References
[1] Check Point. Cyber Security Report. 2020.
[2] Harašta J. What LEGAD needs to know? Analysis of AARs from locked shields (2012–2018). In: Proceedings of the 19th European Conference on Cyber Warfare and Security , ECCWS Academic Conferences and Pub- lishing International Limited, 2020. p. 136–42.
[3] European Commission. Proposal for a directive of the European parlia- ment and of the council on measures for high common level of cyberse- curity across the Union. 2020.
[4] Brilingaite ̵̇ A, Bukauskas L, Juozapavicˇius A. A framework for com- petence development and assessment in hybrid cybersecurity exercises. Comput Secur 2020;88:101607.
[5] A. Brilingaitė, L. Bukauskas, A. Juozapavičius, and E. Kutka, “Overcoming information-sharing challenges in cyber defence exercises,” Journal of Cybersecurity , vol. 8, no. 1, p. tyac001, Jan. 2022, doi: 10.1093/cybsec/tyac001.