Theoretical Concepts used in building Cyber Resilience
DOI:
https://doi.org/10.53477/2284-9378-25-29Keywords:
cyber resilience, cyber scenarios, cyber exercises, wargaming, civil-military collaboration, planning, TTX exercises.Abstract
In the context of intensifying cyber threats, cyberspace resilience has become a strategic priority for organizations, governments, and international alliances. Cyber scenarios, in their various forms, provide a controlled environment in which response capabilities to cybersecurity incidents can be tested, trained, and validated. The aim of this paper is to analyze how these scenarios contribute to the development of an organizational culture of resilience, allowing the identification of vulnerabilities, strengthening decision-making under pressure, and proactively adapting to new types of threats. The study explores current practices adopted at the European and international level, revealing how scenario-based exercises support strategic planning, training of technical and operational teams, and interinstitutional cooperation. Moreover, the direct benefits to organizational flexibility and post-incident recovery capacity are also analyzed. Finally, the article formulates a series of recommendations for integrating scenarios into the cyber risk management cycle, highlighting their value not only as training tools but also as fundamental elements in the security architecture of a modern organization.
References
Abbas, Nasim. 2024. „Cyber Wargames and Cyber Security.” Privia Security pp. 3–8.
Center for Internet Security. 2025. Tabletop Exercises (TTX). https://www.cisecurity.org/ms-isac/tabletop-exercises-ttx.
Chouliaras, Nestoras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, and Mohamed Amine Ferrag. 2021. “Cyber Ranges and TestBeds for Education, Training, and Research.” Applied Sciences 11 (4): 1809. https://doi.org/10.3390/app11041809.
Chouliaras, Nestoras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, and Mohamed Amine Ferrag. 2021. “Cyber Ranges and TestBeds for Education, Training, and Research.” Applied Sciences 11 (4): 1809. https://doi.org/10.3390/app11041809.
Cybersecurity and Infrastructure Security Agency. 2025. CISA Tabletop Exercise Packages. https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages.
___. 2025. „Cybersecurity Tabletop Exercise Tips .” https://www.cisa.gov/sites/default/files/publications/Cybersecurity-Tabletop-Exercise-Tips_508c.pdf.
European Union Agency for Cybersecurity. 2021. ENISA Threat Landscape 2021. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021.
Fahey, Liam, and Robert M. Randall. 1998. “What is Scenario Learning?” Learning from the Future pp. 3–21.
Godet, Michel. 2006. „Creating Futures: Scenario Planning as a Strategic Management Tool.”Economica 39–45.
Joint Chiefs of Staff. 2020. JP 5-0, Joint Planning. https://irp.fas.org/doddir/dod/jp5_0.pdf.
Kosow, Hannah, and Robert Gaßner. 2008. Methoden der Zukunfts- und Szenarioanalyse:Überblick, Bewertung und Auswahlkriterien. research report, Bonn: Deutsches Institut für Entwicklungspolitik gGmbH.
Ministry of National Defense. 2023. Specialiști din MApN, la exercițiul de apărare cibernetică Locked Shields 2023. https://www.mapn.ro/cpresa/17900_Specialiști-din-MApN,-laexercițiul-de-aparare-cibernetica-Locked-Shields-2023.
Misheva, Galina. 2021. European Skills Agenda. https://digital-skills-jobs.europa.eu/en/actions/european-initiatives/european-skills-agenda.
Nucă, Nicoleta. 2024. Aspecte ligislative privind războiul cibernetic sau cyberwarfare. Efectele și răspunderea penală. https://www.juridice.ro/733058/aspecte-legislative-privindrazboiul-cibernetic-sau-cyberwarfare-efectele-si-raspunderea-penala.html.
Petrescu, Dan Lucian. 2017. Modele conceptuale avansate pentru proiectarea şi realizarea scenariilor militare în contextul mediului operaţional de tip hibrid. Bucureşti:Universitatea Naţională De Apărare ,,Carol I” .
Popa, Iulian Florentin. 2015. Securitatea și guvernanța spațiului cibernetic contemporan.Cluj-Napoca: Universitatea Babeș-Bolyai .
Postma, Theodorus J.B.M., and A. M.M. Vijverberg. 1995. “Toekomstverkenning met scenario’s. Een hulpmiddel bij de bepaling van de strategische koers van een organisatie.” Bedrijfskunde: Tijdschrift voor Modern Management 67 (2): 13-20.
Rochford, Oliver. 2024. What is Capture the Flag in Cybersecurity? + Effective Exercises. https://www.securonix.com/blog/capture-the-flag-in-cybersecurity/.
Rotmans, Jan. 1998. “Methods for IA: The Challenges and Opportunities Ahead.” Environmental Modelling and Assessment 3 (3): 155–179.
Schoemaker, Paul J.H. 1995. „Scenario Planning: A Tool for Strategic Thinking.” MIT Sloan Management Review 36 (2): 25–40.
The NATO Cooperative Cyber Defence Centre of Excellence. 2022. Locked Shields. https://ccdcoe.org/locked-shields/.
___. 2025. NATO CCDCOE expands cyber defence cooperation ahead of the worlds largest live-fire exercise. https://www.ccdcoe.org/news/2025/nato-ccdcoe-expands-cyberdefence- cooperation-ahead-of-the-worlds-largest-live-fire-exercise/.
Van der Heijden, Kees. 2005. Scenarios: The Art of Strategic Conversation. 2nd ed. New York:John Wiley & Sons.
van Notten, Philip W. F. 2005. „Writing on the wall : scenario development in times of discontinuity.” Amsterdam: Thela Thesis & Dissertation. van Notten, P. W. F., Writing on the wall: scenario development in times of discontinuity. [Doctoral Thesis, Maastricht University], Thela Thesis & Dissertation.com, Amsterdam, 2005, pag. 20. https://doi.org/10.26481/dis.20050408pn.
Wright, George , and Paul Goodwin. 2009. “Decision Making and Planning Under Low Levels of Predictability: Enhancing the Scenario Method.” International Journal of Forecasting 25 (4): 813–825. doi:10.1016/j.ijforecast.2009.05.019.
Downloads
Published
How to Cite
Issue
Section
License
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.
BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY