CyberGym launches South African arena

October 2018 Editor's Choice, Information Security, News & Events, Training & Education

Wolfpack recently introduced a new cybersecurity training service to South Africa. CyberGym is an Israeli company that specialises in real-life cyber training, teaching students with real world simulations.

Wolfpack’s CEO, Craig Rosewarne, launched CyberGym by pointing out that the lack of cyber skills is a serious issue around the world. This is exacerbated by the fact that companies are generally prepared to spend large amounts on cyber protection technology, but skimp when it comes to training – and this applies to technical cyber skills as well as training users on how to best protect themselves from attacks, such as phishing or ransomware. It is in the technical skills arena that CyberGym looks to make a difference.

CyberGym’s New York arena.
CyberGym’s New York arena.

CyberGym’s Ofer Rachman explained that the company was started out of Unit 8200 in the Israeli Defence Force (IDF). This unit was set up as a strategic response to the cyber threats against Israel – which faces about 1000 cyberattacks each day – and comprises thousands of ‘cyber warriors’.

The defence process has been adapted from the NIST Cybersecurity Framework, which includes all levels in an organisation as it seeks to identify, protect, detect, respond and recover from attacks. (More on the framework can be found at www.nist.gov/cyberframework.) As with all security, there are layers in place to deal with the cyber threat. These include the data level, the application level, then the hosting, internal network, perimeter and physical levels, and finally, training, policies and procedures.

Realistic simulations

The CyberGym training process is based on the concept of an arena, as opposed to a traditional learning environment. The company has expanded to include arenas in various countries, from Israel through to the Czech Republic, Portugal, Lithuania, Japan, Australia, US and now South Africa. Each arena is set up to emulate a real world IT infrastructure in which the students would work. The training process is comprised of three teams.

The White Team is made up of the instructors working for CyberGym (veterans of the Israeli National Security Authority) who observe, teach and evaluate students. The Blue Team is made up of the students and their task is to defend their emulated IT systems by proactively recognising and responding to cyberattacks using a variety of tools.

The Red Team in action.
The Red Team in action.

The Red Team is located in Israel and its job is to play the role of cyber attackers and perform strategic attacks on the Blue Team’s infrastructure. The Red Team is made up of experienced hackers, which the company says provides students with “unique insights into a hacker’s mindset and point of view”.

Each training session, which can last up to three days, is customised to the trainees’ requirements. For example, it can simulate a financial institution or an electrical utilities infrastructure, with the Red Team directing attacks aimed at those organisations and their infrastructure. The courses available start from half-day courses aimed at C-level executives and then move on to various cybersecurity courses. The technical courses are aimed at the level of the trainees, but can be boosted to give even the most experienced defenders a serious challenge.

An electrical utility simulation.
An electrical utility simulation.

One of CyberGym’s Red Team members, Elad Hagai, was also on hand to provide some insights into real-world attacks he was involved with, in the form of two case studies of defence strategies. The first was from one of Israel’s largest credit card issuers, which was faced with an insider data breach. The ex-employee and his cohorts tried to hold sensitive data to ransom for millions of dollars. The problem was resolved within two weeks and all the data was recovered before it could be published.

Hagai also outlined the changes made in the company to prevent such an occurrence from happening again. The second study was about how a network infiltration attack on another organisation was detected and resolved.

Ready to roll

Rosewarne closed the launch event by telling the attendees that CyberGym SA has been set up and kitted out with a variety of infrastructure components which will allow it to train cyber defenders of any skill level. The venue not only has the required kit, but a VPN link to the Red Team in Israel is also in place so that they can launch attacks and test students’ skills.

Find out more at www.cybergym.com/sa or by emailing [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Gallagher Security achieves ISO 27001 recertification
News & Events Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.