Says Greg Garcia, a former DHS official who now runs the consulting firm Garcia Cyber Partners: “If someone asks, ‘When are you going to stop cybercrime?’ Well, when are you going to stop crime?”
Your money: The banks downplay the risk of hackers tapping into any individual customer’s account. For most, that will never happen, the banks say, and even if it did, the customer wouldn’t be responsible. Customers would have to go through certain steps to get their money back, like filing a claim, showing that they weren’t negligently tossing their account information around and giving the bank time to investigate. But federal regulations protect retail customers from being held accountable when money is removed from their accounts without permission.
A drill by any other name: As for the title of Thursday’s drill, the one that sounds more appropriate for an action movie than a bank security exercise, it came about during the creation of the original drill in 2011, which was organized by the Financial Services Sector Coordinating Council.
National security staff at the White House wanted exercises to have names, preferably with two words. According to the FSSCC, a federal government official who was involved in the planning suggested the title after noticing some media reports about the dawn of quantum computing.
Schimmeck points out that a similar exercise in Britain had a title at least as curious: It was called “Waking Shark.”