Advanced search Help
Searching for terms: EXACT: "DHS Cyber Storm Exercise Reports" in: series
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Cyber Storm V: After Action Report
From the executive summary: "Cyber Storm (CS), the Department's capstone national-level cyber exercise series, provides the framework for the most extensive government-sponsored cybersecurity exercises of its kind. Mandated by Congress, these exercises are part of the Department's ongoing efforts to assess and strengthen cyber preparedness and examine incident response processes. DHS uses the findings from these exercises to advance collective cyber incident response capabilities. They also strengthen information sharing partnerships among federal, state, international, and private sector partners. The National Cybersecurity and Communications Integration Center's (NCCIC) National Cyber Exercise and Planning Program (NCEPP), under the Office of Cybersecurity & Communications (CS&C), sponsors the exercise series. [In conclusion,] CS V provided a realistic environment for our national cyber response apparatus to assess cyber incident response capabilities. DHS and participating organizations worked closely to establish the exercise's goal and 100 objectives and design a realistic scenario that allowed stakeholders to address both organizational and national-level objectives. The resulting scenario allowed the community to coordinate a national-level response to a significant cyber incident. As part of exercise play, players identified significant findings and actions at the national, state, sector, and organizational level that the cyber response community should address. Ultimately, CS V served as a tool that allowed the stakeholder community to examine the evolution of cyber response capabilities and identify current gaps and challenges in responding to a coordinated cyber attack with global impacts. As a result, stakeholders have the opportunity to address these findings and bolster cyber response capabilities at an organizational-level, increasing the preparedness of the nation as a whole"
United States. Department of Homeland Security
2016-07
-
Informing Cyber Storm V: Lessons Learned from Cyber Storm IV
"This report seeks to inform the development of Cyber Storm V (CS V) and to share lessons learned from Cyber Storm
IV (CS IV). This report aggregates the After Action Reports (AAR) from each of the exercises conducted as part of
the Department of Homeland Security's (DHS) CS IV Exercise Series. The report also provides a general overview
of the series and a discussion of trends observed across the exercises. DHS is using the high-level findings and lessons
learned from the series to inform the objectives and direction of CS V."
United States. Department of Homeland Security
2015-06
-
Cyber Storm III: Final Report
"The National Cyber Exercise: Cyber Storm (CS) is the Department of Homeland Security's (DHS) capstone national-level cybersecurity exercise and represents the Nation's most extensive cybersecurity exercise effort of its kind. Cyber Storm is a Homeland Security Exercise and Evaluation Program (HSEEP) Tier II exercise focusing on federal strategy and policy. The Department's National Cyber Security Division (NCSD) sponsors the exercise to improve the capabilities of the cyber incident response community; encouraging the advancement of public--private partnerships within the critical infrastructure sectors and strengthening relationships between the Federal Government and partners at the state, local, and international levels. CS III included participation from 8 Cabinet-level departments, 13 states, 12 international partners, and approximately 60 private-sector companies and coordination bodies. Participation focused on the information technology (IT), communications, energy (electric), chemical, and transportation critical infrastructure sectors and incorporated various levels of play from other critical infrastructure sectors. Together, these entities participated in the design, execution, and post-exercise analysis of the largest, most comprehensive Government-led, full-scale cyber exercise to date. Participants exercised their ability to prepare for, protect from, and respond to cyber attacks and execute current national cybersecurity plans and capabilities. Players responded to simulated attacks according to established policies and procedures. No actual networks were targeted or affected during the exercise. Participants successfully executed CS III between September 27 and October 1, 2010, at player locations across the United States and internationally, with the main Exercise Control (ExCon) cell located at U.S. Secret Service (USSS) Headquarters in Washington, D.C."
United States. Department of Homeland Security
2011-07
-
Cyber Storm II: Final Report
"The National Cyber Exercise: Cyber Storm II successfully executed on March 10 -- 14, 2008 at player locations across the United States, as well as in international partner locations in Australia, Canada, New Zealand, and the United Kingdom. The Department of Homeland Security -- National Cyber Security Division (DHS -- NCSD) sponsored the exercise to improve the capabilities of the cyber incident response community, encourage the advancement of public-private partnerships within the critical infrastructure sectors, and strengthen the relationship between the federal government and its government partners at the state, local, and international levels. The primary goal of planning and executing Cyber Storm II was to provide the arena to examine the processes, procedures, tools, and organizations of the cyber response community in response to a multi-sector coordinated attack through, and on, the global cyber infrastructure. The exercise incorporated a wide spectrum of players representing 18 federal agencies, nine states, five countries, interagency coordination bodies, and over 40 private sector companies. The coordinated cyber attacks facilitated incident response from the technical, operational, and strategic perspectives. Cyber Storm simulated cyber attacks that were focused on critical infrastructure in the Information Technology (IT), Communications, Chemical, and Transportation (specifically Rail and Pipe) sectors and required action from foreign and domestic partners in the cyber response community. [...]. This Final Report is a consolidation of findings, observations, and participant inputs gathered throughout the planning and execution phases of Cyber Storm II. It represents the informational foundation for continuing efforts to assess how those findings translate into steps that DHS and the wider player community might take to improve national cyber security in the future."
United States. Department of Homeland Security
2009-07
-
Cyber Storm: Exercise Report
"Cyber Storm was designed to exercise communication, incident response policies, and operational procedures in response to various cyber incidents, and to identify future planning and process improvements. The exercise challenged players to identify policies and procedures required for sharing information with groups internal and external to their organizations, such as across Federal and State departments, private organizations, and across international borders. This required players to determine what information should be shared with which organization and at what time. The exercise also highlighted the collaboration capabilities among international and government communities and their respective capacity to maximize communications and enhance response and recovery efforts. The findings from the exercise showed many areas where intra-sector, cross-sector and public/private partnerships worked effectively to communicate and resolve issues but also highlighted areas where communications and planning could be improved. Future focus on correlation of multiple incidents; and communication, coordination, and collaboration across the cyber incident response community were emphasized by both public and private stakeholders."
United States. Department of Homeland Security
2006-09-12
1