Pentagon Unprepared to Repel Cyber Attacks

In the event of a catastrophic cyber-attack on civilian infrastructure, the US military’s Cyber Command is one of the first and major lines of defence. However, the Pentagon won’t be able to test its ability to respond to such an event at least until 2019.

Mid-June, Cyber Command completed its Cyber Guard exercise. The drill gathered 800 representatives from various US agencies – including FBI, Justice Department, Homeland Security, and more – to practice repelling a major cyber-attack on US infrastructure. On the whole, the exercise was a success, except for one minor snag: it didn’t even come close to emulating a full scale attack against the US.

“We don’t have the scale or the complexity to truly represent a realistic and relevant threat, the ones that we’re truly trying to train to,” Brig Gen Charles L. Moore Jr, the Joint Chiefs of Staff’s deputy director for global operations, said in a hearing at the House of Representatives.

At the hearing, Cyber Command’s deputy commander, Lt Gen James K. “Kevin” McLaughlin, was asked if his forces were prepared to respond to the full range of potential attacks.

“I would not be able to say I’m confident we would be able to respond to all of those,” McLaughlin responded. “Control systems are different than platforms like airplanes and tanks, which are different from networks.”

Cyber Command is working to rectify this and is building a Persistent Training Environment – a sort of improved cyber firing range. It will hold a significantly wider selection of systems, networks, devices, and commercials industry participants. There, operators will train against a large range of attacks around the clock. This, Cyber Command chiefs assure, will give them the ability to be prepared for all (or most) possibilities. But the range won’t be ready until 2019, and until then, the US is appreciably vulnerable to cyber-attacks.

I-HLS

 

« Companies Should Tackle Cybercrime & 'take the fight to the criminals'
Cities Face Multiple Security Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.