Recordings from our live conference are available below. You can also explore C4ISRNET recap coverage and analysis by clicking here.
Recordings from our live conference are available below. You can also explore C4ISRNET recap coverage and analysis by clicking here.
The Department of Defense is experimenting with a series of technologies to improve its cybersecurity and to be more effective in cyber operations. For example, both the Army and the Air Force are experimenting with EITaaS. The underlying theory here is that commercial IT companies can increase effectiveness; enhance IT user efficiencies; and establish standardized, innovative IT services. As a result, staff traditionally assigned to general IT responsibilities can be freed up for more specific tasks. It can also improve cybersecurity with players in industry who are focused on specific threats and protecting particular assets. In addition, the DOD is working closely with the NSA to improve its information assurance program and the services have embarked on a zero-trust mantra for hardware. In this panel, we will discuss the tools, prototypes and strategies the Pentagon is using to keep information safe.
U.S. Cyber Command’s annual training exercise took place entirely on a new platform this year, a move that will allow most participants to compete remotely. DoD’s cyber warriors have not had a robust environment to train or practice in, creating readiness gaps. But that’s changing in. In this panel we will talk about the TRIDENT and PCTE programs as well as other potential avenues the Department of Defense can use to improve its training before going into cyber operations.
The coronavirus pandemic means unprecedented numbers of Defense Department employees are working from home. The move has been successful enough that several senior Pentagon leaders have said they expect this to be the new normal and that telework will become a greater part of the workweek. But telework also presents cyber challenges and nation state actors are already targeting government employees who may have lax cyber hygiene. On this panel, we will explore the challenges that come from working at home and how the Pentagon can better protect itself.
Each of the services are reorganizing their staff when it comes to information warfare. Army Cyber Command wants to become Army Information Warfare Command. But how do cyber operations and cybersecurity factor into these decisions and what kind of changes will it mean for the warfighter?
In February, nearly a dozen nations, including the United States, attributed a 2019 cyberattack on the country of Georgia to Russia’s military, a move that experts said was the most high-profile example yet of an effort to establish acceptable behavior in cyberspace. That event pointed to an unusually high level of cooperation that demonstrated several nation’s long-held desire to establish acceptable levels of behavior in cyberspace. Experts expect the trend to continue across the globe. On this panel, we will discuss why these norms are necessary, why the U.S. and other countries are following this path and what happens even if their “name and shame” technique fails to work.
The Cybersecurity Maturity Model Certification is a Pentagon program that would mitigate several cybersecurity issues that plague the DoD supply chain. Namely, the government would have a mechanism to verify contractors’ cybersecurity claims. The guidance recognizes that security differs from business to business while allowing the government insight into companies’ cyber posture before awarding contracts. What does the Pentagon expect from this program? What kind of obstacles are they running into? How can the DoD ensure this program is a success without bankrupting critical DoD suppliers? And how can the Pentagon ensure its supply chain is safe from backdoors? (Think: Huawei/5g)