0 0
Read Time:1 Minute, 49 Second

On June 23-24, 2022, the XIII meeting of the Council of the Consultative Coordination Center of the Collective Security Treaty Organization on Response to Computer Incidents (CSTO CCC) was held in Yerevan, which was attended by delegations of representatives of the relevant national authorized bodies

Members of the CSTO CCC Council

▪️discussed the most relevant information security threats such as phishing and DDoS attacks,

▪️compared the current situation in the field of information security with the situation in 2021,

▪️stressed the importance of further development of information exchange in detecting, preventing and eliminating the consequences of computer attacks, as well as responding to computer incidents.

CCC members discussed the concept and preparation of the planned technical training on computer security in the second half of this year.

The XIII meeting of the Council of the CSTO Advisory Coordination Center on Response to Computer Incidents was held

Members of the CSTO CCC Council discussed the most pressing information security threats such as phishing and DDoS attacks. We compared the current situation in the field of information security with the situation in 2021. They emphasized the importance of further development of information exchange in detecting, preventing and eliminating the consequences of computer attacks, as well as responding to computer incidents.

The participants of the meeting considered the nature of the attacks, noted the importance of raising user awareness of information security issues, and exchanged information on national approaches to countering the functioning of phishing resources. The CCC also discussed the measures necessary to combat botnets, the importance of interaction with telecom operators was emphasized. The national approaches and practices used in the CSTO member states were considered.

Members of the CCC discussed the concept and preparation of the planned technical training on computer security in the second half of this year. They shared their positive experience in ensuring the protection of national critical information infrastructure facilities from cyber threats, information about computer incidents in the information spaces of the CSTO member states, and information and analytical materials provided by national contact points.

The host Armenian side familiarized the participants with a deployed software and hardware complex for countering computer attacks using the example of one of the national critical information infrastructure facilities, which was modernized this year

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence