DHS offers first take on Cyber Storm exercise
RSA panel offers insight and the occasional real-time censorship moment
IDG News Service - With its latest Cyber Storm II exercise now completed, the U.S. Department of Homeland Security said it expects to release an after-action report analyzing the event, and is now beginning planning for Cyber Storm III in 2010.
Cyber Storm 2 was a week-long cybersecurity simulation that included mock attacks on computer and transportation systems. But the exercise brought in many more players from government and other industries: about 2,500 people from the U.S., U.K., Canada, Australia and New Zealand.
DHS Assistant Secretary for Cyber Security and Communications Gregory Garcia described a typical Cyber Storm II scenario, in an interview at the RSA Conference in San Francisco Wednesday.
"You have a simulated incident that comes in over the e-mail and it may have only to do with the chemical sector at this point. There's an employee in the chemical sector who's arrested," he said. "He was fired the day before and did something to sabotage the network ... so somebody in the chemical sector gets that. 'OK what do I do with that?'"
The exercise even simulated the media's response. "You have mock news reports," Garcia said. "It shows up on the Web as a news story. People are reading that and they have to separate out what's the level of hearsay in the news report."
By participating in Cyber Storm II, emergency response mangers could find out if their plans worked out as expected, and, in particular, if people wound up doing what the planners thought they would do, said Christine Adams, a senior information systems manager at the Dow Chemical Company, speaking during a panel discussion at the conference.
"You think you know how people are going to respond ... but they surprise you sometimes," said Cyber Storm II participant Daniel Lohrmann, the chief information security officer with Michigan's Department of Information Technology.
Anyone looking for the gory details on how successful attackers were during the latest Cyber Storm will have to wait. Because some of the findings from the exercise are sensitive, the DHS doesn't want to discuss specifics until the after-report is issued, and that's not expected to happen until August at the earliest.
Dow Chemical's Adams did offer one example of a lesson learned before she was cut off by her panel's DHS moderator. "It got to the point where our communications capability was somewhat compromised," she said. "We have some work to do around having the means to get priority telecom service if we need it."
Garcia offered one lesson as well: "It's better to exchange business cards now rather than during a crisis," he said. In fact the relationships built during the months of planning ahead of the Cyber Storm II were invaluable, he said. "If the exercise never even took place, I think people would have come away with a much better appreciation of what their vulnerabilities are, what could potentially happen to them, and who they need to connect with in this vast network."
Cyber Storm II was held during the week of March 10. The next event is expected to happen around the same time of year in 2010.
Garcia would like to see more participants and new industry sectors being the "core players" in the next exercise, he said.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity... All Government IT White Papers
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- All Government IT Webcasts