The four pilot application scenarios will actively engage stakeholders coming from four critical infrastructure sectors and featuring different characteristics, services, infrastructures and training needs.
Pilot case 1
Telecom (OTE)
The Hellenic Telecommunications Organisation S.A. (OTE) operates a large digital infrastructure ecosystem for ICT services, consisting of complex systems ranging from network equipment to interconnected services. A 3-tier architecture segregates access layers: presentation, application, and data layers, with the latter two residing in a scalable virtual infrastructure facilitating various services from mediation to customer relationship management. The platform aims to benefit by identifying executive decision points, assessing cyber-attack impacts, training response teams, enhancing situational awareness, identifying vulnerable systems, and simulating attack and response scenarios including ransomware and Distributed Denial of Service (DDoS) attacks.
Pilot case 2
Energy (PPC)
PPC operates a significant energy infrastructure, including the PPC Innovation Hub, offering services like laboratory tests, NDT inspections, and R&D activities. The pilot infrastructure exchanges data such as network traffic, electrical measurements, and incident reports for diagnostics and maintenance. Objectives include evaluating cyber-attack detection accuracy and deploying tools for attack recognition and mitigation, aiming to increase automation, cyber-resilience, and uninterrupted electricity production. Attack scenarios involve planning mitigation actions, re-training models for infrastructure changes, addressing zero-day threats and Advanced Persistent Threats (APTs). Training scenarios cover detection, prevention, simulation, analysis, policies, automation, and knowledge enhancement.
Pilot case 3
HealthCare (PAGNI)
PAGNI, the largest hospital facility in Crete, operates an integrated information system linking medical care, pharmacy, and patient records, with servers running services like authentication and data storage. Security features include Role-Based Access Control, daily data backups, software maintenance, network security practices, and certified server rooms. Expected benefits encompass cybersecurity awareness, protection plans, preparedness for attacks, and training opportunities for staff and students. Attack scenarios include ransomware, phishing, insider threats, data breaches, malicious software, and denial-of-service attacks. Training scenarios involve critical system simulation, cyber attack detection and prevention exercises, real-time network operations management, phishing simulation, malware detection exercises, and healthcare personnel training on securing medical devices.
Pilot case 4
Maritime (DSA)
DSA will organize and implement a pilot scenario focused on the maritime sector, encompassing both ashore and ship domains and components. The scenario will examine the onboard infrastructure of a specific ship type and its interconnected ashore infrastructure for the ship’s operator organization. Expected benefits include live reaction and planning of cyber defense, improved monitoring and analysis of attacks, and optimization of the information analysis process to validate business continuity plans and scenarios. Attack scenarios involve various cyber threats targeting Maritime IT/OT systems onboard ships and ashore, including ransomware, denial of service, spoofing attacks, and sophisticated attacks altering ship behavior. Training scenarios simulate complex cyber threats relevant to maritime ICT infrastructure, AIS message manipulation, navigation system spoofing, ransomware attacks on critical systems, and scenarios tailored to different user profiles.