Cybersecurity Training and Exercise Guide
Cybersecurity Training and Exercise Guide
The contents of this Guide are intended to align state and federal emergency management
training and exercise requirements with cybersecurity training and education standards
established by the National Institute of Standards and Technology (NIST). In addition to NIST,
this Guide incorporates concepts and elements from the Homeland Security Exercise and
Evaluation Program (HSEEP), National Incident Management System (NIMS), Emergency
Management Accreditation Program (EMAP), and National Fire Protection Association (NFPA).
B. Scope
The Guide is intended for emergency managers in municipal, county, and local government
agencies. It may also be useful to individuals responsible for emergency preparedness and
business continuity functions in other public sector, private sector, healthcare, and academic
organizations.
There are a wide variety of potential cyber threats and a constantly evolving list of methods and
tactics used to conduct cyberattacks. The training and exercise activity outlined here is focused
on cyber incidents that may:
C. Situation
Most of these incidents have involved the theft of sensitive data or ransomware attacks.
These incidents had significant financial and public relations impacts, but did not pose
an immediate safety threat. However, cyberattacks are increasingly targeting critical
infrastructure sectors. A successful cyberattack on critical infrastructure could cause
real-world operational damage and trigger cascading impacts that threaten public
safety.
Nationally, in the vast majority of cybersecurity incidents, it was a lack of awareness and
coordination that allowed the attacks to occur and delayed the response to the
incidents. The problem was a failure to train and educate all people who are access
points to information and operations systems, not a failure of technology or lack of
resources.
This Guide is being used to address training gaps identified in a formal cybersecurity risk
assessment and/or incident response planning process.
In developing this document, it was assumed the government entity or organization intending to
use the Guide had the following measures and practices in place:
• The Guide is being used to address training gaps identified in a formal cybersecurity
risk assessment and/or incident response planning process.
• An individual, group, department, agency or third-party vendor is assigned and is
responsible for managing information technology resources and information
security for the government agency or organization.
• There are established organizational rules and policies in place for the safe and
secure use of computers, tablets, mobile devices, personal devices, and any other
internet-capable electronic devices issued to or used by an employee.
• Employees are made aware of device usage rules and IT incident reporting
procedures.
• The user of this Guide is familiar with the concepts and practices outlined in the
Homeland Security Exercise and Evaluation Program (HSEEP).
• Emergency managers have a basic awareness of cybersecurity threats and intend to
include information technology professionals in cyber incident response planning,
training and exercise activity.
II. Training
Training is essential for protecting information and operation network systems and effectively
responding to a cybersecurity incident. Training recommendations and suggested online,
classroom, and resident training courses for emergency managers, IT professionals, and
cybersecurity stakeholders are included in this section.
These courses can provide a basic understanding and awareness for both cybersecurity and
emergency management concepts. The goals are for emergency managers and IT professionals
to “speak each other’s language” and promote joint planning, training, and exercise activity.
People in an organization are both the greatest vulnerability and best line of defense in regard
to cybersecurity. Training can be delivered as part of formal or ad hoc new employee training,
ongoing in-service training, or as-needed at the direction of IT managers, supervisors, or
executives.
1. Basic Device and System Usage: Training that provides all users of an organization’s
information technology resources, including staff, managers, executives, and contract
employees, awareness of policies and rules regarding the acceptable use of information
devices and systems. This could include:
• Physical security and protective measures for computers and mobile devices
• Use of strong passwords for computers, mobile devices, email, and network
access
• Secure use of external data storage devices such as flash drives and external
hard drives
• Requirements for remote network access and use of virtual private networks
• Primary and alternate points of contact and methods for reporting a suspected
or confirmed cybersecurity incident.
• Immediate actions the user must take to help contain a suspected or confirmed
cybersecurity threat.
Training providers include the FEMA Emergency Management Institute (EMI), Texas A&M
Engineering Extension Service (TEEX), Norwich University (NUARI), University of Texas San
Antonio (UTSA), and the Criminal Justice Institute (CJI).
Detailed course information is available in the FEMA National Preparedness Course Catalog.
Basic
AWR-136: Essentials of Community Cyber Security (TEEX, Classroom)
AWR-175-W: Information Security for Everyone (TEEX, Online)
AWR-176-W: Disaster Recovery for Information Systems (TEEX, Online)
Advanced
AWR-353-W: Using the Community Cyber Security Maturity Model (UTSA, Online)
MGT-384: Community Preparedness for Cyber Incidents (TEEX, Classroom)
MGT-385: Community Cyber Security Exercise Planning (TEEX, Classroom)
MGT-452: Physical & Cybersecurity for Critical Infrastructure (TEEX, Classroom)
MGT-456: Integration of Cybersecurity Personnel into the EOC for Cyber Incidents
(NUARI/TEEX, Classroom)
C. Emergency Management Training for IT Professionals
Basic
IS0908: Emergency Management for Senior Officials (EMI, Online)
IS0100.c: ICS 100 Introduction to the Incident Command System (EMI, Online)
IS0200.c: ICS 200 Basic Incident Command for Initial Response (EMI, Online)
IS0700.b: National Incident Management System (EMI, Online)
IS0235.c: Emergency Planning (EMI, Online)
Intermediate
IS0546.a: Continuity of Operations Awareness (EMI, Online)
IS0120.c: An Introduction to Exercise (EMI, Online)
IS0775: Emergency Operations Center Management and Operations (EMI, Online)
AWR-366-W: Developing a Cyber Security Annex for Incident Response (NUARI, Online)
IS0523: Resilient Accord: Exercising Continuity Plans for Cyber Incidents (EMI, Online)
Advanced
MGT-456: Integration of Cybersecurity Personnel into the EOC for Cyber Incidents
(NUARI/TEEX, Classroom)
E0553: Resilient Accord: Cyber Security Planning Workshop (EMI, Classroom)
PER-257: Cyberterrorism First Responder (UTSA, Classroom)
III. Exercise
Cybersecurity incidents are complex. The response to these incidents is often equally complex,
involving groups which are not traditional disaster response or emergency support function
partners. Conducting exercises with IT professionals, private sector representatives, and
community stakeholders is critical to ensure an effective, coordinated response to a
cyberattack.
The nature of cybersecurity threats makes them unique. However, conducting exercises to test
and evaluate response capabilities can be accomplished using well-established practices familiar
to emergency managers. This section will provide best practices, planning considerations, and
suggestions drawn from HSEEP to plan and conduct cybersecurity exercises.
A. Exercise Planning
1. Exercise Participants: Those taking part in an exercise will vary depending on the
nature, scope, and scale of the exercise being planned. This will likely include both
traditional and non-traditional partners. Participants to consider could include:
m) Water/Wastewater/Stormwater utilities
2. Exercise Planning Team: The composition of the Exercise Planning Team should
reflect the agencies, groups, and organizations participating in the exercise.
Incorporating subject-matter experts involved in incident planning, response, and
recovery will help ensure the exercise scenarios are realistic, challenging, and
adequately test key response functions.
b) Concept and Objectives Meeting: Identify the type, scope, objectives, and
purpose.
e) Master Scenario Events List (MSEL) Meeting: A forum for creating and
reviewing the scenario injects and timeline.
a) Budget
f) Executive summary
Tabletop Exercise:
a) Budget
d) Situation manual
a) Budget
d) Exercise plan
C. Discussion-Based Exercises
• Games: Simulation of operations that often involves two or more teams designed to
depict an actual or hypothetical situation. Example: Groups of participants test their
abilities to recognize and report phishing emails.
County commissioners, county sheriff’s department, and staff members in the county
auditor’s office receive emails requesting confirmation of their usernames and
passwords for their official email accounts. The message says there has been suspicious
activity in their email account and their account will be disabled unless they provide the
requested information. In some cases, the username and passwords for other systems
and databases were requested. The email appears to come from a current county
employee with a legitimate email address. Some staff members report providing their
username and password information. No system disruptions or suspicious system
activity has been observed or reported.
Inject Discussion:
How do you warn and communicate with employees, contractors, and vendors?
Inject Discussion:
What local, county, and/or state agencies are involved in the response?
How is public information, social media, and news media messaging managed?
Your jurisdiction is notified by federal and state law enforcement that a large amount of
sensitive information from your jurisdiction’s databases is being sold on a criminal
website. The information included names, social security numbers, addresses, dates of
birth, mother’s maiden names, checking account, and credit card account information of
residents, employees, and contractors. An initial network investigation identified
malware that recorded log-in credentials and extracted data from several systems and
databases. It is unclear how long the data breach has been in place.
Who is the lead response agency? Who are the supporting agencies?
How do you identify and warn those affected by the data breach?
Does your jurisdiction have insurance that covers costs related to the breach?
County employees in multiple local government offices and agencies report being
unable to log in to their computers. Those that are able to log in to their computers are
unable to access email, public records, and essential databases. Telephones and fax
machines are also reported to be offline at several office locations. Fire, law
enforcement, and EMS departments have been affected. Public safety communications
has been impacted, but computer aided dispatching and 911 telephone systems are still
operating normally. A local school system and several municipalities are also reporting
similar problems. A message appears on computer screens declaring the computers and
systems are locked and will only be released if the hacker is paid $50,000 in bitcoin
currency.
Inject Discussion:
What are the potential cascading impacts to local government and community?
At 11:30 PM, outdoor warning sirens across the county begin to sound. There is no
severe weather or local emergency. Sirens were not activated by emergency
management or other public safety agency. Attempts to access the siren control system
and shut off sirens remotely are unsuccessful. Attempts by emergency management to
shut off nearby sirens manually are also unsuccessful. Sirens momentarily deactivate,
but immediately reactivate. Public safety dispatchers receive dozens of 911 calls from
residents in a matter of minutes. Emergency management also receives reports that text
messages falsely reporting a train derailment and hazardous chemical spill are being
received on cellphones across the county.
Inject Discussion:
What agencies have access to the jurisdiction’s outdoor warning and/or emergency
mass notification systems?
How would you quickly communicate accurate information to the public and media
outlets?
It is the height of a very severe flu season. Below zero temperatures and heavy snow are
straining local emergency medical services and fire department resources. The
emergency department in the community’s largest hospital is experiencing a high
volume of patients. The hospital is operating at near capacity. The hospital goes on full
diversion due to patient volume and reported information network issues. Hospital staff
are unable to access the electronic medical records system. The email system also
experienced intermittent outages before going completely offline. Facilities staff are
unable to access and control heating and ventilation systems. Temperature, air
pressure, and humidity in the hospital can no longer be controlled. The system issues
are initially blamed on the weather, until a ransomware message appears on multiple
computer screens. The message demands $100,000 in bitcoin to restore the hospital’s
computer systems.
Inject Discussion:
Does the hospital have business continuity and emergency operations plans in place?
What vendor-managed services would be required to maintain safe patient care activity
at the hospital?
Can other hospitals in the area manage the additional patient volume diverted from the
affected hospital?
A major flood has been impacting large areas of the state for several days and there is
widespread damage across the county. The county emergency operations center has
been activated to coordinate local response operations. There has been extensive local
and national media coverage of the flood and the community’s response. Mid-morning
on the 5th day of operations, the emergency management director and several other
county officials receive an email threatening to shut down the county’s information
networks unless a payment of $300,000 in bitcoin is made by the end of the day. Similar
threats are received via the county’s official social media sites. Shortly after the threats
are received, the county government’s email system and websites go offline for exactly
30 minutes, then come back online. Access to critical information databases is also lost,
then restored. The hackers claim responsibility for the outage and threaten to increase
the ransom amount and severity of attacks if the ransom payment is not received.
Inject Discussion:
Are IT disaster recovery and incident response plans in place? How are these plans
activated?
Are continuity of operations plans in place? How are these plans activated?
Who has the authority to approve or deny the ransom payment? What is that process?
How is public information, social media, and news media messaging managed?
A local fire department responds to a large fire at the community’s primary water
treatment plant. Plant personnel report the fire started in an area of the plant that
houses high lift water pumps. These pumps discharge treated drinking water into water
mains and storage tanks for distribution. They also stated that just before the fire
began, they were unable to access the computer system that controlled the pumps. The
pumps began to cycle on and off, running at very high RPMs, then quickly shutting
Inject Discussion:
How would the community be notified of the incident and warned of water
contamination?
How could weather conditions affect potential impacts and response operations? (i.e.
Winter vs. Summer)
It is late Monday afternoon, the day before Election Day. Weather is fair across the
Midwest with no severe weather or extreme temperatures. At 4:45 PM EST, multiple
At 6:15 PM, power outages occur across your entire county. Simultaneously, adjacent
counties experience widespread outages. All fire stations, police stations, and
healthcare facilities in the county are on generator power. The county public safety
answering point and emergency operations center are also operating on generator
power. 911 service is operational, but is quickly being overwhelmed by emergency calls
and inquiries from the public. County Emergency Management is notified the Indiana
State Emergency Operations Center is activated.
By 8:00 PM, multiple power companies and regional transmission organizations confirm
massive power outages in seven states across the Midwest. The cause of the blackout,
as well as when power will be restored, is unknown. Locally, nearly all traffic lights in the
county are out. Numerous vehicle accidents and major traffic backups are reported.
Grocery stores, gas stations, hardware, and home improvement stores are frantically
requesting law enforcement assistance to deal with security and crowd control
problems. Fire departments are responding to multiple fires at electric power
substations and pole-mounted transformers across the county. EMS response is delayed
due to the volume of calls and traffic congestion. Water and wastewater treatment
plants remain operational, but are on emergency generator power. There are sporadic
landline telephone and internet service outages, but cellular telephone systems are
operating normally.
At 10:00 PM, the U.S. Department of Homeland Security (USDHS) confirms the power
outages were caused by a massive cyberattack against power companies and regional
power management organizations. The identity of the attacker and the method of
attack are not announced.
24 hours after the attack began, USDHS officials confirm the attack is sophisticated,
coordinated, and consistent with the capabilities of a nation state. The President of the
United States issues a Major Disaster Declaration. Cyber incident response operations
have isolated and contained the impacts to the Midwest. Electrical power in the rest of
the U.S. is unaffected. Across the Midwest, major physical damage to power generation
plants, power transmission, and power distribution infrastructure has occurred. Due to
the extent of the damage and compromise of control systems, the local electric power
utility reports repair and power restoration in the county may not begin for two to three
weeks. Full restoration of power to all areas of the county may take up to three months.
What emergency response and continuity of operations plans are in place? How would
these plans be implemented?
What are the immediate public safety, security, and health concerns?
How would local elected officials be engaged? What emergency orders would need to
be issued?
How would the county EOC establish and maintain communications with local, county,
district, volunteer, state, and federal partners during a prolonged power outage?
How would resource needs be assessed and requests for assistance communicated?
How long can critical public safety, healthcare, water/wastewater utility, and
telecommunications facilities operate on emergency generator power without
refueling?
What are the anticipated fuel needs for vehicles and generators? What type of fuel is
required?
How would public information, warnings, and alerts be managed and communicated?
How would critical staffing needs be met? (i.e. public safety, healthcare, mass care)
How would potable water be provided to the community if water utility systems fail?
During a prolonged power outage lasting weeks or months, how would fuel distribution
and fuel use be prioritized? How could community fuel rationing be implemented and
maintained?
How would food be provided to the community if grocery stores could not remain
open?
What are the anticipated long-term mass care and sheltering needs?
How would access and functional needs populations, residents of long-term care
facilities, and those in home healthcare programs receive assistance?
What are the potential financial issues that would need to be addressed? (i.e. county
employee payroll, purchasing, cost tracking, damage costs, documentation, bank
closures)
What government and social services could be maintained? (i.e. courts, county offices,
WIC)
How would the election, scheduled for the day after the attack occurred, be affected?
Once damaged equipment was repaired and control systems brought back online, how
would local government agencies support the safe reenergizing of the local power grid
and restoration of power?
How would economic impacts to the community be mitigated? How would long-term
recovery activities be managed?
The evaluation phase for all exercises includes a formal exercise evaluation, an integrated
analysis, and an After Action Report/Improvement Plan (AAR/IP) that identifies strengths and
areas for improvement of an agency’s preparedness, based on exercise performance.
Recommendations developed during evaluation are used in improvement planning phase.
During improvement planning, the corrective actions identified in the evaluation phase are
assigned, with due dates, to responsible parties; tracked to implementation; and then validated
during subsequent exercises.
The importance of applying lessons learned, from both successes and failures, cannot be
overstated. True cybersecurity preparedness can only be accomplished through a constant cycle
of effective planning, training, exercise, and improvement
The Guide will be reviewed, revised, and maintained by the Indiana Department of
Homeland Security, in collaboration with the members of the Emergency Services and
Exercise Subcommittee, and at the direction of the Cybersecurity Program Director.