{"id":10568,"date":"2026-03-04T11:01:51","date_gmt":"2026-03-04T08:01:51","guid":{"rendered":"https:\/\/cyberone.bg\/?p=10568"},"modified":"2026-03-11T11:12:52","modified_gmt":"2026-03-11T08:12:52","slug":"project-advances-toward-milestone-2-with-testing-scenarios-prepared-for-submission","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/project-advances-toward-milestone-2-with-testing-scenarios-prepared-for-submission","title":{"rendered":"Project advances toward Milestone 2 with testing scenarios prepared for submission"},"content":{"rendered":"<p style=\"text-align: center;\"><span style=\"font-size: 10pt;\"><em>CyberOne is completing Stage 2 of the project, focused on threat modelling, scenario development and technical preparation for the next assessment phase.<\/em><\/span><\/p>\n<h2><span style=\"font-size: 12pt;\"><strong>The project \u201cWater Utilities Penetration Testing \u2013 ViK Plovdiv &amp; ViK Varna\u201d is currently approaching\u00a0 Milestone 2, marking completion of the Testing Scenarios Report and the technical baseline for the next implementation phase.<\/strong><\/span><\/h2>\n<p>The project is currently in Stage 2, focused on the development of the Testing Scenarios Report ahead of the second milestone submission.<\/p>\n<p>This stage translates the approved execution baseline into structured technical scenarios that will guide the assessment work in the next phase. It includes ATT&amp;CK-aligned threat modelling, mapped risk scenarios, and detailed coverage logic across web applications, network infrastructure and IoT\/IIoT or SCADA-adjacent assets.<\/p>\n<p>The current phase is particularly important because it defines how the project\u2019s technical methodology will be applied in practice across the two beneficiary utilities. It consolidates the scenario logic, safeguards and testing structure required for controlled execution in operationally sensitive environments, while preserving the zero-disruption and confidentiality principles .<\/p>\n<h3><span style=\"font-size: 12pt;\"><strong>Funding acknowledgement and disclaimer<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 12pt;\">Funded by the European Union under the Digital Europe Programme, Grant Agreement No. 101158471.<\/span><\/p>\n<p><em><span style=\"font-size: 10pt;\">Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Cybersecurity Competence Centre. Neither the European Union nor the granting authority can be held responsible for them.<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberOne is completing Stage 2 of the project, focused on threat modelling, scenario development and technical preparation for the next assessment phase. The project \u201cWater Utilities Penetration Testing \u2013 ViK Plovdiv &amp; ViK Varna\u201d is currently approaching\u00a0 Milestone 2, marking completion of the Testing Scenarios Report and the technical baseline for the next implementation phase. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"class_list":["post-10568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=10568"}],"version-history":[{"count":3,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10568\/revisions"}],"predecessor-version":[{"id":10571,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10568\/revisions\/10571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/10562"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=10568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=10568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=10568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}