DHS offers first take on Cyber Storm exercise
RSA panel offers insight and the occasional real-time censorship moment
IDG News Service - With its latest Cyber Storm II exercise now completed, the U.S. Department of Homeland Security said it expects to release an after-action report analyzing the event, and is now beginning planning for Cyber Storm III in 2010.
Cyber Storm 2 was a week-long cybersecurity simulation that included mock attacks on computer and transportation systems. But the exercise brought in many more players from government and other industries: about 2,500 people from the U.S., U.K., Canada, Australia and New Zealand.
DHS Assistant Secretary for Cyber Security and Communications Gregory Garcia described a typical Cyber Storm II scenario, in an interview at the RSA Conference in San Francisco Wednesday.
"You have a simulated incident that comes in over the e-mail and it may have only to do with the chemical sector at this point. There's an employee in the chemical sector who's arrested," he said. "He was fired the day before and did something to sabotage the network ... so somebody in the chemical sector gets that. 'OK what do I do with that?'"
The exercise even simulated the media's response. "You have mock news reports," Garcia said. "It shows up on the Web as a news story. People are reading that and they have to separate out what's the level of hearsay in the news report."
By participating in Cyber Storm II, emergency response mangers could find out if their plans worked out as expected, and, in particular, if people wound up doing what the planners thought they would do, said Christine Adams, a senior information systems manager at the Dow Chemical Company, speaking during a panel discussion at the conference.
"You think you know how people are going to respond ... but they surprise you sometimes," said Cyber Storm II participant Daniel Lohrmann, the chief information security officer with Michigan's Department of Information Technology.
Anyone looking for the gory details on how successful attackers were during the latest Cyber Storm will have to wait. Because some of the findings from the exercise are sensitive, the DHS doesn't want to discuss specifics until the after-report is issued, and that's not expected to happen until August at the earliest.
Dow Chemical's Adams did offer one example of a lesson learned before she was cut off by her panel's DHS moderator. "It got to the point where our communications capability was somewhat compromised," she said. "We have some work to do around having the means to get priority telecom service if we need it."
Garcia offered one lesson as well: "It's better to exchange business cards now rather than during a crisis," he said. In fact the relationships built during the months of planning ahead of the Cyber Storm II were invaluable, he said. "If the exercise never even took place, I think people would have come away with a much better appreciation of what their vulnerabilities are, what could potentially happen to them, and who they need to connect with in this vast network."
Cyber Storm II was held during the week of March 10. The next event is expected to happen around the same time of year in 2010.
Garcia would like to see more participants and new industry sectors being the "core players" in the next exercise, he said.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Considerations For Effective Software License Management
- For many reasons, software license management has become a critical issue for many IT organizations and enterprise's alike. With many licensing options, hurdles...
- eBay uses 100% OpenSource WSO2 ESB to process more than 1Billion transactions a day
- Along with eBay's success comes a huge demand to ensure reliable, 24x7 availability of the services that enable these transactions. For eBay, that...
- A Reference Architecture for the Internet of Things
- The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- REST easy: API Design, Evolution and Connection
- RESTful design increases API performance, reduces development effort, and minimizes operational support burden. By following a few best practices and selecting RESTful tooling,... All Government IT White Papers
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- Why do you need an enterprise mobile platform? Today companies must offer great apps that run on a range of devices, and connect to an exploding set of backend data. Appcelerator...
- The Foundation You Need to Build a Better Storage Infrastructure Watch this webcast to hear how you can maximize the economics of your data center by modifying your storage footprint and power usage...
- Building Tomorrow's Data Center with Converged Technologies A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few.
- Technology for Everyone A Kansas school district modernizes teaching and learning and paves the way to a one-to-one program with a comprehensive upgrade of its wireless...
- All Government IT Webcasts