{"id":55989,"date":"2024-05-03T14:23:44","date_gmt":"2024-05-03T14:23:44","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35845\/Lessons-From-LOCKED-SHIELDS-2024-Cyber-Exercise.html"},"modified":"2024-05-03T14:23:44","modified_gmt":"2024-05-03T14:23:44","slug":"lessons-from-locked-shields-2024-cyber-exercise","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/","title":{"rendered":"Lessons From LOCKED SHIELDS 2024 Cyber Exercise"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/04\/53676624920_98e90ad5b6_k.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><em>Parham Eftekhari, Executive Vice President of Communities at CyberRisk Alliance, attended the LOCKED SHIELDS 2024 cyber exercise last week. What follows are his takeaways from the event.<\/em><\/p>\n<p>On April 18, &nbsp;FBI Director Christopher Wray warned national security and intelligence experts that the risk the government of China poses to U.S. national and economic security are \u201cupon us now\u201d\u2014and that <a href=\"https:\/\/www.scmagazine.com\/brief\/fbi-disruptive-chinese-attacks-against-us-infrastructure-imminent\">U.S. critical infrastructure is a prime target<\/a>.&nbsp;<\/p>\n<p>\u201cThe PRC [People\u2019s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to induce panic and break America\u2019s will to resist,\u201d he said during his remarks at the Vanderbilt Summit on Modern Conflict and Emerging Threats in Nashville.&nbsp;<\/p>\n<p>To neutralize this threat, Wray and other national security leaders have called for stronger partnerships between governments, commercial, and academic institutions.<\/p>\n<h2>LOCKED SHIELDS 2024<\/h2>\n<p>Last week, I witnessed firsthand how partnerships can combat cyber threats when I had the privilege of attending Exercise LOCKED SHIELDS 2024, the largest and most complex international live-fire cyber defense exercise in the world with more than 3,000 participants from 38 nations.&nbsp; &nbsp;<\/p>\n<p>As a participant in the exercise\u2019s Distinguished Visitors Day representing the <a href=\"https:\/\/www.icitech.org\/\">Institute for Critical Infrastructure Technology<\/a> (ICIT) in my capacity as Chairman alongside ICIT CEO Cory Simpson, I had the opportunity to attend several briefings and roundtable sessions where domestic and international partnerships were highlighted as a mission-critical component of our national security strategy.&nbsp; Throughout the day I learned about ongoing efforts by state and federal agencies to strengthen critical infrastructure resilience by solving some of today\u2019s most pressing challenges including workforce development, security-by-design, and cross-sector information sharing.<\/p>\n<p>The <a href=\"https:\/\/www.jfhq-dodin.mil\/\">U.S. Cyber Command&#8217;s Joint Force Headquarters-Department of Defense Information Network<\/a> (JFHQ-DODIN ) and its National Center of Excellence for Cybersecurity in Critical Infrastructure led the U.S. team\u2019s operations, consisting of international partners from Norway and Montenegro and domestic partners from across government, industry, and academia.&nbsp; Exercise LOCKED SHIELDS 2024 U.S. operations were held at the University of West Virginia Campus in Morgantown, W.V., a reflection of the state\u2019s impact on the cybersecurity sector with W.V. natives like Senator Shelley Moore Capito, Karen Evans, Travis Rosiek, and ICIT\u2019s Simpson <a href=\"https:\/\/wvrecord.com\/stories\/655670170-west-virginia-at-the-forefront-of-u-s-cybersecurity-cloud-computing\">propelling the state to the forefront of cybersecurity and cloud computing<\/a>.<\/p>\n<p>The exercise served as a crucible for honing cyber defense capabilities on a global scale, with the U.S. Team&#8217;s training objectives focused on:<\/p>\n<div>\n<ul>\n<li>Building interagency, intergovernmental, and multinational cyber protection and response relationships.<\/li>\n<li>Sharing innovative best practices in cyber defense.<\/li>\n<li>Recruiting and training the next generation of cyber professionals while promoting STEM careers within the Department of Defense.<\/li>\n<li>Strengthening mission-critical infrastructure protection efforts through collective action.<\/li>\n<\/ul>\n<\/div>\n<h2>Takeaways from the exercise<\/h2>\n<p>The simulation during LOCKED SHIELDS vividly showcased the interdependencies of IT and OT in critical infrastructures under attack, something CRA focused on in <a href=\"https:\/\/www.scmagazine.com\/ciso-stories\">our April installment of CISO Stories<\/a>. Among the lessons learned during this exercise are the fact that attackers are taking particular advantage of the <a href=\"https:\/\/www.scmagazine.com\/whitepaper\/the-state-of-ot-security-narrowing-the-gap\">interdependencies of IT and OT in such critical infrastructures<\/a> as:<\/p>\n<div>\n<ul>\n<li>Energy,<\/li>\n<li>Oil and gas,&nbsp;<\/li>\n<li>The finance sector, and&nbsp;<\/li>\n<li>The defense industrial base&nbsp;<\/li>\n<\/ul>\n<\/div>\n<p>As we noted in <a href=\"https:\/\/www.scmagazine.com\/whitepaper\/the-state-of-ot-security-narrowing-the-gap\">a related CISO Stories eBook<\/a>, organizations are so focused on computers, smartphones and artificial intelligence that we often forget about the physical technology that generates the electricity, assembles the hardware and transports the engineers and specialists that computer systems need in order to operate.<\/p>\n<p>Yet this &#8220;operational technology&#8221; needs cybersecurity too. That&#8217;s because factories, pipelines, power plants, transit systems and even cars and trucks are managed and regulated by computerized industrial control systems or embedded digital devices.<\/p>\n<p>Unfortunately, the digital security of operational technology lags years, even decades, behind that of traditional information technology. Attackers have learned to exploit this security gap, but in response, industry and government authorities are crafting new guidelines and frameworks to protect OT systems, especially those having to do with critical infrastructure.<\/p>\n<p>The Achilles&#8217; heel of operational-technology security is time. Computers and smartphones have short lifespans, with older models being replaced every three to eight years. Except for some &#8220;big iron&#8221; servers, the cybersecurity industry assumes that IT hardware and personal devices will completely turn over at least every 10 years. Google stops updating Pixel phones after three, five or seven years, depending on the model; Microsoft&#8217;s Windows 11 won&#8217;t run on PCs built before 2017.<\/p>\n<p>Anything older is a &#8220;legacy&#8221; system. Physical technology, on the other hand, needs to run for decades. Commercial airliners are built to last 25 or 30 years. The New York City subway system is still replacing switching and signaling systems that date back to the 1930s. Even regular passenger vehicles, once considered disposable after three or four years, are now expected to last seven, 10 or 12 years before being replaced.<\/p>\n<p>OT networks are often unsegmented, allowing intruders free rein once past the perimeter; communications protocols are weakly encrypted or plaintext; administrative passwords are often unchanged from the defaults (as any SHODAN scan will reveal), or may be shared among several individuals; remote access is often set up without the proper safeguards.<\/p>\n<p>LOCKED SHIELDS 2024 exercises focused on such vulnerabilities and how different agencies and private organizations can work together to mitigate risk and blunt the force of any future attack.<\/p>\n<h2>Conclusion<\/h2>\n<p>I was honored to be invited to Distinguished Visitors Day at Exercise LOCKED SHIELD 2024 and left feeling inspired and energized to support the National Center of Excellence for Critical Infrastructure Security \u2013 a partnership between JFHQ-DODIN, West Virginia University, Marshall University, and private industry \u2013 as it works to address shared critical infrastructure challenges. &nbsp;With public and private sector partnerships playing an increasingly vital role in our national security, please consider how your organization can support our shared mission to create a safer future domestically and abroad.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35845\/Lessons-From-LOCKED-SHIELDS-2024-Cyber-Exercise.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55990,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9797],"class_list":["post-55989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentcyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lessons From LOCKED SHIELDS 2024 Cyber Exercise 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lessons From LOCKED SHIELDS 2024 Cyber Exercise 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-03T14:23:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/04\/53676624920_98e90ad5b6_k.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Lessons From LOCKED SHIELDS 2024 Cyber Exercise\",\"datePublished\":\"2024-05-03T14:23:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/lessons-from-locked-shields-2024-cyber-exercise.jpg\",\"keywords\":[\"headline,government,cyberwar\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/\",\"name\":\"Lessons From LOCKED SHIELDS 2024 Cyber Exercise 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/lessons-from-locked-shields-2024-cyber-exercise.jpg\",\"datePublished\":\"2024-05-03T14:23:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/lessons-from-locked-shields-2024-cyber-exercise.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/lessons-from-locked-shields-2024-cyber-exercise.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lessons-from-locked-shields-2024-cyber-exercise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,cyberwar\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentcyberwar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lessons From LOCKED SHIELDS 2024 Cyber Exercise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lessons From LOCKED SHIELDS 2024 Cyber Exercise 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/","og_locale":"en_US","og_type":"article","og_title":"Lessons From LOCKED SHIELDS 2024 Cyber Exercise 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-05-03T14:23:44+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/04\/53676624920_98e90ad5b6_k.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Lessons From LOCKED SHIELDS 2024 Cyber Exercise","datePublished":"2024-05-03T14:23:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/"},"wordCount":999,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/lessons-from-locked-shields-2024-cyber-exercise.jpg","keywords":["headline,government,cyberwar"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/","url":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/","name":"Lessons From LOCKED SHIELDS 2024 Cyber Exercise 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/lessons-from-locked-shields-2024-cyber-exercise.jpg","datePublished":"2024-05-03T14:23:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/lessons-from-locked-shields-2024-cyber-exercise.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/lessons-from-locked-shields-2024-cyber-exercise.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/lessons-from-locked-shields-2024-cyber-exercise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentcyberwar\/"},{"@type":"ListItem","position":3,"name":"Lessons From LOCKED SHIELDS 2024 Cyber Exercise"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55989"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55989\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55990"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}