DHS Conducts Cyber Storm II To Examine Preparedness, Response Capabilities

The Department of Homeland Security (DHS) is conducting the largest cyber security exercise ever organized. Cyber Storm II is being held from March 10-14 in Washington, D.C. and brings together participants from federal, state and local governments, the private sector and the international community.

Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

“Securing cyberspace is vital to maintaining America’s strategic interests, public safety, and economic prosperity,” said Greg Garcia, Homeland Security Assistant Secretary for Cyber Security and Communications. “Exercises like Cyber Storm II help to ensure that the public and private sectors are prepared for an effective response to attacks against our critical systems and networks.”

Cyber Storm II will include 18 federal departments and agencies, nine states (Calif., Colo., Del., Ill., Mich., N.C., Pa., Texas and Va.), five countries (United States, Australia, Canada, New Zealand and the United Kingdom), and more than 40 private sector companies. They include ABB, Inc., Air Products, Cisco, Dow Chemical Company Inc., Harris Corporation, Juniper Networks, McAfee, Microsoft, NeuStar, PPG Industries, and Wachovia.

Cyber Storm II objectives include:

  • Examining the capabilities of participating organizations to prepare for, protect against, and respond to the potential effects of cyber attacks.
  • Exercising strategic decision making and interagency coordination of incident response in accordance with national level policy and procedures.
  • Validating information sharing relationships and communications paths for the collection and dissemination of cyber incident situational awareness, response and recovery information.
  • Examining means and processes through which to share sensitive information across boundaries and sectors without compromising proprietary or national security interests.

For more information on Cyber Storm II, visit http://www.dhs.gov/xprepresp/training/gc_1204738275985.shtm.

  • Becoming a Guide on the Customer Journey Becoming a Guide on the Customer Journey

    In this episode, Security Today editor-in-chief Ralph Jensen chats with Chris Hugman of System Surveyor about the customer journey. As the company’s chief executive officer, Hugman continues to work toward his vision of seamless systems management from concept to system end-of-life. He also addresses what it takes to be a guide in the security industry and why it is different from the traditional sales process. Originally a systems integrator, Hugman reveals his thoughts on technology and the prospects of the customer journey over the next few years, as well as the direction of technology.

Digital Edition

  • Environmental Protection
  • Occupational Health & Safety
  • Spaces4Learning
  • Campus Security & Life Safety