Positive Technologies identified four unacceptable events - theft of money, theft of confidential information, introduction of malicious code into products and gaining access to the company's customers through the infrastructure - and challenged the attackers to implement them in the existing infrastructure within three months. The cyber training conditions are as close to real life as possible: attackers can use any hacker tools and attack any infrastructure elements at any time of the day or night. The company intends to both improve security and prove the effectiveness of the concept of effective and measurable cybersecurity from its own experience.