Chernobyl disaster main lessons for CyberOps in 2019
So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations?
Lately, everyone is talking about the new HBO miniseries, Chernobyl, portraying one of the biggest man-made disasters which happened 33 years ago near a small city of Pripyat. Chernobyl was an RBMK type nuclear power plant that was designed and operated under the USSR.
So, what happened?
It all started from a safety test that was conducted to prepare for a potential power outage in the plant, relying on several diesel generators to supply electricity during the event and help pump water to the reactor to keep it cool. Other, similar tests were conducted in the past with no success to solve the issue and without any critical incidents but during the 4th test, a chain of mistakes made by the test crew and the supervisor who didn’t follow proper procedure (also, design flaws in the reactor itself), led to a number of explosions in reactor no. 4 and eventually the release of radioactive materials into the air.
What can be learned and implemented in cyber security?
Having procedures and properly using them, prepare you for when your reactors reach critical mass (or in our case, a breach/malware is discovered). Conducting known checklists in case of a disaster can mitigate or reduce the intensity of the situation (just like pilots have in case of an emergency).
Of course, preparing the procedures isn’t enough:
- Consider every possible and even impossible scenario in your organization in case of a breach or an attack and how to handle it, step by step.
- Practice-Practice-Practice, and if I didn’t mention it, PRACTICE! Constantly repeating a scenario and understanding how to handle it, makes sure you and your team are ready for a really bad day.
- Practice every scenario in a safe environment and do it as real as possible. Don’t forget to debrief, learn from each practice and where are the faults that need fixing and how to recover faster, this helps improve for next time.
Is there any special procedure using our solution?
Well, yeah! Since we’re focusing on preventing a potential attack, our procedure is as follows
✔ Get an alert
✔ Check the event
✔ Drink coffee
✔ Breath
✔ Smile 🙂
For more information, just email me and I’d be happy to help
he*@************es.com
Don’t Miss a Thing
Sign up today and we’ll send an email when new posts come out.
We collect and use this information in accordance with our privacy policy.
Related content

Deceptive Bytes mentioned in Gartner’s research on Top Use Cases in Preemptive Cyber Defense
Avi Lamay
18/11/2024
Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

Case study – preventing Malgent trojan horse
12/09/2024
Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

The Role of Large Language Models in Enhancing Ransomware and Malware Threats
22/08/2024
Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...