{"id":4607,"date":"2019-10-28T14:19:26","date_gmt":"2019-10-28T17:19:26","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=4607"},"modified":"2019-10-28T14:19:26","modified_gmt":"2019-10-28T17:19:26","slug":"el-comando-de-ciber-defensa-de-estados-unidos-busca-trabajar-estrechamente-con-el-sector-energetico","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=4607","title":{"rendered":"El Comando de Ciber Defensa de Estados Unidos busca trabajar estrechamente con el sector energ\u00e9tico"},"content":{"rendered":"<p align=\"justify\">El Comando de Ciber Defensa se compromete para evitar que los adversarios en el ciberespacio puedan ocasionar fallas catastr\u00f3ficas en las plantas y redes de energ\u00eda. Durante un panel del 15 de octubre pasado, en la conferencia anual de la Association of the United States Army (AUSA), se destac\u00f3 el rol del Comando de Ciber Defensa durante el ejercicio \u201cGrid X\u201d d\u00f3nde se analiz\u00f3 una eventual falla catastr\u00f3fica en el sistema energ\u00e9tico.<!--more--><\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\"><img loading=\"lazy\" class=\"shrinkToFit alignright\" src=\"https:\/\/www.armytimes.com\/resizer\/bDy5u1j-ExynyEJjSV171QFLxOM=\/1200x0\/filters:quality(100)\/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com\/public\/VBHPMIUQK5CKDISMDEY3JWCLYE.jpg\" alt=\"https:\/\/www.armytimes.com\/resizer\/bDy5u1j-ExynyEJjSV171QFLxOM=\/1200x0\/filters:quality(100)\/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com\/public\/VBHPMIUQK5CKDISMDEY3JWCLYE.jpg\" width=\"379\" height=\"315\" \/>U.S. Cyber Command is working with the energy sector and the Department of Energy as a way to bolster their relationship in case of a malicious, or catastrophic, cyberattack.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Cyber Command follows a philosophy of persistent engagement \u2014 the notion that it has to be in constant contact with adversaries in friendly, neutral and enemy cyberspace \u2014 and officials have stressed this includes enabling other partners. It also includes using its unique authorities to operate outside U.S. networks as a way to provide warning for domestic agencies about potential threats.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Now, the Department of Defense and Cyber Command are working on a <a href=\"https:\/\/www.fifthdomain.com\/dod\/2019\/07\/16\/what-good-are-exceptional-cyber-capabilities-without-authority\/\" target=\"_blank\" rel=\"noopener noreferrer\">pathfinder effort with DOE<\/a>. As part of the initiative, the Pentagon has tasked staffers with better understanding how the energy sector operates.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">The exercise, called Grid X, examined a catastrophic power failure, Maj. Gen. Stephen Hager, deputy commander of the Cyber National Mission Force, said during an Oct. 15 panel at the annual Association of U.S. Army conference.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">The CNMF\u2019s teams watch specific adversaries and work to target those actors before they reach U.S. cyberspace.<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Hager said Cyber Command\u2019s role in the exercise was to determine what kind of help the Defense Department can provide in one of those catastrophic events. This could include offering response teams or taking action against a cyber adversary.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">He also said they can conduct what\u2019s called <a href=\"https:\/\/www.fifthdomain.com\/dod\/cybercom\/2019\/06\/13\/who-does-what-for-dod-cyber-congress-wants-to-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">defensive cyber operations-response actions<\/a> \u2014 which are \u201cdefensive\u201d operations that take place off the DoD\u2019s networks and are the same actions taken by offensive cyber teams \u2014 to make the immediate cyber effect go away.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cA lot of it is just engagement to see how they\u2019re operating because we don\u2019t have the authorities to do anything domestically. We have to have either a [Defense Support to Civil Authorities] request or somebody has to specifically ask us for support,\u201d he said.<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Other officials have noted the importance of these pathfinders in helping DoD be better prepared to step in an help if need be.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cSome of these pathfinder activities have been really helpful for us to understand what is actually critical and how would we approach our operations for the different perspective to help them in their defense,&#8221; then Maj. Gen. Timothy Haugh, the previous commander of the Cyber National Mission Force, said in May. He has since earned his third star and leads <a href=\"https:\/\/www.c4isrnet.com\/dod\/air-force\/2019\/10\/14\/what-the-new-16th-air-force-means-for-information-warfare\/\" target=\"_blank\" rel=\"noopener noreferrer\">16th Air Force<\/a>.<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Hager explained the importance of this engagement and what it means for his forces.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cMy soldiers and airman and Marines are getting trained on somebody\u2019s infrastructure,&#8221; he said. &#8220;And that helps us in the long run be better military folks and then it also helps us build those relationships.\u201d<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Much of the energy sector\u2019s infrastructure is different from the internet-based infrastructure cyberwarriors are trained and operate on. The military has <a href=\"https:\/\/www.fifthdomain.com\/dod\/army\/2019\/04\/05\/what-happens-if-hackers-target-an-army-base\/\" target=\"_blank\" rel=\"noopener noreferrer\">made an effort recently to increase training <\/a>on these industrial control systems (ICS) and supervisory control and data acquisition, known as SCADA, systems for both offensive and defensive purposes given they can be both a vulnerability if targeted, but also <a href=\"https:\/\/www.fifthdomain.com\/dod\/2019\/07\/18\/is-industry-cyberinsecurity-dods-achilles-heel\/\" target=\"_blank\" rel=\"noopener noreferrer\">useful targets themselves<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"text-align: left;\" align=\"justify\"><strong>Fuente:<\/strong> <em><a href=\"https:\/\/www.fifthdomain.com\/show-reporter\/ausa\/2019\/10\/16\/cyber-command-wants-to-work-more-closely-with-the-energy-sector\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.fifthdomain.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Comando de Ciber Defensa se compromete para evitar que los adversarios en el ciberespacio puedan ocasionar fallas catastr\u00f3ficas en las plantas y redes de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4607"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4607"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4607\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}