Close×

Elbit Systems has been chosen to deliver a Cyber Training range for the Department of Defence under a three year contract to boost Australia’s cyber security capability.

Elbit Systems will provide an interim cyber range, network design and build, cyber range training, and teaching materials.

“The company is delighted to be providing cyber expertise to the ADF," Managing Director of Elbit Systems of Australia, Dan Webster said. "We will be supporting Defence in training their cyber warriors who will defend against the real cyber threats we are faced with every day. Trainees will learn to identify, track, investigate, respond to and remediate a cyber-attack.”

The Cyber Security technology has been developed by global Cyber specialist Cyberbit, a subsidiary of Elbit Systems. Cyber Training Ranges will be installed at ADF facilities in Melbourne, Sydney, Adelaide and Canberra.

The fully self-contained Cyber Security training network will be capable of training 50 students concurrently.

“The Australian Government is committed to strengthening its cyber capabilities to protect Defence and other critical Government systems from malicious cyber intrusion and disruption,” Minister for Defence Christopher Pyne MP, said.

“The Cyber Training range will be used by Defence personnel for training on cyber-terrain and associated systems that our cyber workforce is responsible to defend.”

49 cyber warfare specialists that graduated from the ADF's inaugural Accelerated Defensive Cyber Training program will use the new cyber training range to develop and maintain their skills.

The Cyber Training range is an integral aspect of the Program which is designed to meet the ADF’s immediate requirement to secure its networks and mission systems, which are fundamental to current operations in a world where the threat to such systems continues to increase.

The Accelerated Defensive Cyber Training program was created by Defence to meet the 2016 Defence White Paper’s directive for more trained personnel and enhanced capability in the cyber domain well ahead of its planned implementation period.

comments powered by Disqus