Cyber Conflict Simulator is an excellent tool which can contribute to the training of the personnel of Republic of Croatia's armed forces. The main advantage of CCS is that it fills a gap that exists in the development of cybernetic capabillities, between the technical and the managerial level. The functionalities of CCS enable a unique approach to the simultaneous training of a wide spectrum of personnel on all levels.
Brigadier general Ante Tolić
chief of administration for communication and information systems GS OS RH
The exercise was very usefull, inovative and serves as a good “training” for any eventual actions that would have to be taken in the case of a cybernetic incident. The CCS simulation had enabled all the activities that were foreseen by the scenario. I absolutely have an interes in conducting additional excercises. I am expecially amazed by the capabillities of CCS when it comes to determining the cause of an incident, preventing the spreading of incidents and removing of the cause of an incident. The biggest advantages and values that can be derived from conducting this exercise are the newfound knowledges about the methods and types of cybernetic attacks and the approach to the solving of problems that crop up as a result of these attacks.
Dejan Knežević
CIO, Imex bank Plc.
By conducting an exercise using CCS, we improve the reponce capabilities of our bank to any cybernetic incidents. The biggest use for these excercises are in the areas of conscious awareness raising, lessons learned and in the encouragement of personell to undertake actions to improve the management of ou information system.
Dušanka Mišković
IT advisor for the Management board, Imex banka Plc.
The onduct of this exercise was immensely usefull. All the functionalities are surprisingly well thought-out. We have an interes in conducting periodic excercises in various scenarios once or twice a year. As fro the greatest benefits of conducting this exercise, that would be the acquisition of experience in managing a cybernetic incident response, like Flight simulator. Through repeated excercises, we would achieve an efective and optimal response to individual types of cyberspace occurences.
Srećko Bartol
CISO, Kentbank Plc.
By conducting this exercise, we have improved the capabilities of our bank’s incident response team, which have been subsequently confirmed in operative work. I think that CCS offers an excellent training when it comes to being able to respond to an unforseen situation.
Franjo Prgić
CIO, Kentbank Plc.
The conducting of this exercise constituted a good preparation for a real situation. By enacting a simulation with a layout similar to our infrastrucutre, new ideas for protection level raising can be introduced on individual system parts. The app is excellent, with the suggestion of implementing the greatest number of attack scenarios possible.
Branimir Ivošević
IT infrastructure department manager, Kentbank Plc.
It is my opinion that conducting excercises of this type greately increases team capabilities in regards to being able to respond to cybernetic incidents within our organisation. I consider the gratest use of cnoducting this exercise to be the confirmation of the “lessons learned” term which, in these types of aplications, gives a full meaning to the updating of an otherwise lifeless DR procedures and instructions. I had taken part in numerous response to cybernetic incidents excercises of vareous types and it was a regual occurrence the the documentation proved to be ineffective and slow to update. Having conducted a CCS exercise, my observations are the following: there was an improvement in communications, as well as a need to form a “technical” checklist in the case of an incident, the need for further team training, the importance of the role of management in the resolving of incidents and so on.
Dalibor Uremović
IT security consultant, Alterinfo Ltd.
The exercise was extremely usefull and it can greately assist in bringing awarenes to companies about potential threats, as well as in the development of incident and crisis management strategies. The exercise is constituted of a walkthrough of a specific scenario which can be adjusted to fit an existing infrastructure, with the attacking and the defending side being the participants. Both sides have their own set of actions and their own technical staff with certain skills, through which a ceratin level of realism is achieved. At the very end of the exercise, all parties go through an analysis of decisions made and “lessons learned” which can be applied in real future situations. I think that the CCS simulation is an excellent product that has the potential to succed on a global level.
Mario Krbot
Junior consultant for IT security, Diverto Ltd.
A very interesting tool which enables a very realistic simulation of computing network activity. CCS enables an activity simulation along with a time duration of said activity, which gives us and excellent insight into the process of preparation and management, as with people, so with time. Additionally, the simultaneous showcasing of both the offensive and the defensive aspect makes for an excellent preparation for all those individuals have a plan to involve themselves in information technologies security in the future. Therefore, I can say with certainty that CCS is a valuable and welcomo educational tool.
Drago Ćavar
IT security specialist, Avola Solutions Ltd.