Although pockets of resistance still exist, leaders in the Defense Department and military services largely agree on the need for a Joint Information Environment, according to panelists at the AFCEA International Cyber Symposium in Baltimore. The JIE will one day consolidate all of the department’s myriad networks into one while providing enterprise services, such as email, Internet access, common software applications and cloud computing. It is expected to increase operational efficiency, enhance network security and provide cost savings through reduced infrastructure and manpower.
The Defense Information Systems Agency (DISA) will likely announce within the next couple of weeks who will operate the Defense Department’s mobile app store, said Lt. Gen. Ronnie Hawkins Jr., USAF, DISA director.
Lt. Gen. Ronnie Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA), spent some time during his luncheon keynote address talking about the Joint Information Environment (JIE), which the agency already has been working on for some time.
The U.S. Defense Department is building a single security architecture that ultimately will eliminate firewalls in the future, according to Lt. Gen. Ronnie Hawkins Jr., USAF, Defense Information Systems Agency (DISA) director.
The Defense Information Systems Agency (DISA) is undergoing a substantial organizational restructuring, which is mostly complete and will be “set in concrete” July 15th. The reorganization will ensure the agency can support the military services, the joint staff, and all warfighting customers as the military moves to the Joint Information Environment, said Lt. Gen. Ronnie Hawkins, USAF, DISA director.
The United States will continue to develop a bilateral relationship with China regarding cybersecurity issues. In fact, the two countries will meet again in Washington, D.C., on July 8th, according to Maj. Gen. John Davis, USA, senior military advisor to the undersecretary of defense—policy for cyber, Office of the Secretary of Defense. Gen. Davis, the luncheon keynote speaker on the first day of the July 24-27 AFCEA International Cyber Symposium in Baltimore, said the United States recognizes China as a rising power and a major voice in the cyber arena.
U.S. government officials are traveling the country warning companies about a new round of cyberattacks that have targeted 27 companies, compromised seven and may ultimately affect up to 600 asset owners, according to Neil Hershfield, deputy director, control systems security program (CSSP), Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), Homeland Security Department.
Hershfield made the comments while taking part in a critical infrastructure protection panel discussion as part of the July 25-27 AFCEA International Cyber Symposium, Baltimore.
The U.S. Army’s 4th Brigade Combat Team, 10th Mountain Division, is training with Warfighter Information Network–Tactical (WIN-T) Increment 2 capabilities for its upcoming deployment to Afghanistan. The nodes will provide the division’s on-the-move network, delivering situational awareness information and enabling mission command. In addition to connecting ground soldiers, the network allows company commanders in vehicles to receive orders in real time from higher headquarters.
Sage Management Enterprise LLC, Columbia, Md., is being awarded a $7,955,374 cost-plus-fixed-fee contract for advanced multi-integration sensor engineering reports.This contract provides advanced systems engineering, research, and analysis of sensors, networks, and ground stations spanning multiple disciplines to enable the future fielding of operational capabilities.
The malware that infiltrated computer systems across South Korea’s banking and television broadcast industries on March 20 shares similarities with the Shamoon program used last year to wipe clean the hard drives of 30,000 Saudi Aramco workstations, according to experts at General Dynamics Fidelis Cybersecurity Solutions. Investigators at the company’s newly-opened cyber forensics laboratory in Columbia, Maryland, say the malware is not a Shamoon variant, but that the two programs share some characteristics.
The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate. The flexible environment is based on the Federal Identity, Credential and Access Management guidance and facilitates the use of Common Access Cards and Personal Identity Verification cards for use across organizational boundaries. RISS is working with several state law enforcement agencies to provide them with federated identification for access to resources within their state that are hosted on the Regional Information Sharing Systems Law Enforcement Cloud (RISSNET).
The recently signed executive order on cybersecurity and the presidential directive on critical infrastructure protection are not separate documents. In fact, they are part of the same overall effort to protect the nation, said Rand Beers, undersecretary for the National Protection and Programs Directorate, U.S. Department of Homeland Security. Beers discussed the effort on Thursday at the AFCEA Homeland Security Conference in Washington, D.C.
The National Network of Fusion Centers, developed in the aftermath of the September 11, 2001, attacks, are a vital part of the nation’s homeland security efforts, according to experts on the Intelligence and Information Sharing Panel at AFCEA’s Homeland Security Conference in Washington, D.C.
The fusion centers serve as the primary focal point for the receipt, gathering and sharing of threat-related information among federal, state, local, tribal and territorial partners. Although largely funded through federal homeland security grants, the centers are owned and operated by local entities.
The First Responder Network Authority (FirstNet), which is responsible for deploying the Nationwide Public Safety Network, could learn lessons from the September 11, 2001, attack on the Pentagon, during which emergency responders experienced almost no interoperability problems, according to emergency management panelists at the AFCEA Homeland Security Conference in Washington, D.C.
The National Institute of Standards and Technology (NIST) released a request for information on Tuesday, February 26, for the cybersecurity framework demanded by the recent White House executive order.
Speaking on the cybersecurity panel at the AFCEA Homeland Security Conference in Washington, D.C., on Tuesday, Jeff Voas, a NIST computer scientist, said he received his first briefing on the executive order about a week ago and NIST already has begun putting together working groups. The request for information process should be concluded in about 45 days. “We’re only a week or two into this,” Voas said.
Gen. Michael Hayden, USAF (Ret.), former director of the CIA, indicated an astounding extent of Chinese cyber espionage and said he believes the Iranians are attacking U.S. banks with unsophisticated but pervasive cyber attacks.
The U.S. Navy now plans to award the Next Generation Enterprise Network (NGEN) contract(s) for transport and enterprise services in May rather than on February 12, as originally planned, service officials announced The delay is due to the complexities of the NGEN requirements and the need to complete a thorough review of the bids, Navy officials say.
The U.S. Navy’s technology plans are moving away from systems to focus on capabilities. Changes aim to ensure that the fleet has the functionality to be operationally ready at all times.
As the U.S. Navy modernizes information systems across the fleet, one organization is responsible for researching, developing and fielding the full range of technologies in the Asia-Pacific region, providing complete life cycle development and support for systems, from concept to fielded capability.
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.