Cyber Storm Overview Wednesday 2/1/06 0900 PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

WV High Quality Standards for Schools
Program partners engage in a broad range of security cooperation activities to include homeland defense/security, disaster response/mitigation, consequence/crisis.
Building from the Ground Up Disaster Management: The Experience of A Small Business Frances Kernodle Associates (FKA)
Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
April 6, 2011 DRAFT Educator Evaluation Project. Teacher Education and Licensure DRAFT The ultimate goal of all educator evaluation should be… TO IMPROVE.
FROM CRISIS RESPONSE TO INCLUSIVE GROWTH By Chada Koketso.
National Infrastructure Protection Plan
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
10/29/20091 Innovation Partnerhsip Models with the Finance Sector Dept. of Homeland Security Science & Technology Directorate Douglas Maughan, Ph.D. Branch.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Common recommendations and next steps for improving local delivery of climate finance Bangkok, October 31, 2012.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
Incident Response Mechanism for Chemical Facilities By Stephen Fortier and Greg Shaw George Washington University, Institute for Crisis, Disaster and Risk.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
The Integrated Pilot Comprehensive Exercise (IPCE) Briefing to the U.S. Nuclear Regulatory Commission’s 21st Annual Regulatory Information Conference Marc.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
1 Robert S. Webb and Roger S. Pulwarty NOAA Climate Service.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Shelter Training 08b – Belgium, 16 th –18 th November, 2008 based on content developed by p This session describes the benefits of developing a strategic.
Dam Hazard Consequences Assessment
March 2009 PERFORMANCE EVALUATION OF PUBLIC SERVICE DELIVERY (Social Services)– KENYAN EXPERIENCE March 2009 PERSPECTIVES ON IMPACT EVALUATION Presenter:
Overview of the SPDG Competition Jennifer Doolittle, Ph.D. 1.
Lower Mississippi Valley Joint Venture Management Board Meeting the Expectations and Challenges of Joint Venture Implementation Buras, Louisiana June.
SSHRC Partnership and Partnership Development Grants Rosemary Ommer 1.
Critical Infrastructure Protection: Program Overview
Virginia Local Government IT Executives (VALGITE) April 26, 2010 Bruce Sturk & Leslie Fuentes – City of Hampton.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
1 The “New FEMA” The National Logistics Coordination Forum March 27, 2008 Eric Smith Assistant Administrator Logistics Management Directorate FEMA LOGISTICS.
1. Housekeeping Items June 8 th and 9 th put on calendar for 2 nd round of Iowa Core ***Shenandoah participants*** Module 6 training on March 24 th will.
ITS Standards Program Strategic Plan Summary June 16, 2009 Blake Christie Principal Engineer, Noblis for Steve Sill Project Manager, ITS Standards Program.
PS Version 1 National Response Framework Overview for Private Sector Audiences January 22, 2008.
Shelter Cluster Coordinating humanitarian shelter Update from the Global Shelter Cluster Shelter Centre meeting Geneva, 25 May 2012.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
The State Climatologist Program and a National Climate Services Initiative Mark A. Shafer Oklahoma Climatological Survey University of Oklahoma.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
The Commonwealth Has a “VOICCE” Virginia’s Operational Integration Cyber Center of Excellence.
Economic Consequence Analysis Module: Regional and National Economic Impacts of Port Disruptions Kickoff Template Submission Date: January 2, 2015 Research.
WP6 – Dissemination Project Name: Enhancing Students Participation in Quality Assurance in Armenian HE- ESPAQ Ref TEMPUS BE-TEMPUS-SMGR.
Social Analysis Workshop on Country Analytical Work June 19, 2001 Anis Ahmad Dani World Bank, Social Development Department.
DEVELOPING THE WORK PLAN
THE SECURITY SECTOR REVIEW PROCESS. ISSUES Understanding: -Scope: What are the elements of a SS Review? -Need: Why review the Security Sector? -Process:
Evaluation Research Dr. Guerette. Introduction Evaluation Research – Evaluation Research – The purpose is to evaluate the impact of policies The purpose.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Department of Social Development National Conference Early Childhood Development Conference “Tshwaragano Ka Bana” 29th March 2012 The National Integrated.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
Community Resilience Jill J Artzberger, MPH 2011 Texas Emergency Management Conference Thursday, April 28, 2011.
Society for Maintenance and Reliability Professionals (SMRP)
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Michigan National Guard CBRN Response Exercise NORTHERN EXPOSURE 17 Overview June 2017.
California Cybersecurity Integration Center (Cal-CSIC)
Nurse Residency Programs Mary Catherine Pilkington, BSN-SN NUR 4030
8 Building Blocks of National Cyber Strategies
America’s First National Critical Infrastructure Exercise
Conduction of a simulation considering cascading effects
Cybersecurity ATD technical
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Developing a shelter strategy
Homeland Security Program School of Health, Science & Criminal Justice Fall 2015 Assessment Report
MODULE 11: Creating a TSMO Program Plan
Presentation transcript:

Cyber Storm Overview Wednesday 2/1/ PT

Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace Examine NCRCG concept of operations for national cyber incident response with public and private-sector stakeholders.

Cyber Storm will be a five-day, phased, distributed exercise that includes a 36 hour period of 24x7 play, staged in real-time with time jumps to allow full crisis. It will incorporate build-up, crisis and response/recovery phases... The cyber attacks aimed at state and federal government agencies are intended to degrade government operations and the delivery of public services, diminish the ability to remediate impacts on other infrastructure sectors and undermine public confidence.

DHS has indicated that the Cyber Defense Technology Experimental Research Project (DETER) network testbed will also play a role in the simulation. Funded by DHS and the National Science Foundation, DETER is used by both government and commercial network researchers to create virtual models of complex networks, and to subject them to attacks, in a closed and secure environment. Cyber Storm will be a larger, more abstract, version of cyber security exercises routinely conducted by a variety of institutions. (Gov’t Security News)

DETER - Cyber Storm Outcomes Demonstrate Relevance to National Strategy to Secure Cyberspace –Provide for the Development of Tactical and Strategic Analysis of Cyber Attacks and Vulnerability Assessments (page 21) –A/R 2-2: DHS, in coordination with appropriate agencies and the private sector, will lead in the development and conduct of a national threat assessment including red teaming, blue teaming, and other methods to identify the impact of possible attacks on a variety of targets. (page 56) –A/R 2-12: To optimize research efforts relative to those of the private sector, DHS will ensure that adequate mechanisms exist for coordination of research and development among academia, industry and government, and will develop new mechanisms where needed. (page 57) Exercise “Experimenter’s Workbench” Capability –Realistic Referential Data for Exercise Participants Ability to Simulate Agency Participation in National Exercises Ability to Model Multiple Attacks on Multiple Networks Engage Cyber Storm Stakeholder Community

DHS S&T Cyber Storm Objectives - DETER Provide Opportunity to Evaluate S&T DETER Investment Demonstrate Relevance of DETER Simulation Capability Transition DETER Technology –Test DETER Ability to Provide Meaningful Operational Feedback –Understand Current Limits of DETER Capability –Establish Baseline for Future Evolution of DETER Capability Understand Requirements for In-Situ Course of Action Estimation for Cyber Security Decision Making Investigate DETER Potential for Use in Cyber Security War Gaming Expand DETER Stakeholder Community

DETER Cyber Storm CONOP Ron Ostrenga and Paul Walczak at EXCON facility (USSS HQ, D.C.) DETER testbed operates in Cyber Storm dedicated mode 6-10 Feb 8 MSEL events scripted; opportunity for ad hoc engagement We will NOT operate 7*24; ET (unless some compelling reason arises) NCSD intends to use DETER extensively in AAR process

DETER Related MSEL DET Projecting Impact of Major DDOS Attack Effects on State ET Feb 2006 DET Provide Major Blood Bank a predictive assessment related to effects of likely extortion consequences ET Feb 2006 DET Modeling Network Conditions Effecting on State ET Feb 2006 DET Provide State1 a predictive assessment related to effects of likely extortion consequences ET Feb 2006 DET Modeling Network Conditions Effecting on State ET Feb 2006 DET Monitoring DDOS Attack Effects on State ET Feb 2006 DET Monitoring DDOS Attack Effects on State ET Feb 2006 DET Monitoring ISP Outage Effects on State ET Feb 2006

Q & A