In order to give you a better service Airbus uses cookies. By continuing to browse the site you are agreeing to our use of cookies. I agree

To opt out of Google Analytics data collection, click here

Thanks. We have set a cookie so that Google Analytics data collections will be disabled on your next visit.

Cyber Security Exercises

During an IT/OT emergency, using established IT/OT contingency plans and processes is much more effective than improvising.

Cyber Security Exercises

Cyber security exercises are for training your employees, from executive management to IT administrators and system operators. They expose you to realistic situations that can actually occur in everyday life. The insights gained from these scenarios are among the most important prerequisites for appropriate planning and action.

Vulnerabilities are detected and resolved during testing

During the exercises, we will work with you and your employees to test existing processes, measures and plans. We will show you potential weaknesses and find ways to optimise your incident response plan. This will considerably increase your knowledge of IT/OT threats and will make taking action in the event of emergency more routine.

Significant time savings when incidents arise

Your processes, measures and plans will probably contain undetected omissions or mistakes. These will be uncovered during cyber security exercises. At the same time, we will find and develop solutions on how to avoid such failings in the future. After solving these vulnerabilities, you will soon see significant reductions in the time it takes to detect, respond and recover.

Routine cyber incident handling and more secure handling

Arguably, the most important aspect of process optimisation is identifying the needs for action at technical, organisational, infrastructural and personnel levels. The goal here is to limit possible damage and ensure that normal operations are quickly resumed after the incident.

To do this, you must clearly identify the people in your incident response team responsible for making decisions in each area. This will allow the person concerned to precisely adapt and take immediate action as the go-to person and coordinator in the event of an emergency. Your defences and tools will be optimised and you will also improve your cyber incident handling capabilities in terms of situation assessment, development of possibilities for action, business continuity, and resumption and follow-up.

All this results in more routine action and more secure handling. In addition, our exercises enhance cyber security leadership and decision-making abilities, and ensure better and clearer communication between teams.

The benefits to testing at a glance

  • Testing and optimising existing IT/OT emergency documents and processes
  • More routine actions to take in emergency situations
  • Improved team and decision-making skills
  • Time savings through reduced time to detect, respond and recover

Our modular approach to testing


Functional test
Our functional tests check the technical components, procedures and sub-processes for their functionality as defined in the various incident handling sub-plans. These include, for example, tests of redundant lines, power supply, data restoration or the signalling technology applied.
Cyber incident handling workshop
This workshop is for thinking through problems and scenarios theoretically. The cyber incident handling processes are analysed theoretically based on realistic scenarios.

Participants review the plans theoretically and verify the plausibility of the content and assumptions made. This validation can reveal mistakes and discrepancies.

Simulation exercise
The simulation exercise provides training in cooperation between the IT/OT emergency team and the operational teams in a realistic emergency situation. The processes and measures defined in the contingency plans, such as alerting, assessment, escalation, emergency measures and resumptions, are also practised operationally.
Depending on the scenario, external bodies such as authorities, the fire brigade and aid organisations may also be involved in the exercise.

These various cyber security exercises serve to validate plans and processes and can reveal inconsistencies and mistakes before costly operational expenses are made.

What are the extent and scope of exercises you look to do in your organisation?

Contact us!