
Industrial Cybersecurity
By :

Like red team exercises, blue team exercises involve a group of cybersecurity experts who assess a system or an organization to identify any potential vulnerabilities that affect devices or critical systems that the organization owns. However, where red team exercises will typically try to exploit the discovered vulnerabilities, blue team exercises aim to find viable ways to improve the ability to avoid, deter, resist, and respond to potential threats that were uncovered. The ultimate goal of blue team exercises is finding ways to increase the dependability of all electronic assets owned by the organization, whether they are internally or externally hosted. The blue team members will be responsible for monitoring, detecting, and reacting to security threats and should largely be employees of the organization.
Blue team exercises should be modeled around real-world threats that are plausible to be targeted at the organization (actionable exercises). During a blue...