TechNet Augusta 2015: Sandra Jontz reports from TechNet Augusta held August 25-27. Visit and bookmark the SIGNAL event coverage page for real-time coverage and the Show Daily.
Attendees listen to keynote addresses during the third annual AFCEA International TechNet Augusta conference, which wraps up Thursday. Photo by Mike Carptenter Cyber Capabilities to Protect the DODIN Could Entice Interesting Work Force

Uncle Sam wants you—especially unicorns, leprechauns or something in between. As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.

Maj. Gen. Stephen Fogarty, USA, commanding general of U.S. Army Cyber Center of Excellence at Fort Gordon, Georgia, takes to the white board to illustrate dysfunctional stovepipes that keep military disciplines from sharing information and missions. Photo by Mike Carpenter Cyberwarriors Wrestle to Define 'Convergence'

Convergence was the buzzword du jour as leaders outlined major changes to sweep the U.S. Army in efforts to shore up cyber weaknesses following a year of high-profile breaches and hacks that stunned the Defense Department. It is part of a cultural change that will have several military disciplines working together and removing the divides that have kept the intelligence community from working closely with signal commands, electronic warfare, cyber and information operations.

Gary Martin (c), program executive officer for command, control and communications-tactical (PEO C3T), discusses convergence at AFCEA's TechNet Augusta 2015 conference. Army Leaders Must Move Fast to Keep Cybersecurity Momentum

The U.S. Army must move quicker toward a massive cultural change to streamline cybersecurity processes—from training to all-out operations—if leaders hope to maintain the momentum toward innovation. 

Marines conduct civil-military operations and collect, process, analyze and share information using software from a smartphone. DISA Offers Mobile Solution for Secret Network; NGA Now 'Has an App for That'

The Defense Department’s much-anticipated capability solution to access classified voice and email up to the secret level from mobile devices finally migrated from the pilot stage and now is operational; while at the NGA, they've got an app store up and running that serves as a clearing house for geospatial-related mobile applications. 

Mitigating OPM Breach's Damage to National Security: The Potential of Big Data

The cyber breach at OPM pilfered the personal information of millions of U.S. federal workers, putting them at risk and highlighting a number of security shortcomings within the federal government. But the true magnitude of the attack has yet to be realized, much less revealed.

The Army completed the bulk of migration to the DOD Enterprise Email in July 2013. Size limitations will be enforced for mailboxes beginning October 1. DISA to Enforce DOD Email Mailbox Size Limits

Get ready to clear out the email inbox—because size matters. Effective Oct. 1, DISA will enforce size limits of military mailboxes. Users who exceed the limits will receive warnings to reduce mailbox size; ironically by receiving an email.

1
2
3
4
5
6