{"id":1268,"date":"2013-07-18T00:00:00","date_gmt":"2013-07-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/07\/18\/big-banks-staged-mega-cyberattack-drill-last-thursday\/"},"modified":"2021-12-30T11:39:04","modified_gmt":"2021-12-30T11:39:04","slug":"big-banks-staged-mega-cyberattack-drill-last-thursday","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/07\/18\/big-banks-staged-mega-cyberattack-drill-last-thursday\/","title":{"rendered":"Big banks staged mega-cyberattack drill last Thursday"},"content":{"rendered":"<p style=\"margin: 0px;\">About 50 institutions &#8212; including banks like JPMorgan Chase (JPM, Fortune 500) and Bank of America (BAC, Fortune 500) &#8212; participates in the exercise, called &#8220;Quantum Dawn 2.&#8221; To take part in the drills, each of the participating institutions will be running software developed by Cyber Strategies, a Northfield, Vt., firm that specializes in making cyber exercise software for financial institutions. Karl Schimmeck, SIFMA&#8217;s vice president of financial services operations, declined to share specifics of what exactly the simulated threats would look like, but similar drills in the past have looked like a giant, computerized version of roleplaying game Dungeons and Dragons.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">An employee sitting at his desk might get a prompt saying, &#8220;this bank is having integrity issues with money,&#8221; or &#8220;you cant make trades over this technical system.&#8221; The employee then might role-play talking to an FBI agent &#8212; likely an actual one enlisted to help with the drill, said Dave Aitel, CEO of the security firm Immunity, who formerly worked as a research scientist for the National Security Agency.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The financial sector is hoping to prepare itself for a massive, disruptive attack &#8212; a growing concern lately, as &#8220;hacktivists,&#8221; organized cybercriminals and government-spnosored attacks become increasingly large and successful. Though still a far-off doomsday scenario, some security industry experts say the financial sector is vulnerable to cyber-terrorists aiming to damage the U.S. economy. That&#8217;s because banks and other financial institutions have to do deal with money flows in real time, with markets hanging in the balance.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Though some skeptical security experts dismissed Quantum Dawn as a PR stunt, SIFMA said the first run was useful in uncovering flaws in the industry&#8217;s cyberattack protocols. The trade group found that banks were largely good at sharing information with one another, but bad at making real-time critical decisions for mitigating the threats.<\/p>\n<p>\nLink: <a href=\"http:\/\/money.cnn.com\/2013\/07\/18\/technology\/security\/bank-cyberattack\/index.html\">http:\/\/money.cnn.com\/2013\/07\/18\/technology\/security\/bank-cyberattack\/index.html<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,29],"tags":[],"class_list":["post-1268","post","type-post","status-publish","format-standard","hentry","category-financial","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1268"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1268\/revisions"}],"predecessor-version":[{"id":3755,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1268\/revisions\/3755"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}