SYS-CON MEDIA Authors: Stackify Blog, Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan

Blog Feed Post

US Cyber Command Conducts Tactical Cyber Exercise

Editor’s note: This is an official release from US Cyber Command reposted here for your information.

Approximately 300 attend week-long training By Col. Rivers Johnson U.S. Cyber Command Public Affairs Officer 

The U.S. Cyber Command, whose mission is to operate and defend the Department of Defense networks, recently conducted its first major tactical cyber exercise called Cyber Flag 12-1 in the first week of November.

The joint cyberspace training exercise, primarily conducted at the Air Force Red Flag Facility at Nellis Air Force Base, Nev., included other locations. It brought together approximately 300 cyber and IT professionals for a week to hone their cyber skills in a tactical, virtual environment against a realistic adversary.

One of the objectives of Cyber Flag was to provide realistic training opportunities for the cyber components and some governmental organizations in executing cyber operations across the full spectrum of operations.

Cyber Flag allowed the command to exercise and institutionalize processes and procedures while at the same time providing a framework for future operational imperatives. The exercise also focused on mission integration between U.S. Cyber Command and the cyber components from the Army, Navy, Air Force and Marines.

“Cyber Flag exceeded my expectations,” said Gen. Keith B. Alexander, commander of U.S. Cyber Command and director of the National Security Agency. “There was tremendous participation from the service components that included active [military], [National] Guard, Reserve, civilians and contractors as well as from the combatant commands and DoD agencies.”

Alexander said it was a successful team effort with great support from everyone.

The exercise included an opposing force whose mission was to penetrate and disrupt the computer networks of the “good guys,” or Blue Force.

The Blue Force (Cyber Service Components) conducted operations against the opposing forces in addition to defending their own networks. As part of the exercise scenario, daily briefings were conducted to compare notes on how well the integration and synchronization of cyber operations were conducted against the opposing forces and what best practices could be gathered from the Blue Force elements.

The exercise was conducted on a state-of-the-art cyber security training and simulation platform called the Exercise Network, or XNET.

XNET provided participants web access to real-time, real-world security challenges and scenarios just like those they would encounter against an adversary. XNET was created by the CERT Program at the Software Engineering Institute.

“Exercises like Cyber Flag are important to the command because they provide an assessment and a validation of how well the command can perform its real world mission of being able to operate and defend the DoD networks across the full range of cyber operations,” said Air Force Col. George Lamont, the U.S. Cyber Command director of Exercise, Training and Readiness.

He added that the exercise was successful because it enabled the command to integrate and synchronize joint war-fighting efforts with the Service Cyber Components in a realistic scenario.

Cyber security continues to be a priority across the government. The Department of Defense has a critical role in developing and supporting the nation’s cyber security efforts.

The Cyber Flag exercise was just one of the training opportunities to ensure DoD’s cyber security challenges are met. In June 2009, then Secretary of Defense Robert Gates directed the establishment of the U.S. Cyber Command. Alexander assumed command of the unit in May 2010.

“This exercise was a long-time coming and has been needed for years,” said Petty Officer 1st Class Kurt Myers of Navy Information Operations Command. “We were able to collaborate with the other services and we’ll leave here with a lot of lessons learned.”

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Latest Stories
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Here to help unpack insights into the new era of using containers to gain ease with multi-cloud deployments are our panelists: Matt Baldwin, Founder and CEO at StackPointCloud, based in Seattle; Nic Jackson, Developer Advocate at HashiCorp, based in San Francisco, and Reynold Harbin, Director of Product Marketing at DigitalOcean, based in New York. The discussion is moderated by Dana Gardner, principal analyst at Interarbor Solutions.
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
GCP Marketplace is based on a multi-cloud and hybrid-first philosophy, focused on giving Google Cloud partners and enterprise customers flexibility without lock-in. It also helps customers innovate by easily adopting new technologies from ISV partners, such as commercial Kubernetes applications, and allows companies to oversee the full lifecycle of a solution, from discovery through management.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
Using serverless computing has a number of obvious benefits over traditional application infrastructure - you pay only for what you use, scale up or down immediately to match supply with demand, and avoid operating any server infrastructure at all. However, implementing maintainable and scalable applications using serverless computing services like AWS Lambda poses a number of challenges. The absence of long-lived, user-managed servers means that states cannot be maintained by the service. Lo...
Using serverless computing has a number of obvious benefits over traditional application infrastructure - you pay only for what you use, scale up or down immediately to match supply with demand, and avoid operating any server infrastructure at all. However, implementing maintainable and scalable applications using serverless computing services like AWS Lambda poses a number of challenges. The absence of long-lived, user-managed servers means that states cannot be maintained by the service. Lo...
With the new Kubernetes offering, ClearDATA solves one of the largest challenges in healthcare IT around time-to-deployment. Using ClearDATA's Automated Safeguards for Kubernetes, healthcare organizations have access to the container orchestration to dynamically deploy new containers on demand, monitor the health of each container for threats and seamlessly roll back faulty application updates to a previous version, avoid system-wide downtime and ensure secure continuous access to patient data.
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
Docker and Kubernetes are key elements of modern cloud native deployment automations. After building your microservices, common practice is to create docker images and create YAML files to automate the deployment with Docker and Kubernetes. Writing these YAMLs, Dockerfile descriptors are really painful and error prone.Ballerina is a new cloud-native programing language which understands the architecture around it - the compiler is environment aware of microservices directly deployable into infra...
Signs of a shift in the usage of public clouds are everywhere. Previously, as organizations outgrew old IT methods, the natural answer was to try the public cloud approach; however, the public platform alone is not a complete solution. Complaints include unpredictable/escalating costs and mounting security concerns in the public cloud. Ultimately, public cloud adoption can ultimately mean a shift of IT pains instead of a resolution. That's why the move to hybrid, custom, and multi-cloud will ...