Pentagon Unprepared to Repel Cyber Attacks

In the event of a catastrophic cyber-attack on civilian infrastructure, the US military’s Cyber Command is one of the first and major lines of defence. However, the Pentagon won’t be able to test its ability to respond to such an event at least until 2019.

Mid-June, Cyber Command completed its Cyber Guard exercise. The drill gathered 800 representatives from various US agencies – including FBI, Justice Department, Homeland Security, and more – to practice repelling a major cyber-attack on US infrastructure. On the whole, the exercise was a success, except for one minor snag: it didn’t even come close to emulating a full scale attack against the US.

“We don’t have the scale or the complexity to truly represent a realistic and relevant threat, the ones that we’re truly trying to train to,” Brig Gen Charles L. Moore Jr, the Joint Chiefs of Staff’s deputy director for global operations, said in a hearing at the House of Representatives.

At the hearing, Cyber Command’s deputy commander, Lt Gen James K. “Kevin” McLaughlin, was asked if his forces were prepared to respond to the full range of potential attacks.

“I would not be able to say I’m confident we would be able to respond to all of those,” McLaughlin responded. “Control systems are different than platforms like airplanes and tanks, which are different from networks.”

Cyber Command is working to rectify this and is building a Persistent Training Environment – a sort of improved cyber firing range. It will hold a significantly wider selection of systems, networks, devices, and commercials industry participants. There, operators will train against a large range of attacks around the clock. This, Cyber Command chiefs assure, will give them the ability to be prepared for all (or most) possibilities. But the range won’t be ready until 2019, and until then, the US is appreciably vulnerable to cyber-attacks.

I-HLS

 

« Companies Should Tackle Cybercrime & 'take the fight to the criminals'
Cities Face Multiple Security Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

Secura

Secura

The Secura Cyber Security and Intelligence system predicts and prevents security threats by discovering hidden patterns through the meticulous analysis of large amounts of data.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

BotGuard

BotGuard

BotGuard provides a service to protect your website from malicious bots, crawlers, scrapers, and hacker attacks.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.