Cyber Storm finds weaknesses
Experts disagree over reasons why government is ill-prepared for cyberattacks
The Homeland Security Department’s Cyber Storm exercise earlier this year uncovered critical problems with the government’s ability to handle large-scale cyberattacks, from difficulties with coordination to problems with information sharing. For many in industry, those results are not surprising.
The findings in the official report on the exercise, released Sept. 13, “affirm what many of us already knew was a problem,” said Paul Kurtz, executive director of the Cyber Security Industry Alliance.
The problems that Cyber Storm illuminated are familiar, but the reasons for them are not so clear. Analysts and industry representatives disagree on the reasons for the government’s poor performance and the benefits that could be gleaned from the experience.
Cyber Storm was a $3 million, four-day tabletop exercise conducted in February by DHS’ National Cyber Security Division. Its goal was to test whether the nation’s critical infrastructure could withstand major cyberattacks. Cyber Storm involved more than 100 public and private agencies and corporations in more than 60 locations in five countries, making it one of the largest cybersecurity exercises ever conducted.
Kurtz called for programs that mitigate attacks, adding that the government should develop an early warning system. Such programs are considered essential for improving security. He said Cyber Storm revealed poor leadership as one of the biggest problems because it led to a lack of coordination.
“The government has shown little strategic direction of leadership when it comes to ensuring the resiliency and integrity of our information infrastructure,” said Kurtz, who praised Greg Garcia’s appointment to DHS’ long-vacant position of assistant secretary for cybersecurity and telecommunications.
But Alan Paller, director of research for the computer security certification firm SANS Institute, disagreed with Kurtz’s assessment.
“There is a belief among some circles that this is a policy and process problem when the reality is that this is a people and technology problem,” Paller said.
He emphasized the importance of spending more money on protecting critical infrastructure by adding employees.
“The essential problem is there aren’t enough people who are technically skilled and trust each other,” he said.
Almost all the experts said the exercise was beneficial for different reasons.
Tiffany Jones, regional manager for North and Latin American relations at Symantec, said the most important lesson from Cyber Storm might be finding out what could go wrong in a real attack.
“A lot of people forget that the reason why the exercise exists is to identify where the problems are,” she said. “The really important thing isn’t the results of this Cyber Storm but the results of the next.”
Symantec was involved with the exercise, working with the Information Technology Information Sharing and Analysis Center.
“I think the benefit of the exercise was that a group of some of the best and brightest in the country got to know each other,” Paller said.
NEXT STORY: House bill would give DHS IG SBInet oversight