Simulated cyber-attack to test government response
Cyber ShockWave test involves former administration staff, national security officials
Computerworld - Security industry analysts and lawmakers will get an unprecedented chance next week to evaluate how the government might respond to a cyber-attack on critical infrastructure targets.
The Bipartisan Policy Center (BPC), a Washington-based non-profit established in 2007 by several lawmakers, will host a simulated nation-wide cyber-attack next Tuesday for a group of former administration and national security officials, who will be playing the roles of Cabinet members.
The goal of the simulation, called Cyber ShockWave, is to see how officials in key government positions would react to a real-time cyber- attack, and to evaluate the split-second decisions they may be required to take to deal with it, a BPC alert noted.
Those playing the roles of various cabinet members include former DHS secretary Michael Chertoff, the former Director of National Intelligence John Negroponte, former White House Homeland Security Advisor Fran Townsend and former White House press secretary Joe Lockhart.
The participants, none of whom will have any advance information on the simulated attacks, will be expected to advise the President on the unfolding attacks and craft a response to them. The event is scheduled to take place at Washington's Mandarin Oriental Hotel.
A report in The Atlantic said that a considerable effort is being put into making the exercise as realistic as possible.
A production company has been hired to recreate a White House situation room in the Mandarin hotel, and professional scriptwriters will aid security experts in creating the simulated attack.
The whole exercise itself was developed by former CIA director general Michael Hayden and several others, including former New Jersey governor Thomas Kean and Congressman Lee Hamilton, both of whom were co-chairs of the 9/11 commission. Companies and organizations that are participating in the effort include General Dynamics, Georgetown University and PayPal.
This is not the first time that BPC has organized a similar exercise. In 2007, it hosted Oil Shockwave, an oil crisis simulation, in which nine former cabinet and national security advisors participated. The purpose of that exercise was to explore the economic and national security implications of a prolonged crisis in the oil industry.
This month's planned cyber-security simulation comes amid growing concerns over state-sponsored attacks against critical IT assets. The recent cyber-attacks against Google and more than 30 technology companies allegedly by operatives based out of China have highlighted what many say is the need for a formal U.S. policy for deterring and responding to such attacks.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts