Pentagon Unprepared to Repel Cyber Attacks

In the event of a catastrophic cyber-attack on civilian infrastructure, the US military’s Cyber Command is one of the first and major lines of defence. However, the Pentagon won’t be able to test its ability to respond to such an event at least until 2019.

Mid-June, Cyber Command completed its Cyber Guard exercise. The drill gathered 800 representatives from various US agencies – including FBI, Justice Department, Homeland Security, and more – to practice repelling a major cyber-attack on US infrastructure. On the whole, the exercise was a success, except for one minor snag: it didn’t even come close to emulating a full scale attack against the US.

“We don’t have the scale or the complexity to truly represent a realistic and relevant threat, the ones that we’re truly trying to train to,” Brig Gen Charles L. Moore Jr, the Joint Chiefs of Staff’s deputy director for global operations, said in a hearing at the House of Representatives.

At the hearing, Cyber Command’s deputy commander, Lt Gen James K. “Kevin” McLaughlin, was asked if his forces were prepared to respond to the full range of potential attacks.

“I would not be able to say I’m confident we would be able to respond to all of those,” McLaughlin responded. “Control systems are different than platforms like airplanes and tanks, which are different from networks.”

Cyber Command is working to rectify this and is building a Persistent Training Environment – a sort of improved cyber firing range. It will hold a significantly wider selection of systems, networks, devices, and commercials industry participants. There, operators will train against a large range of attacks around the clock. This, Cyber Command chiefs assure, will give them the ability to be prepared for all (or most) possibilities. But the range won’t be ready until 2019, and until then, the US is appreciably vulnerable to cyber-attacks.

I-HLS

 

« Companies Should Tackle Cybercrime & 'take the fight to the criminals'
Cities Face Multiple Security Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Superna

Superna

Superna is the global leader in data security and cyberstorage solutions for unstructured data, both on-prem and in the hybrid multi-cloud.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.