IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

DHS Holds Largest Cyber Storm II Exercise Yet

Cyber Storm, the Department of Homeland Security's biennial exercise series, provides the framework for the nation's largest cyber security exercise.

The U.S. Department of Homeland Security (DHS) is conducting the largest cyber security exercise ever organized. Cyber Storm II is being held from March 10-14 in Washington, D.C. and brings together participants from federal, state and local governments, the private sector, and the international community. Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation's cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

"Securing cyberspace is vital to maintaining America's strategic interests, public safety, and economic prosperity," said Greg Garcia, Homeland Security Assistant Secretary for Cyber Security and Communications. "Exercises like Cyber Storm II help to ensure that the public and private sectors are prepared for an effective response to attacks against our critical systems and networks."  

Cyber Storm II will include 18 federal departments and agencies, nine states (Calif., Colo., Del., Ill., Mich., N.C., Pa., Texas and Va.), five countries (United States, Australia, Canada, New Zealand and the United Kingdom), and more than 40 private sector companies. They include ABB, Inc., Air Products, Cisco, Dow Chemical Company Inc., Harris Corporation, Juniper Networks, McAfee, Microsoft, NeuStar, PPG Industries, and Wachovia.

Cyber Storm II objectives include:

  • Examining the capabilities of participating organizations to prepare for, protect against, and respond to the potential effects of cyber attacks
  • Exercising strategic decision making and interagency coordination of incident response in accordance with national level policy and procedures
  • Validating information sharing relationships and communications paths for the collection and dissemination of cyber incident situational awareness, response and recovery information
  • Examining means and processes through which to share sensitive information across boundaries and sectors without compromising proprietary or national security interests
For more information on Cyber Storm II visit:http://www.dhs.gov/xprepresp/training/gc_1204738275985.shtm