Going Beyond Traditional Cybersecurity Approach

Who We Are

CYBERGYM is a joint venture of the Israel Electric Corporation, a 7.7 billion USD company that faces countless cyberattacks on a daily basis, and Cyber Control, Israel’s leading cybersecurity consultancy established by ex-NISA operatives and security experts.
CYBERGYM conducts cyber-warfare readiness training for governmental and private enterprises. It focuses on the weakest link in any emergency response system – the people who run it.
CYBERGYM has developed a unique integrated Cyber Training and Technologies Arena for critical infrastructure organizations. The Arena facilitates testing systems, processes and people against cyberattacks, and preparing employees for responding to and fending off real-time cyberattacks on complex, wide-spread systems and sensitive infrastructures. The training enables organizations to enhance their policies and processes and adjust their Cyber Threat Model to their specific environment.
Using CYBERGYM’s Training and Technologies Arena and cutting-edge technology, we deliver a state-of-the-art training experience to diverse trainees from different critical infrastructure sectors and with different levels of knowledge.
CYBERGYM’s approach is unique in emphasizing the importance of hardening the human factor protecting against cyber threats, through individually tailored training delivered in a dedicated cyber training and technologies Arena.

If you can’t beat the bad guys better have them on your side!


We provide the information and knowledge necessary for decision makers to direct resources to where they are needed most. Identifying and addressing cybersecurity threats to the organization and understanding the potential impact of a successful breach, through knowledge of their own vulnerability landscape and attack surface. We execute real attacks on a wide range of technological environments and evaluate your readiness.
Most importantly, CYBERGYM’s holistic approach takes care of all your cybersecurity needs. Together, we will build the threat model, design the training, and create processes and procedures that protect you. We will train and prepare the weakest link: people. We will ensure your workforce are able to protect your environment and are equipped with the knowledge, skill and methods required to fend off a real cyberattack.
Unlike computer simulations, CYBERGYM emulates complex cyberattack scenarios in OT and IT environments
A state-of-the art, sophisticated cyber training and technologies Arena which enables organizations to practice real-world cyber-attack scenarios
We empower organizations with the ability to Proactively Recognize and Respond to Cyberattacks
Utilizing the Red Team (experienced hackers) throughout the training, provides you with unique insights into a hacker’s mindset and point of view.
Holistic training for all departments, specializing in active cyber defense, event mitigation and crisis management

Experience real cyber-attack!

Our Training Dynamics in a Nutshell

In CYBERGYM’s training sessions, there are three participating teams:
Red Team – comprised of experienced offensive and defensive hackers from the Israel Defense Forces’ elite 8200 cyber intelligence unit, and veterans of other cyber defense organizations. Their goal is to execute real-world cyberattacks on the Blue Team’s technological environment in order to challenge the trainees.
Blue Team – comprised of cross-organizational technical and non-technical employees. Their goal is to protect the critical assets of their organization while minimizing the damage.
White Team – comprised of veterans of the Israeli National Security Authority (NISA) with years of experience in both defending and containing major cyberthreats and attacks on critical infrastructure. Their goal is to manage the training session and coordinate between the Blue and Red Teams.
The Red Team challenges the Blue Team via multiple technological and non-technological attack vectors.
The Blue Team is faced with real attacks they have to identify, defend and harden their environment against using the necessary methods and tools.
The White Team manages the training and debriefing process, reviews the Blue Team’s performance and provides recommendations. The training includes hands-on training with industrial and IT equipment, such as PLCs, Firewalls, SCADA, HMIs, SIEM, Snort and more.

Experience real cyber-attack!