Solutions to today's information security challenges may reside in the virtual world. Modeling, simulation and evolutionary computational techniques offer organizations a way to observe how real hackers operate and attack systems. Because tireless computers are doing all the work, data can be gathered around the clock ready for analysts to examine and evaluate.
With computer network defense calling for an integrated approach, one government organization is helping public and private enterprises improve their infrastructures by putting them to the test. Armed with research and insight about threats and vulnerabilities, its experts take aim at systems and attack the problem of information security. While playing the bad guy, their mission is to point out weaknesses with the objective of making organizations stronger.
After years of searching for interoperability solutions for the multinational environment, this year the U.S. military will focus on how to ensure connectivity at home for coalitions comprising federal, state and local agencies. Using a familiar venue, the U.S. Defense Department will not only examine technical issues but also verify concepts of operations, concepts of employment and tactics, techniques and procedures. Event participants will be geographically dispersed and operationally diverse as they explore how network-centricity can support homeland security and defense.