Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Pentagon Solutions: NDU iCollege team on getting beyond checklist approach to cyber
Wednesday - 1/4/2012, 5:40pm EST
Federal News Radio
A team from the National Defense University's iCollege, which was recently honored by the the Defense Department's office of the chief information officer for a special cybersecurity workshop, joined Pentagon Solutions.
The event hosted more than 200 people from the Pentagon, international defense organizations, industry and academia. The workshop focused on identifying cyber threats, such as the Stuxnet worm, and responding to them. It also highlighted risks to the power grid and other critical infrastructure.
The team consists of Prof. Gilliam Duvall, Dr. John Saunders and Dr. John Hurley.
"I think the issue is understanding what's going on in this area a little better, Saunders said. "It happens to very technical in nature. We have a lot of complex equipment and relationships. And our purpose really at NDU is to help people understand — especially in our military and government leaders — what the threats and vulnerabilities are in this area."
On 'protecting the data'
Hurley said, following NDU's moniker, the emphasis is on defense — "how do we protect information, which is the biggest asset of the federal government," he said.
He added that there has been a shift over the past couple of years from thinking of security as only protecting actual networks from physical intrusions to a more holistic view of protecting the data, itself.
"There has tended to be much more of a focus now on looking at how do you protect the information. The systems, of course, we assume to be typically tools that utilized to either exchange and transfer information. But the biggest asset is really the information."
On cyber compliance
"As you begin to share information in a more complex environment, you need to have more controls in terms of who can access what," Duvall said, noting that the size and scope of the federal government adds to its immense complexity.
"Policies and procedures are certainly something that we need to follow," he added, "and we get a little bit of help from technologies that sort of enforce those policies."
Beyond a 'checklist approach' to cyber
Saunders said the increased awareness of cybersecurity means more people have more of a role to play.
"I think we need to get down to people on all levels — and up to people on all levels," Saunders said. "It's not just the CISO's jobs, but it's the job of every individual to be cognizant of security ... And the CEO — is he or she aware of what's going on in this arena and are they doing their best to support it?"