Many U.S. companies are losing business because of cyber issues expressed by foreign firms. These concerns can range from fears of U.S. vulnerabilities to worries that intelligence agencies will have access to information held by U.S. contractors.
"Cyber is the ultimate team sport." The U.S. Cyber Command (CYBERCOM) faces a unique set of challenges as it tries to engage industry and academia in the cybersecurity effort, according to its commander.
The U.S. Cyber Command (CYBERCOM) views the Defense Information Systems Agency as a key partner in its effort to secure defense cyberspace. This includes the agency having an operational mission in which it plays a critical role in defending defense cyberspace, according to the commander of CYBERCOM.
Innovation may be the key to ensuring that the national critical infrastructure is protected from new cyberthreats, said Suzanne Spaulding, undersecretary for the National Protection and Programs Directorate at the DHS. The private sector must step in to help prevent future attacks.
The public/private partnership that influences many government efforts is a core effort as the Department of Homeland Security (DHS) strives to protect the homeland from cyber attacks. Above all, the private sector must take the lead in some endeavors. “We need improved cyber hygiene.”
The Department of Homeland Security is taking a holistic approach to cybersecurity that focuses on preventing or mitigating the effects of a cyber intrusion on the critical infrastructure, according to a department undersecretary speaking at the AFCEA International Cyber Symposium.
Too much time spent chasing the obvious takes away from the ability to find the less obvious risks when it comes to stopping cyberthreats. Attacks from foreign adversaries, insider threats and advanced persistent threats all look the same, so it is essential to understand what is normal and to take immediate action when an anomaly is detected.
The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.
The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.