DHS Announces Start Of Cyber Storm III Exercise

Department of Homeland Security (DHS) Secretary Janet Napolitano recently announced the beginning of Cyber Storm III -- a three-day long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.

“Securing America’s cyber infrastructure requires close coordination with our federal, state, international and private sector partners,” Napolitano said. “Exercises like Cyber Storm III allow us build upon the significant progress we’ve made in responding to evolving cyber threats.” 

Cyber Storm III is an exercise scenario that simulates a large-scale cyber attack on critical infrastructure across the nation. The goal of the exercise is to examine and strengthen collective cyber preparedness and response capabilities, involving thousands of participants across government and industry.

As part of Cyber Storm III, DHS will exercise elements of the newly-developed National Cyber Incident Response Plan (NCIRP) -- a blueprint for the Nation’s cybersecurity incident response. 

Cyber Storm III participants include:

  • Administration-Wide -- Seven Cabinet-level departments including Commerce, Defense, Energy, Homeland Security, Justice, Transportation and Treasury, in addition to the White House and representatives from the intelligence and law enforcement communities.
  • Eleven States -- California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, as well as the Multi-State Information Sharing and Analysis Center (ISAC).
  • 12 International Partners -- Australia, Canada, France, Germany, Hungary, Italy, Japan, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom.
  • 60 Private Sector Companies -- DHS worked with representatives from the Banking and Finance, Chemical, Communications, Dams, Defense Industrial Base, Information Technology, Nuclear, Transportation, and Water Sectors, as well as the corresponding Sector Coordinating Councils and ISACs, to identify private sector participants.

Cyber Storm III also represents the first major exercise testing the new National Cybersecurity and Communications Integration Center (NCCIC) -- which serves as the hub of national cybersecurity coordination and was established in October of 2009.

For more information on Cyber Storm III, visit http://www.dhs.gov/files/training/gc_1204738275985.shtm

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.