Defender Purple 2026
Drone Cyber Operations & Counter-UAS Cyber Readiness Special Edition: 22-29 June
Most security teams are prepared for enterprise cyber incidents. Very few are ready for the moment drones become part of the operational threat landscape. DP26: Drone Special Edition is a rare operational cyber-readiness and resilience program designed for the new drone-threat era.
It prepares cyber defenders, SOC teams, incident responders, defence organisations, UAV stakeholders, and critical infrastructure operators to validate and strengthen their ability to detect, investigate, hunt, respond, coordinate, and sustain operations under realistic drone-enabled cyber-physical pressure.
Through live cyber range exercises, adversary simulation, firmware and forensic analysis, GCS/network security, counter-UAS cyber considerations, and Purple Team operations, participants move beyond awareness into tested operational capability.
This is not awareness training. This is operational readiness before crisis.
HANDS-ON
6
DOMAINS
7
TAKEAWAYS
100%
REMOTE
The Rise of Drone Security
A rare 52-hour live cyber range experience for teams that must be ready before drone-enabled cyber-physical incidents happen.
Your team will train defending real UAV environments and control systems under high-pressure conditions drawn from actual operational scenarios.
Gain the skills to manage complex networks where drones and operational technology intersect from detection though to incident response.
Every session is built around real-world drone security scenarios. Your team walks away ready to detect threats faster and respond with confidence from day one.
If your organization is serious about staying ahead of emerging threats, this is where you build that advantage.
Detection
RF passive detection, radar micro-Doppler analysis, signal classification, and automated detection pipelines.
Firmware Analysis
DJI firmware extraction, modification detection, ArduPilot parameter auditing, and reverse engineering.
Forensics
Flight log reconstruction, mission profile recovery, evidence preservation, and chain of custody practices.
GCS & Network Security
MAVLink protocol protection, message signing, traffic monitoring, ground control station hardening, and 5G command-and-control vulnerabilities.
Counter-UAS
Failsafe behavior, jamming and spoofing effects, and predicting drone responses under interference.
SOC & Incident Response
Detection engineering, SIEM-based threat hunting, alert correlation, and developing incident response playbooks.
The Drone Readiness Program follows a structured training path that includes onboarding, drone and network fundamentals, and progressively advanced operational scenarios. This training model is based on approaches used in advanced cyber exercises and is trusted by SOC units across NATO, due to its realistic scenarios and measurable operational readiness outcomes.
Day 1 - Introduction & Fundamentals
Day 2 - Detection Methodologies
Day 3 - Firmware & Forensics
Day 4 - Adversary Simulation
Day 5 - SOC Operations & Threat Hunting
Closing Day - Live Fire Exercise
Detect Faster
Identify drone-based threats across multiple attack surfaces with purpose-built detection rules and monitoring capabilities.
Defend with Confidence
Operate confidently in high-pressure, adversary-driven scenarios from day one with deployable forensic methodologies.
Respond Faster
Execute real-world threat hunting and incident response with structured response frameworks tailored to drone security.
Deployable Outputs
Leave with practical assets you can apply immediately. Detection rules, monitoring capabilities, and response frameworks.
Trainers
This programme is developed and delivered by instructors who bring over a decade of hands-on experience across penetration testing, incident response, adversary emulation, and detection engineering. They have built and operated cyber ranges, led Red vs. Blue team exercises, and worked across threat intelligence, endpoint security, and vulnerability research in real-world environments.

Professional Experience
CG is a highly qualified and experienced lecturer with a background in production and management engineering and secure engineering technologies. He has taught both university and NATO cybersecurity courses for over 600 students. CG has worked with the University of Piraeus on several significant projects, including CyberSec4Europe, MELITY, and ARTEMIS, funded by the European Union and the Greek government. He has also contributed to AI4Healthsec and Cybersecpro as a consulting researcher. CG is a published author with 12 publications in journals such as ACM Sensors and Elsevier Computer & Security.
Education
Currently conducting PhD research on machine learning methodologies for the identification and assessment of cumulative vulnerabilities and cascading attacks on interconnected systems.

Professional Experience
CL is an experienced cybersecurity professional specializing in incident response, detection engineering, and cyber range development. With a career spanning Deloitte, OTE, Obrela Security Industries, and Piraeus Bank, he has led advanced threat hunting, forensic investigations, and large-scale security monitoring operations. Currently Incident Response Lead and Cloud Security Engineer at KMicro Tech, he also lectures at NATO's NMIOTC and contributes to EU-funded training programs, combining hands-on technical expertise with the design and delivery of advanced Blue Team training.
Certifications
CL holds multiple professional certifications, including GIAC Certified Forensic Analyst (GCFA), Microsoft Azure Security Engineer Associate, and Red Hat Certified System Administrator.

Professional Experience
GI is a Principal Consultant specializing in penetration testing and Cyber Defense Exercises (Red vs. Blue team). His expertise includes web application and network security, vulnerability research, and threat and risk assessment. GI is security vetted and cleared to NS. He has co-authored the OWASP Testing Guide and discovered vulnerabilities in major vendors including Google, Adobe, Oracle, Mozilla and Opera. His work has been featured at DEFCON, OWASP, Hack In The Box, EUSecWest and HackPra.
Certifications
- GIAC - SANS 660 - Advanced Penetration Testing, Exploits, and Ethical Hacking
- PCI SSC QSA & CISSP
Penetration Testing
For eight years GI led a team of penetration testers across telecommunications, finance, banking and insurance sectors. Security reviews include:
- Application and Web Application Security Testing
- Network Penetration Testing (black box / grey box)
- Application and Source Code Review
- Host Build Review
- Database Security Review
- Voice Over IP (VoIP) Security Review
- Kiosk and Unattended Access Terminal Reviews
- Firewall Rule Set Review
- Citrix and Remote Access Penetration Testing
- Mobile Application Security Review
- SCADA (Supervisory Control and Data Acquisition)

Professional Experience
JR has more than 10 years of experience as a seasoned cybersecurity professional with a distinguished career in adversary emulation and detection engineering. With a strong background working for many incident response, endpoint security, and threat intelligence organizations across diverse sectors including energy, critical infrastructure, oil and gas, and finance.
Education & Certifications
JR holds a Master's degree in Computer Science and multiple professional certifications. He has collaborated on offensive and defensive projects with a multitude of customers and organizations across diverse sectors.
Registration
Pricing
Programme Fee: 6,000 EUR per participant
- Early Commitment Rate = 5,400 EUR (limited to first 20 participants)
- Team Rate (5+ participants from the same organisation) = 5,400 EUR per participant
Key Information
22nd – 29th June 2026
Remote
6 days
After Registering
You will receive a confirmation with next steps including the Invoice within 24 hours
Upon Completion
Upon completion of the programme, each participant will receive a Certificate of Completion.
Certificate of Completion
Defender Purple – Drone Cyber Operations & Counter-UAS Cyber Readiness
52-Hour Specialist Program | Live Cyber Range | Purple Team Operations
Issued by Focal Point
Get in Touch
For further questions feel free to contact us at info@focalpoint-sprl.be