🔒 Operation: Defend the North 2025 – Vancouver-A Cybersecurity Exercise in Real-World Readiness
- Marlo Rulona
- Oct 7, 2025
- 3 min read
Updated: Oct 8, 2025
In an age where digital infrastructure underpins everything from national defense to public safety, cyber resilience has never been more vital. Operation: Defend the North (ODTN) 2025 – Vancouver stood as a landmark event — uniting cybersecurity professionals, government agencies, and private-sector leaders in a full-scale simulation of a nationwide cyber crisis.
Across six immersive modules, the exercise tested every facet of crisis management: from early detection and containment to eradication, recovery, and post-event reflection. More than an exercise, ODTN 2025 became a proving ground for how Canada’s cyber ecosystem would withstand and recover from a coordinated digital assault.
🧭 Let the Cyber Crisis Begin! – Welcome & Opening Remarks
The event opened with a powerful message — readiness is a shared responsibility. Leaders from the cybersecurity community and government agencies introduced the crisis scenario: a large-scale cyberattack targeting Canada’s critical infrastructure.
Participants were briefed on objectives, command structure, and communications protocols. The session reinforced the importance of collaboration over isolation — ensuring that every team, from technical experts to executive leadership, worked in sync.
“This isn’t just a test,” one moderator remarked, “it’s a rehearsal for the real thing.”
🚨 Module 1: Code Red – Detecting and Analyzing a Major Cyber Crisis
The first operational phase thrust participants into the chaos of a cyber onslaught. Networks faltered, data anomalies spiked, and threat indicators emerged without warning. Teams were tasked with identifying what was happening — and how deep the compromise ran.
The module underscored the importance of early detection and situational awareness. Analysts leveraged AI tools and intelligence feeds to separate noise from signal, demonstrating that speed and precision are the first lines of defense.
Key Takeaways:
Timely detection relies on collaboration and real-time data sharing.
Artificial intelligence enhances human insight, not replaces it.
The faster a team identifies a breach, the faster it can contain it.
🧱 Module 2: Lockdown Mode – How We Contain a Cyber Crisis
Containment is where strategy meets execution. With the crisis escalating, teams worked to isolate affected systems, activate incident response protocols, and maintain operational continuity.
This phase highlighted that containment isn’t purely technical — it requires organizational coordination, communication, and trust. Participants learned that clear authority lines and disciplined communication channels can make or break containment efforts.
Key Takeaways:
Isolation without communication leads to confusion.
Coordination between teams is as crucial as the technical fix.
Predefined roles and escalation paths accelerate decision-making.
🧹 Module 3: Crisis Eradication – How We Eliminate the Threat
Once systems were stabilized, the mission shifted to eradication — finding and removing the root cause. Forensic teams hunted for persistence mechanisms, data exfiltration traces, and lateral movement within networks.
This module underscored the complexity of cleaning interconnected environments. Eradication required balance: restoring functionality while ensuring that no remnants of the threat remained.
Key Takeaways:
Root-cause analysis must precede remediation.
Comprehensive forensics prevent repeat compromises.
Eradication is as much about rebuilding confidence as removing code.
🔁 Module 4: Rebuilding Trust – The Path to Cyber Recovery
Recovery extended beyond system restoration — it was about rebuilding trust among users, partners, and the public. Teams focused on restoring critical functions, communicating transparently, and implementing improvements to prevent recurrence.
Participants were reminded that cyber recovery is equal parts technology, leadership, and empathy. Trust, once lost, must be earned back through visible, credible action.
Key Takeaways:
Communication strategy is central to recovery success.
Transparency fosters resilience and confidence.
Every recovery is an opportunity for stronger defense.
🧩 Module 5: The Aftermath – Reflecting on a Crisis & Moving Forward
The final module emphasized reflection and growth. Teams analyzed what went well, where coordination faltered, and how processes could evolve. The after-action review captured lessons learned to enhance Canada’s cyber posture and inform future exercises.
This session reinforced that resilience isn’t achieved once — it’s a continuous process of adaptation.
Key Takeaways:
Continuous learning transforms exercises into readiness.
Collaboration across sectors amplifies national defense.
A crisis ends when lessons are applied — not when systems come back online.
⚙️ Final Reflection
Operation: Defend the North 2025 – Vancouver proved that cyber resilience is built through shared experience, transparent coordination, and collective trust.
By simulating a national-scale cyber crisis, ODTN strengthened the bonds between organizations that form the backbone of Canada’s digital defense. The lessons learned here will ripple across policy, training, and technology — ensuring that when the next real-world threat arises, the North will be ready to defend.
Click here to view a whitepaper that I have created for this tabletop exercise.
And if you want to watch the full tabletop exercise, you can watch it here:
#CyberSecurity #ODTN2025 #IncidentResponse #CyberResilience #ThreatIntelligence #CyberAwareness #CanadaCyberDefence #OperationalReadiness #CrisisManagement #DigitalTrust





Comments