{"id":13293,"date":"2022-02-25T09:17:00","date_gmt":"2022-02-25T09:17:00","guid":{"rendered":"https:\/\/www.cyber40.it\/cyber-range-and-cyber-exercises\/"},"modified":"2025-05-16T10:11:52","modified_gmt":"2025-05-16T10:11:52","slug":"cyber-range-and-cyber-exercises","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/","title":{"rendered":"Cyber Range and Cyber Exercises"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cyber Range and Cyber Exercises<\/h1>\n\n<p>FEBRUARY 25, 2022<\/p>\n\n<p>Today, security is no longer a technology issue: proper preparation and ongoing training, including operational training, provide a key tool for companies and institutions to protect their data, information and digital infrastructure.<\/p>\n\n<p>That&#8217;s why Cyber 4.0 decided to involve partners Leonardo and AizoOn Technology Consulting, members of the competence center, in bringing their insights on the importance of advanced training through the use of the Cyber Range: the training theater that allows companies to practice and train against cyber threats.<br\/>The webinar will be held online Friday, Feb. 25 at 11:00 AM (CET)<\/p>\n\n<p>Participating in the webinar will help:<br\/>&#8211; Learn about the Cyber Range and its benefits for businesses: from developing skills to fine-tuning processes, from conducting industry exercises to infrastructure security audits.<br\/>&#8211; Learn about the logic of a cyber exercise carried out in an environment isolated from the corporate infrastructure, realistically replicated and simulated by virtualizing a Digital Twin.<br\/>&#8211; Deepen and assess one&#8217;s Security Posture, i.e., the state of security of one&#8217;s corporate infrastructure, the ability to organize its defenses, and the efficiency of response to possible attacks.<br\/>The initiative is aimed at CISOs, CIOs, Cyber Experts, Risk and Security Specialists, Managers of companies, institutions, public and private organizations.<\/p>\n\n<p>The Cyber Range is a solution that realistically simulates a complex virtual training scenario to prepare personnel, systems, and processes to face cyber threats and recognize vulnerabilities.<\/p>\n\n<p>At the end of the exercise, teams are evaluated on the organizer&#8217;s ability to defend themselves and on the basis of Security Posture.<br\/>During the webinar &#8220;Cyber Range and Cyber Exercises,&#8221; speakers, experts in the field will tell:<br\/>&#8211; what it means to prepare, participate and analyze the results of a cyber exercise<br\/>&#8211; the strategic benefits for companies that train their staff against Cyber attacks<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Range and Cyber Exercises FEBRUARY 25, 2022 Today, security is no longer a technology issue: proper preparation and ongoing training, including operational training, provide a key tool for companies and institutions to protect their data, information and digital infrastructure&#8230;.<\/p>\n","protected":false},"author":11,"featured_media":11408,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":0,"footnotes":""},"categories":[612],"tags":[],"class_list":["post-13293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-cyber-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Range and Cyber Exercises - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Range and Cyber Exercises - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Cyber Range and Cyber Exercises FEBRUARY 25, 2022 Today, security is no longer a technology issue: proper preparation and ongoing training, including operational training, provide a key tool for companies and institutions to protect their data, information and digital infrastructure....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-25T09:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T10:11:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"862\" \/>\n\t<meta property=\"og:image:height\" content=\"862\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Cyber Range and Cyber Exercises\",\"datePublished\":\"2022-02-25T09:17:00+00:00\",\"dateModified\":\"2025-05-16T10:11:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\"},\"wordCount\":308,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png\",\"articleSection\":[\"Cyber 4.0 Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\",\"name\":\"Cyber Range and Cyber Exercises - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png\",\"datePublished\":\"2022-02-25T09:17:00+00:00\",\"dateModified\":\"2025-05-16T10:11:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png\",\"width\":862,\"height\":862,\"caption\":\"Evento Leonardo Aizoon uai 862x862 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Range and Cyber Exercises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Range and Cyber Exercises - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Range and Cyber Exercises - Cyber 4.0","og_description":"Cyber Range and Cyber Exercises FEBRUARY 25, 2022 Today, security is no longer a technology issue: proper preparation and ongoing training, including operational training, provide a key tool for companies and institutions to protect their data, information and digital infrastructure....","og_url":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/","og_site_name":"Cyber 4.0","article_published_time":"2022-02-25T09:17:00+00:00","article_modified_time":"2025-05-16T10:11:52+00:00","og_image":[{"width":862,"height":862,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png","type":"image\/png"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Cyber Range and Cyber Exercises","datePublished":"2022-02-25T09:17:00+00:00","dateModified":"2025-05-16T10:11:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/"},"wordCount":308,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png","articleSection":["Cyber 4.0 Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/","url":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/","name":"Cyber Range and Cyber Exercises - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png","datePublished":"2022-02-25T09:17:00+00:00","dateModified":"2025-05-16T10:11:52+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png","width":862,"height":862,"caption":"Evento Leonardo Aizoon uai 862x862 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/cyber-range-and-cyber-exercises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Range and Cyber Exercises"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":612,"label":"Cyber 4.0 Events"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/Evento-Leonardo-Aizoon-uai-862x862-1.png",862,862,false],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":612,"name":"Cyber 4.0 Events","slug":"events-cyber-4-0-en","term_group":0,"term_taxonomy_id":612,"taxonomy":"category","description":"","parent":0,"count":50,"filter":"raw","term_order":"0","cat_ID":612,"category_count":50,"category_description":"","cat_name":"Cyber 4.0 Events","category_nicename":"events-cyber-4-0-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13293"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11408"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}