The Ministry of Science and ICT and the Korea Internet & Security Agency (KISA) said on the 5th they are recruiting corporations to participate in the "first half of 2026 cyber crisis response drill."
The Ministry of Science and ICT and KISA hold cyber crisis response drills every first and second half of the year to raise corporations' security awareness and strengthen response capabilities against increasingly sophisticated cyber threats. Corporations wishing to participate in the first-half drill this year can apply from the 6th to the 24th.
This drill will be conducted for two weeks from May 11 to 22. The Ministry of Science and ICT said, "Cyber threats such as sophisticated phishing emails using Generative AI and supply chain attacks are becoming routine," adding, "It is more important than ever for corporations to identify security vulnerabilities on their own and establish immediate response systems in the event of an incident."
This first-half drill consists of four areas: ▲ phishing emails ▲ distributed denial-of-service (DDoS) response ▲ penetration testing ▲ vulnerability detection and response. After the drill, participating corporations will receive customized drill result reports by company and guidance by drill area, helping corporations identify and address security vulnerabilities in advance. Participating corporations can record the details of this drill in the information security activities section of the "information security disclosure."
The Ministry of Science and ICT plans to hold a review session in June to share the first-half drill analysis results and best practices. It will select corporations with outstanding performance in the drill and present commendations from the Deputy Prime Minister and Minister of Science and ICT and the President's Award of the Korea Internet & Security Agency (KISA).
The number of corporations participating in the cyber crisis response drill has increased sequentially from 662 in 2023 to 779 in 2024 and 1,017 in 2025.
Im Jeong-gyu, director general for information security network policy at the Ministry of Science and ICT, said, "Recently, we are seeing supply chain attacks that first infiltrate through small and midsize companies with relatively weak security systems and then use that as a springboard to attack large corporations," adding, "Since a single incident can have such a large ripple effect that it threatens a corporation's existence, we hope this drill will serve as an opportunity for corporations to check their own security systems and build incident response capabilities."