DHS offers first take on Cyber Storm exercise
RSA panel offers insight and the occasional real-time censorship moment
IDG News Service - With its latest Cyber Storm II exercise now completed, the U.S. Department of Homeland Security said it expects to release an after-action report analyzing the event, and is now beginning planning for Cyber Storm III in 2010.
Cyber Storm 2 was a week-long cybersecurity simulation that included mock attacks on computer and transportation systems. But the exercise brought in many more players from government and other industries: about 2,500 people from the U.S., U.K., Canada, Australia and New Zealand.
DHS Assistant Secretary for Cyber Security and Communications Gregory Garcia described a typical Cyber Storm II scenario, in an interview at the RSA Conference in San Francisco Wednesday.
"You have a simulated incident that comes in over the e-mail and it may have only to do with the chemical sector at this point. There's an employee in the chemical sector who's arrested," he said. "He was fired the day before and did something to sabotage the network ... so somebody in the chemical sector gets that. 'OK what do I do with that?'"
The exercise even simulated the media's response. "You have mock news reports," Garcia said. "It shows up on the Web as a news story. People are reading that and they have to separate out what's the level of hearsay in the news report."
By participating in Cyber Storm II, emergency response mangers could find out if their plans worked out as expected, and, in particular, if people wound up doing what the planners thought they would do, said Christine Adams, a senior information systems manager at the Dow Chemical Company, speaking during a panel discussion at the conference.
"You think you know how people are going to respond ... but they surprise you sometimes," said Cyber Storm II participant Daniel Lohrmann, the chief information security officer with Michigan's Department of Information Technology.
Anyone looking for the gory details on how successful attackers were during the latest Cyber Storm will have to wait. Because some of the findings from the exercise are sensitive, the DHS doesn't want to discuss specifics until the after-report is issued, and that's not expected to happen until August at the earliest.
Dow Chemical's Adams did offer one example of a lesson learned before she was cut off by her panel's DHS moderator. "It got to the point where our communications capability was somewhat compromised," she said. "We have some work to do around having the means to get priority telecom service if we need it."
Garcia offered one lesson as well: "It's better to exchange business cards now rather than during a crisis," he said. In fact the relationships built during the months of planning ahead of the Cyber Storm II were invaluable, he said. "If the exercise never even took place, I think people would have come away with a much better appreciation of what their vulnerabilities are, what could potentially happen to them, and who they need to connect with in this vast network."
Cyber Storm II was held during the week of March 10. The next event is expected to happen around the same time of year in 2010.
Garcia would like to see more participants and new industry sectors being the "core players" in the next exercise, he said.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- 2014 Gartner Magic Quadrant Report
- For the 7th year in a row, Riverbed is in the "Leaders" Quadrant of the 2014 Magic Quadrant for WAN Optimization Controllers. In...
- Transforming Business Performance with Hybrid Networks
- IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control....
- Accelerating the Delivery Microsoft Office 365
- Many organizations use Office 365's cloud-based mail, collaboration and communication services as the dominant workload. However, as services move to the cloud, data...
- Path Selection Infographic
- Path selection technology provides the ability to re-direct select traffic and application flows through alternate WAN routes based on service metrics, such as... All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts