Clusters of corporate techies hunched over their laptops one recent evening in Mountain View, Calif., feverishly trying to figure out how RK Industries hacked into and stole critical information from its rival, EntraDyn.
It's a common occurrence, but in this case the firms were fictitious, and the event — a simulated exercise put on by security firm Symantec — featured rock music, a buffet and an open bar for the participants. Even so, it had a serious purpose: Increasingly under Internet attack, more and more businesses are using "cyber war games" to learn how to spot and counter the tricky tactics used by hackers.
"It keeps you on your toes," said Michael Scheck, an information security investigations manager at Cisco Systems, which hosts its own war games and takes part in others. In the fast-evolving combat with computer-savvy antagonists, he said, "you have to play cat and mouse."
Getting bested by the bad guys can be expensive. A study sponsored by Hewlett-Packard last year concluded the average cost of a cyberattack on a U.S. company was $591,780 — and rising. In response, companies are sending their employees to so-called cyber-ranges and other venues to engage in make-believe hacking scenarios.
In a survey of about 1,400 businesses last year, management consultant McKinsey & Co. said it found that 3 percent of them had conducted "cyber war games to help ensure they are ready to manage a cyberattack." McKinsey wouldn't identify the respondents, but noted that "most were in high tech and financial services."
Although several of those attending Symantec's event at the Computer History Museum didn't want their employers identified, companies represented there included Intel Corp. subsidiary Wind River Systems, Tesla Motors Inc. and Google Inc.
Many firms also routinely test their ability to withstand attacks, including utility Pacific Gas & Electric.
Using employees he calls "my ninjas" who periodically attempt to hack into the utility, James Sample, its chief information security officer, said "we do mock-up scenarios" to assess the company's vulnerability to cyberattacks.