Skip to main content

Cyber Guardian Exercise: A Case Study in Brazil to Address Challenges in Cybersecurity and Protect Critical Infrastructure

Discussions of cybersecurity, in particular those associated with critical infrastructure (CI), often seem alarmist, but crippling attacks against critical infrastructure have already taken place in Estonia and Ukraine demonstrate this concern and need to be addressed. Specialists use catastrophic scenarios in which cyberattacks can lead to massive blackouts and substantial economic losses as a way to draw attention to cybersecurity issues. Cyberattacks may generate kinetic and non-kinetic effects on CI of interest to National Defense, with the risk of causing strategic paralysis in the functioning of countries.

To address these challenges, Brazil needs to create the necessary conditions to establish important principles of cyber protection for national sectors and strategic infrastructure, aiming to form a solid cybersecurity community based on the exchange of experiences and a strong partnership. One of the approaches consists in carrying out the Brazil Cyber Guardian Exercise (CGE) that establishes cyber protection principles for important national and critical infrastructure sectors in Brazil.

SANS-cyber-guardian-exercise-case-study-brazil-address-challenges-cybersecurity-protect-critical-infrastructure (PDF, 3.34MB)

22 Feb 2022
ByMaxli Barroso Campos
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Malware Function-based encryption technique

Research Paper

Recent malware often uses techniques to evade detection by cybersecurity products. One of the...

  • 22 Jun 2022

Detecting Unauthorized Behavior From Legitimate Accounts

Research Paper

Incident Responders face an almost insurmountable amount of log events, and the move to the Cloud...

  • 22 Jun 2022

Recover an RSA Private Key from a TLS v1.2 session

Research Paper

Cyberattacks happen every day.Most organizations have administrative and technical controls...

  • 22 Jun 2022

Manage Open-Source Components via Secure Product Development Lifecycle in Industrial Control System

Research Paper

Nowadays, open-source components are becoming the essential components in industrial control systems...

  • 14 Feb 2022

Recommendations for small/medium-sized businesses enabling incident response

Research Paper

Security incidents are inevitable. While large businesses can afford security teams to prepare and...

  • 17 Jan 2022

Black-Box Fuzzing for Android Native Libraries

Research Paper

Many Android application developers are adopting C\C++ native language development in their Android...

  • 12 Jan 2022

ICS within the NIS Directive should be ATT&CK®ed

Research Paper

In August 2016, the European Parliament and the Council of the European Union implemented the first...

  • 25 Aug 2021

Machine Learning Techniques for Intrusion Detection

Research Paper

This paper aims to equip intrusion analysts with the basic techniques needed to apply machine...

  • 9 Jun 2021

Detecting DLL Search Order Hijacking: How using a purple team approach can help create better defensive techniques and a more tactical SIEM

Research Paper

Many SIEM analysts will recognize the feeling of being overwhelmed with security logs and alerts,...

  • 4 May 2020

Corporate Information Governance with Business Wisdom

Research Paper

Whether a secret ingredient used for a lemonade stand across the street or the business strategies...

  • 4 May 2020

ICS OT Systems Security Engineering Is Not Dead

Research Paper

ICS OT Systems Security Engineering Is Not Dead

  • 23 Mar 2020

Automated Detection and Disinfection of Ransomware Attacks using Roadblock Software

Research Paper

We often hear about ransomware locking data and demanding the ransom. Ransomware is a kind of...

  • 18 Mar 2020

Assisted Security Investigations Using Cognitive Computing

Research Paper

The purpose of this research is to illustrate the application of cognitive computing and machine...

  • 3 Dec 2019

Leveraging the PE Rich Header for Static Malware Detection and Linking

Research Paper

An ever-increasing number of malware samples are identified and assessed daily. Malware researchers...

  • 1 Jul 2019

Analysis of a Multi-Architecture SSH Linux Backdoor

Research Paper

A key aspect in any intrusion is to attempt to gain persistence on the compromised system. Threat...

  • 17 Jun 2019

Unpacking and Decrypting FlawedAmmyy

Research Paper

Malware authors commonly utilize packers (Roccia, 2017) as a method of concealing functionality and...

  • 22 Apr 2019

Continuous Security Monitoring in non-Active Directory Environments

Research Paper

Active Directory-centric monitoring techniques, tools, and methodologies have dominated information...

  • 20 Feb 2019

Intrusion Prevention System Signature Management Theory

Research Paper

The intrusion prevention system (IPS) serves as one of the critical components for a...

  • 5 Feb 2019

ICS Layered Threat Modeling

Research Paper

The ultimate goal of building cybersecurity architecture is to protect systems from potential...

  • 22 Jan 2019

SDN Southbound Threats

Research Paper

SDN (Software-Defined Networks) technologies are based on three pillars: decoupling control and...

  • 20 Nov 2018

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.