References
[1] Check Point. Cyber Security Report. 2020.
[2] Harašta J. What LEGAD needs to know? Analysis of AARs from
locked shields (2012–2018). In: Proceedings of the 19th European
Conference on Cyber Warfare and Security , ECCWS Academic Conferences
and Pub- lishing International Limited, 2020. p. 136–42.
[3] European Commission. Proposal for a directive of the European
parlia- ment and of the council on measures for high common level of
cyberse- curity across the Union. 2020.
[4] Brilingaite ̵̇ A, Bukauskas L, Juozapavicˇius A. A framework for
com- petence development and assessment in hybrid cybersecurity
exercises. Comput Secur 2020;88:101607.
[5] A. Brilingaitė, L. Bukauskas, A. Juozapavičius, and E. Kutka,
“Overcoming information-sharing challenges in cyber defence
exercises,” Journal of Cybersecurity , vol. 8, no. 1, p. tyac001,
Jan. 2022, doi:
10.1093/cybsec/tyac001.