ENCS General Assembly puts focus on extending training portfolio to keep up with increasing threat level

Yesterday, February 16th 2023, ENCS held its annual General Assembly at its premises in The Hague.

In 2022, Ireland was added to the map of ENCS coverage and water and railway infrastructures found their way into ENCS’s OT security expertise. ENCS organized 44 highly attended community events and published 26 new best practices on the ENCS portal.

During the General Assembly, all ENCS members agreed on the priorities for the ENCS security programs focusing on extending the ENCS training portfolio. As the security maturity at ENCS members increases, there is demand for new types of training to keep-up with the increasing threat levels. ENCS members want to exercise their incident response processes. The assembly approved that three new training types will be developed by ENCS:

  • table-top exercises with all roles that are involved,
  • a dedicated Red Team – Blue Team training for OT engineers to practice with incidents on central OT systems and
  • hands-on incident response training for substation engineers.

Wolfgang Löw, CISO at EVN and Chair of the ENCS Assembly Committee said: “To support the fulfilment of our mission to protect critical infrastructure, ENCS is the ideal partner because of their knowledge and experience. It is great to see that the number of ENCS members is constantly growing and I wish that this trend will continue this year. I want to thank Anjos, Maarten and the whole team of ENCS for the great support over all the years, you are doing really great work.”

ENCS will continue to support members and partners in formulating input into consultations on upcoming EU regulations. Contribution to the creation and employment of harmonized security requirements will remain at the core of ENCS work program as well as the community engagement through regular webinars and security roundtables.

Subscribe to our newsletter

"*" indicates required fields

This field is for validation purposes and should be left unchanged.