri.eus\/ciberseguridad\/"},"modified":"2024-10-28T11:05:07","modified_gmt":"2024-10-28T11:05:07","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/bdih.spri.eus\/en\/nodes\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n\n\tNodes &gt; <strong>Cybersecurity<\/strong>\n<p>Real environments for testing, operation simulation and cybersecurity training<\/p>\n<img decoding=\"async\" src=\"\/archivos\/2022\/08\/Grupo-794.png\" alt=\"icon\" \/>\n\t<p>Cybersecurity is a fundamental aspect for organisations and is becoming increasingly relevant as companies move forward in their digitisation process.\u00a0<\/p>\n<p>The Basque Digital Innovation Hub&#8217;s Cybersecurity focus area provides companies with an authentic environment for testing, simulation and training. This focus area is coordinated by the Basque CyberSecurity Centre (BCSC) and consists of five interconnected laboratories spread throughout the region. The laboratories, owned by prominent stakeholders in the Basque Science, Technology and Innovation Network, are used to foster entrepreneurship and innovation, with the capability to carry out cybersecurity projects in various fields, such as smart-grid, automotive, blockchain, AI, secure industry and product evaluation, among others.\u00a0<\/p>\n\t<p>The node in detail<\/p>\n\t<iframe loading=\"lazy\" title=\"BDIH Nodos - Ciberseguridad\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/OdI2ANGerx8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\t<p>Get all the in-depth information about the node from our expert.<\/p>\n\t<p>Application areas<\/p>\n\t<p>5 organisations and 7 laboratories to support the following fields of application:<\/p>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-0\" data-index=\"0\" aria-selected=\"true\" aria-controls=\"fl-tabs--panel-0\" aria-expanded=\"true\" role=\"tab\" tabindex=\"0\">\t\t\t\tIdentification <br \/>of threats and risks\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-1\" data-index=\"1\" aria-selected=\"false\" aria-controls=\"fl-tabs--panel-1\" aria-expanded=\"false\" role=\"tab\" tabindex=\"0\">\t\t\t\tAsset protection\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-2\" data-index=\"2\" aria-selected=\"false\" aria-controls=\"fl-tabs--panel-2\" aria-expanded=\"false\" role=\"tab\" tabindex=\"0\">\t\t\t\tAttack detection\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-3\" data-index=\"3\" aria-selected=\"false\" aria-controls=\"fl-tabs--panel-3\" aria-expanded=\"false\" role=\"tab\" tabindex=\"0\">\t\t\t\tAttack response\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-4\" data-index=\"4\" aria-selected=\"false\" aria-controls=\"fl-tabs--panel-4\" aria-expanded=\"false\" role=\"tab\" tabindex=\"0\">\t\t\t\tAsset recovery\t\t\t\t<\/a>\n\t\t\t\t\t\tIdentification <br \/>of threats and risks\n\t\t\t\t\t\t\t\t\t\t\t<h2>Identification of threats and risks<\/h2>\n<p>Develop an organisational understanding to manage cybersecurity risks to people, systems, assets, data and capabilities. Understanding business context, resources that support critical functions, and related cybersecurity risks enables an organisation to focus and prioritise its efforts in a manner consistent with its risk management strategy and business needs.<\/p>\n<p>The following services are used for the identification of threats and risks:<\/p>\n<ul>\n<li>\u00a0Training in blockchain.<\/li>\n<li>\u00a0Cybersecurity training for connected and autonomous vehicles.<\/li>\n<li>\u00a0Cybersecurity functional test environment.<\/li>\n<li>\u00a0Industrial cybersecurity training for security operators and ethical hackers.<\/li>\n<li>\u00a0Cyber range training.<\/li>\n<li>\u00a0Test and demonstration environment for new security products.<\/li>\n<li>\u00a0Test and demonstration environment for new cyber range products.<\/li>\n<li>\u00a0Cybersecurity test environment and product and\/or process demonstration in a controlled environment.<\/li>\n<li>\u00a0Practical training in cybersecurity.<\/li>\n<li>\u00a0Product certification.<\/li>\n<li>\u00a0Realistic simulation of complete industrial environments, including IT and OT segments for testing cyber-defence against complex attacks.<\/li>\n<li>\u00a0IT\/OT test environment to test new network or processing equipment in a controlled, realistic and high-stress environment.<\/li>\n<li>\u00a0Test and demonstration environment in a context of IT\/OT convergence to validate the operation of specialised components in industrial cybersecurity.<\/li>\n<li>\u00a0Multi-domain cyber range.<\/li>\n<li>\u00a0Big Data and cybersecurity.<\/li>\n<li>\u00a0Industrial network analysis IEC 62264.<\/li>\n<li>\u00a0Cybersecurity assessment of industrial components and systems.<\/li>\n<\/ul>\n\t\t\t\t\t\tAsset protection\n\t\t\t\t\t\t\t\t\t\t\t<h2>Asset protection<\/h2>\n<p>Develop and implement appropriate security measures to ensure delivery of services. Asset protection includes the ability to limit or contain the impact of a potential cybersecurity incident.<\/p>\n<p>The following services are used for asset protection:<\/p>\n<ul>\n<li>\u00a0Training in blockchain.<\/li>\n<li>\u00a0Testing and demonstration environment for the use of blockchain in improving business.<\/li>\n<li>\u00a0Test and demonstration environment for new products with blockchain.<\/li>\n<li>\u00a0Cybersecurity training for connected and autonomous vehicles.<\/li>\n<li>\u00a0Simulation of real communications between control centres and electrical substations for cyber-attacks.<\/li>\n<li>\u00a0Simulation of real communications between control centres and electrical substations for cyber-defence.<\/li>\n<li>\u00a0Cyber range training.<\/li>\n<li>\u00a0Test and demonstration environment for new security products.<\/li>\n<li>\u00a0Test and demonstration environment for new cyber range products.<\/li>\n<li>\u00a0Cybersecurity test environment and product and\/or process demonstration in a controlled environment.<\/li>\n<li>\u00a0Practical training in cybersecurity.<\/li>\n<li>\u00a0Vulnerability and penetration testing.<\/li>\n<li>\u00a0Communications robustness testing.<\/li>\n<li>\u00a0Functional security testing.<\/li>\n<li>\u00a0Implementation testing.<\/li>\n<li>\u00a0Product certification.<\/li>\n<li>\u00a0PKI: Digital certificate management.<\/li>\n<li>\u00a0Realistic simulation of complete industrial environments, including IT and OT segments for testing cyber-defence against complex attacks.<\/li>\n<li>\u00a0Test and demonstration environment in a context of IT\/OT convergence to validate the operation of specialised components in industrial cybersecurity.<\/li>\n<li>\u00a0Industrial cybersecurity training for security operators and ethical hackers in the context of IT\/OT convergence of specific information systems.<\/li>\n<li>\u00a0Data analysis for cybersecurity.<\/li>\n<li>\u00a0Development of optimisation and Big Data applications robust to attacks.<\/li>\n<li>\u00a0Multi-domain cyber range.<\/li>\n<li>\u00a0Big Data and cybersecurity.<\/li>\n<li>\u00a0Industrial network analysis IEC 62264.<\/li>\n<li>\u00a0Cybersecurity assessment of industrial components and systems.<\/li>\n<\/ul>\n\t\t\t\t\t\tAttack detection\n\t\t\t\t\t\t\t\t\t\t\t<h2>Attack detection<\/h2>\n<p>Develop and implement appropriate tools to determine the nature and extent of cyberattacks on an entity. Attack detection includes the timely discovery of cybersecurity incidents.<\/p>\n<p>The following services are used for the detection of attacks:<\/p>\n<ul>\n<li>\u00a0Training in blockchain.<\/li>\n<li>\u00a0Testing and demonstration environment for the use of blockchain in improving business.<\/li>\n<li>\u00a0Test and demonstration environment for new products with blockchain.<\/li>\n<li>\u00a0Cybersecurity training for connected and autonomous vehicles.<\/li>\n<li>\u00a0Simulation of real communications between control centres and electrical substations for cyber-attacks.<\/li>\n<li>\u00a0Industrial cybersecurity training for security operators and ethical hackers.<\/li>\n<li>\u00a0Cyber range training.<\/li>\n<li>\u00a0Test and demonstration environment for new security products.<\/li>\n<li>\u00a0Test and demonstration environment for new cyber range products.<\/li>\n<li>\u00a0Cybersecurity test environment and product and\/or process demonstration in a controlled environment.<\/li>\n<li>\u00a0Practical training in cybersecurity.<\/li>\n<li>\u00a0Vulnerability and penetration testing.<\/li>\n<li>\u00a0Communications robustness testing.<\/li>\n<li>\u00a0Functional security testing.<\/li>\n<li>\u00a0Implementation testing.<\/li>\n<li>\u00a0Product certification.<\/li>\n<li>\u00a0IT\/OT test environment to test new network or processing equipment in a controlled, realistic and high-stress environment.<\/li>\n<li>\u00a0Industrial cybersecurity training for security operators and ethical hackers in the context of IT\/OT convergence of specific information systems.<\/li>\n<li>\u00a0Data analysis for cybersecurity.<\/li>\n<li>\u00a0Multi-domain cyber range.<\/li>\n<li>\u00a0Big Data and cybersecurity.<\/li>\n<li>\u00a0Cybersecurity assessment of industrial components and systems.<\/li>\n<\/ul>\n\t\t\t\t\t\tAttack response\n\t\t\t\t\t\t\t\t\t\t\t<h2>Attack response<\/h2>\n<p>Develop and implement appropriate measures to effectively mitigate identified cybersecurity incidents. Attack response supports the ability to contain the impact of a potential cybersecurity incident.<\/p>\n<p>The following services are used for attack response:<\/p>\n<ul>\n<li>\u00a0Training in blockchain.<\/li>\n<li>\u00a0Simulation of real communications between control centres and electrical substations for cyber-defence.<\/li>\n<li>\u00a0Industrial cybersecurity training for security operators and ethical hackers.<\/li>\n<li>\u00a0Cyber range training.<\/li>\n<li>\u00a0Test and demonstration environment for new security products.<\/li>\n<li>\u00a0Test and demonstration environment for new cyber range products.<\/li>\n<li>\u00a0Cybersecurity test environment and product and\/or process demonstration in a controlled environment.<\/li>\n<li>\u00a0Practical training in cybersecurity.<\/li>\n<li>\u00a0Test and demonstration environment in a context of IT\/OT convergence to validate the operation of specialised components in industrial cybersecurity.<\/li>\n<li>\u00a0Industrial cybersecurity training for security operators and ethical. hackers in the context of IT\/OT convergence of specific information systems.<\/li>\n<li>\u00a0Data analysis for cybersecurity.<\/li>\n<li>\u00a0Multi-domain cyber range.<\/li>\n<li>\u00a0Big Data and cybersecurity.<\/li>\n<\/ul>\n\t\t\t\t\t\tAsset recovery\n\t\t\t\t\t\t\t\t\t\t\t<h2>Asset recovery<\/h2>\n<p>Develop and implement appropriate action plans to recover from a cyber-attack and restore the capabilities or services that have been affected by it. Asset recovery enables a timely recovery to normal operations, which reduces the impact of a cybersecurity incident.<\/p>\n<p>The following services are used for asset recovery:<\/p>\n<ul>\n<li>\u00a0Training in blockchain.<\/li>\n<li>\u00a0Testing and demonstration environment for the use of blockchain in improving business.<\/li>\n<li>\u00a0Test and demonstration environment for new products with blockchain.<\/li>\n<li>\u00a0Cyber range training.<\/li>\n<li>\u00a0Test and demonstration environment for new security products.<\/li>\n<li>\u00a0Test and demonstration environment for new cyber range products.<\/li>\n<li>\u00a0Cybersecurity test environment and product and\/or process demonstration in a controlled environment.<\/li>\n<li>\u00a0Practical training in cybersecurity.<\/li>\n<li>\u00a0Realistic simulation of complete industrial environments, including IT and OT segments for testing cyber-defence against complex attacks.<\/li>\n<li>\u00a0IT\/OT test environment to test new network or processing equipment in a controlled, realistic and high-stress environment.<\/li>\n<li>\u00a0Multi-domain cyber range.<\/li>\n<li>\u00a0Industrial network analysis IEC 62.<\/li>\n<\/ul>\n\tView assets of node<br \/>\nCybersecurity\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\tSearch in the asset catalogue\n\t\t\t<\/a>\n\t<p>Contact your liaison<\/p>\n\t<p>This is our expert in Cybersecurity and will be in charge of assessing your needs.<\/p>\n\t<strong>David Gonz\u00e1lez<\/strong><br \/>\nIKERLAN<br \/>\n<a href=\"mailto:dgonzalez@ikerlan.es\"><strong>dgonzalez@ikerlan.es<\/strong><\/a><br \/>\n<strong>943 712 400<\/strong>\n\t\t\t<h2>Casos de uso<\/h2>\r\n\t\t\t\t\r\n\t\t<script>\r\n\t\t\tvar cases = [];\r\n\t\t\tvar carousel = '';\r\n\t\t\tvar target = '';\r\n\t\t\t$( document ).ajaxComplete(function() \r\n\t\t\t{\r\n\t\t\t\t\r\n\t\t\t\t$( '#main-toggler' ).click( function(){\r\n\t\t\t\t\t$( '#exitoCollapse' ).slideDown();\r\n\t\t\t\t\t$( '#main-toggler' ).hide();\r\n\t\t\t\t\t$( '#btn-container' ).show();\r\n\t\r\n\r\n\t\t\t\t});\r\n\t\t\t\t$( '#cierre-toggler' ).click ( function(){\r\n\t\t\t\t\t$( '#exitoCollapse' ).slideUp();\r\n\t\t\t\t\t$( '#main-toggler' ).show();\r\n\t\t\t\t\t$( '#btn-container' ).hide();\r\n\r\n\t\t\t\t});\r\n\t\t\t\t\r\n\t\t\t});\r\n\t\t\t$( document ).ready( function(){\r\n\t\t\t\t\r\n\t\t\t\t$( '#main-toggler' ).click( function(){\t\t\r\n\t\t\t\t\t$( '#exitoCollapse' ).slideDown();\t\t\t\r\n\t\t\t\t\t$( '#main-toggler' ).hide();\r\n\t\t\t\t\t$( '#btn-container' ).show();\r\n\r\n\t\t\t\t});\r\n\r\n\t\t\t\t$( '#cierre-toggler' ).click ( function(){\t\r\n\t\t\t\t\t$( '#exitoCollapse' ).slideUp();\t\t\t\t\t\r\n\t\t\t\t\t$( '#main-toggler' ).show();\r\n\t\t\t\t\t$( '#btn-container' ).hide();\r\n\t\t\r\n\t\t\t\t});\r\n\r\n\t\t\t\t\/\/ Carga por ajax de los casos de \u00e9xito del carousel\r\n\t\t\t\tvar target = '';\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\tvar carousel = '';\r\n\t\t \t\t$( '.carousel-img' ).each( function(){\r\n\t\t \t\t\tcarousel += $(this).attr('data-value') + ',';\r\n\t\t \t\t\t\r\n\t\t \t\t});\r\n\t\t \t\tcarousel += ','\r\n\t\t \t\t$('.owl-item').last().hide();\r\n\t\t \t\t$('.owl-item').last().hide();\r\n\r\n\t \t\t\t$( '.imgbtn' ).click( function(){\r\n\t \t\t\t\t\r\n\t \t\t\t\ttarget = $( this ).find( '.carousel-img' ).attr( 'data-value');\r\n\t \t\t\t\t\r\n\t \t\t\t\t$( '#container' ).load('https:\/\/bdih.spri.eus\/es\/ajax-loader\/?lang=en&case=' + target);\r\n\t \t\t\t\t$( '.active').show();\r\n\t \t\t\t\t$('.owl-item').last().show();\r\n\t \t\t\t\t$(this).parent().parent().hide();\r\n\t \t\t\t\tvar aTag = $('#startsc');\r\n    \t\t\t\t$('html,body').animate({scrollTop: aTag.offset().top},'slow');\r\n\t \t\t\t});\r\n\r\n\t \t\t\t$( '.loader-btn' ).click( function(){\r\n\t \t\t\t\r\n\t \t\t\t\ttarget = $( this ).attr( 'data-value');\r\n\t \t\t\t\t\r\n\t \t\t\t\t$( '#container' ).load('https:\/\/bdih.spri.eus\/es\/ajax-loader\/?lang=en&case=' + target);\r\n\t \t\t\t\t$( '.active').show();\r\n\t \t\t\t\t$('.owl-item').last().show();\r\n\t \t\t\t\t$(this).parent().parent().parent().parent().hide();\r\n\t \t\t\t\tvar aTag = $('#startsc');\r\n    \t\t\t\t$('html,body').animate({scrollTop: aTag.offset().top},'slow');\r\n\t \t\t\t});\r\n\r\n\t\t\t});\r\n\r\n\t\t\t\r\n\t\t\t\tjQuery('.posts-carousel').owlCarousel({\r\n\t\t\t\t\tloop:false,\r\n\t\t\t\t\tautoplay:false,\r\n\t\t\t\t\tautoplayTimeout:5000,\r\n\t\t\t\t\tautoplayHoverPause:false,\r\n\t\t\t\t\tnav: true,\r\n\t\t\t\t\t\/\/navText: [\"<\",\">\"],\r\n\t\t\t\t\tdots: false,\r\n\t\t\t\t\tmargin:0,\r\n\t\t\t\t\tresponsiveClass:true,\r\n\t\t\t\t\tnavText: ['<i class=\"fas fa-angle-left\"><\/i>','<i class=\"fas fa-angle-right\"><\/i>'],\r\n\t\t\t\t\tresponsive:{\r\n\t\t\t\t\t\t0:{\r\n\t\t\t\t\t\t\titems:1,\r\n\t\t\t\t\t\t\tnav:true,\r\n\t\t\t\t\t\t\tautoplayTimeout:7000,\r\n\t\t\t\t\t\t\tautoplay:true,\r\n\t\t\t\t\t\t\tloop: true\r\n\t\t\t\t\t\t},\r\n\t\t\t\t\t\t600:{\r\n\t\t\t\t\t\t\titems:2,\r\n\t\t\t\t\t\t\tnav:true,\r\n\t\t\t\t\t\t},\r\n\t\t\t\t\t\t832: {\r\n\t\t\t\t\t\t\titems:3,\r\n\t\t\t\t\t\t\tnav:true\r\n\t\t\t\t\t\t},\r\n\t\t\t\t\t\t1000:{\r\n\t\t\t\t\t\t\titems:4,\r\n\t\t\t\t\t\t\tnav:true\r\n\t\t\t\t\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t})\r\n\t\t\r\n\t\t<\/script>\r\n\r\n\t\t\n\n","protected":false},"excerpt":{"rendered":"<p>Nodes &gt; Cybersecurity Real environments for testing, operation simulation and cybersecurity training Cybersecurity is a fundamental aspect for organisations and is becoming increasingly relevant as companies move forward in their digitisation process.\u00a0 The Basque Digital Innovation Hub&#8217;s Cybersecurity focus area provides companies with an authentic environment for testing, simulation and training. This focus area is&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":456,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-556","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/pages\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/comments?post=556"}],"version-history":[{"count":5,"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/pages\/556\/revisions"}],"predecessor-version":[{"id":6216,"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/pages\/556\/revisions\/6216"}],"up":[{"embeddable":true,"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/pages\/456"}],"wp:attachment":[{"href":"https:\/\/bdih.spri.eus\/en\/wp-json\/wp\/v2\/media?parent=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}