Air Force Staff Sgt. Presky, left, Army Master Sgt. McCarthy and civilian personnel concentrate on exercise scenarios during “Cyber Guard 2015″ in Suffolk, Va., June 11, 2015. Image Credit: DoD – photo by Marvin Lynchard
The Department of Defense, along with critical infrastructure operators and experts from more than 100 organizations bridging government, private sector tech firms, allies and educational institutions, recently concluded a series of cyber defense exercises where participants practiced a “whole-of-nation response” to destructive cyberattacks targeting U.S. critical infrastructure.
Now its fourth year, the “Cyber Guard” exercise drew a record number of players for a three-week cyber war game, testing 14 teams on a range of simulated attacks on two continents, the Department of Defense said.
Cyber Guard 15 took place June 8-26 in Suffolk, Virginia, where more than 1000 participants including Army, Navy, Marines, Air Force and Coast Guard personnel received ‘over-the-shoulder’ training, and assistance. Private industry and DoD mission owners of Industrial Control Systems (ICS) were advised on risks in critical infrastructure facilities, according to a fact sheet (PDF) published by the Defense Department following the conclusion of the exercise.
U.S. Cyber Command, the DHS and the FBI co-led the exercise, which involved private-industry organizations, including several information and sharing analysis centers, as well as public and private research institutions.
“Hands-on instruction and exercise scenarios were conducted on a classified (SECRET) closed network environment which emulates both DoD and non-DoD networks,” the DoD explained. “Blue Team ‘friendly forces’ worked to defend critical infrastructure networks and respond to a range of incidents. A live, expert opposing force (OPFOR) replicated a range of adversaries seeking to disrupt critical US infrastructure.”
“Cyber Guard is designed to exercise the interface between the Department of Defense — the active and Reserve and Guard components — that are focused on the cyber mission, and to partner with other elements of the U.S. government as well as state and local authorities,” DoD news quoted Admiral Michael Rogers, Commander of U.S. Cyber Command Commander, as saying. Rogers also serves as the director of the NSA and chief of the Central Security Service.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
