training in the
play

TRAINING IN THE INFORMATION AGE Cyber warfare and beyond Michael - PowerPoint PPT Presentation

TRAINING IN THE INFORMATION AGE Cyber warfare and beyond Michael Pegelow Key Account Manager GESI 17.05.2018 Your worldwide training partner of choice Training today Focusing on Command And Staff Training (CAST) Your worldwide training


  1. TRAINING IN THE INFORMATION AGE Cyber warfare and beyond Michael Pegelow Key Account Manager GESI 17.05.2018 Your worldwide training partner of choice

  2. Training today Focusing on Command And Staff Training (CAST) Your worldwide training partner of choice

  3. TYPICAL CONTENTS OF TODAY’S CAST Combat/battle training • Training of warfare scenarios • Establishing standard operation procedures Decision making • Analysis of status reports and current situations • Planning & execution of operations Mission rehearsal • Planning and testing of different scenarios • Defining standard operation procedures Emergency management • Training incident management teams on major events • Coordination of emergency forces 3 CAE Inc. Proprietary Information and/or Confidential

  4. CHARACTERISTICS OF CAST ► Evaluation of current situation  Initial situation/evolving situation  Threat/opposing forces  Groups involved  Other influencing factors ► Planning activities  Deployment of forces  Areas of operation  Rules of engagement  Detailed mission planning ► Coordination of  Movement  Actions  Communication 4 CAE Inc. Proprietary Information and/or Confidential

  5. ‚CLASSICAL‘ MILITARY CAST SCENARIO  Clearly defined mission types  Clearly defined objective with intermediate objectives  Enemy with predictable tactical behavior  Groups are known with assumed behavior 5 CAE Inc. Proprietary Information and/or Confidential

  6. ‚CLASSICAL‘ CIVIL CAST SCENARIO  Major incident as initial situation  Main objective: coordination of all emergency response activities  Take into account the influence of the incident on population and initiate corresponding actions like traffic control or evacuation Major Area of incident interest 6 CAE Inc. Proprietary Information and/or Confidential

  7. The information age Your worldwide training partner of choice

  8. CHARACTERISTICS OF THE INFORMATION AGE Social Media Information Clash of cultures overflow Digitali- Complex sation systems Connected world Individual radicalism CAE Inc. Proprietary Information and/or Confidential

  9. FACING THREATS Asymmetric Warfare • Belligerents with significant different military power • ‘alternative’ tactics (e.g. moving combat into urban terrain) International terrorism • Internationally operating terroristic organizations • Complex terroristic actions by individuals Information warfare • Situation reports by individuals • Active publishing of fake news Cyber warfare • Cyber crime activities • Sabotage of critical infrastructure 9 CAE Inc. Proprietary Information and/or Confidential

  10. POTENTIAL TARGETS FOR AGGRESSORS Water Traffic & transportation Media Power Communication Governmental services Healthcare Finance Critical Infrastructure 10 CAE Inc. Proprietary Information and/or Confidential

  11. Training in the information age Your worldwide training partner of choice

  12. TRAINING IN THE INFORMATION AGE  Unpredictable and invisible opponents  Corrupted communication systems  New communication channels in the area of operation  Cyber attacks on operational systems 12 CAE Inc. Proprietary Information and/or Confidential

  13. TRAINING IN THE INFORMATION AGE  Information overflow due to individual status reports via social media  Multiple spots due to reported assumed incidents  Intentionally spreading of fake information  Unpredictable behavior of population Major Assumed incident incident Assumed incident Fake incident 13 CAE Inc. Proprietary Information and/or Confidential

  14. CYBER IN TRAINING Objectives  Increase awareness to the threats of cyber attacks  Understand the different strategies to attack IT-systems  Learn counter-measures against cyber attacks  Improve security of systems  Manage key resources CAE Inc. Proprietary Information and/or Confidential

  15. SOCIAL MEDIA IN TRAINING Objectives  Understand how information is shared with social media  Analyze the influence of social media to the society  Increase the awareness to the threat of affected information in social media  Use tools or techniques to influence social media  Include social media in military and/or civil operations CAE Inc. Proprietary Information and/or Confidential

  16. SOCIETY IN TRAINING Objectives  Impact of attacks on critical infrastructure • Cyber attacks • Bombing • Others  Behavior of crowds influenced by incidents, social media, etc.  Effects of • Using emergency/security forces • Crowd control • Broadcasting information on different communication channels CAE Inc. Proprietary Information and/or Confidential

  17. TRAINING IN THE INFORMATION AGE Major Assumed incident incident Assumed incident Fake incident 17 CAE Inc. Proprietary Information and/or Confidential

  18. CAE ´ S COMMAND AND STAFF TRAINER Commander & Staff Train as you fight 18 CAE Inc. Proprietary Information and/or Confidential

  19. CAE ´ S COMMAND AND STAFF TRAINER Military & civil units Medical service Event system CBRN & flood Population & riot etc. Social media 19 CAE Inc. Proprietary Information and/or Confidential

  20. GESI has various features to train the new challenges according to the threats of the information age. Feel invited to share your ideas with us! 20 CAE Inc. Proprietary Information and/or Confidential

  21. Thank you! Michael Pegelow Key Account Manager GESI Email: michael.pegelow@cae.com Phone: +49 2402 106-673 Your worldwide training partner of choice

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend