NATO MULTIMEDIA ACCOUNT

Access NATO’s broadcast-quality video content free of charge

Register

Create an account

Create an account

Check your inbox and enter verification code

We have sent a verification code to your email address. . Enter the code to verify your account. This code will expire in 30 minutes.
Verification code

Didn't receive a code? Send new Code

You have successfully created your account

From now on you can download videos from our website

Subscribe to our newsletter

If you would also like to subscribe to the newsletter and receive our latest updates, click on the button below.

Reset password

Enter the email address you registered with and we will send you a code to reset your password.

Reset password
Check your inbox and enter verification code
We have sent a verification code to your email address. Enter the code to verify your account. This code will expire in 30 minutes.
Verification code

Didn't receive a code? Send new Code

Create a new password

The password must be at least 12 characters long, no spaces, include upper/lowercase letters, numbers and symbols.

Your password has been updated

Click the button to return to the page you were on and log in with your new password.

From 7 to 11 April, representatives from 20 Allied government and national agencies exercised NATO’s ability to coordinate responses to significant malicious cyber activities affecting critical national infrastructures.

The exercise, organized by Czechia, aimed to ensure that NATO’s Virtual Cyber Incident Support Capability (VCISC) mechanism can operate swiftly and smoothly. Launched at the 2023 Vilnius Summit, this capability works as a clearing house for Allied assistance in the event of a cyber-attack. Through the VCISC, NATO facilitates assistance, linking those requesting support with designated counterparts in other Allied countries, and helping coordinate offers of support such as malware analysis, cyber threat intelligence and digital forensics. The aim is to help Allies mitigate the impact of and recover from significant malicious activities. The initiative is led by Allies on a voluntary basis, using national assets.

Malicious cyber activities have been increasing over time, targeting amongst others; critical infrastructure, industrial control systems and government services - to disrupt societies, steal intelligence or impede military activities. Russia’s full invasion of Ukraine in 2022 highlighted the extent to which cyber is now a part of modern conflict, both before and alongside kinetic hostilities.