Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Lynn: DoD cybersecurity strategy evolving
Tuesday - 10/5/2010, 3:42pm EDT
From "Lynn: Cyberwarfare Extends Scope of Conflict" by Jim Garamone of the American Forces Press Service:
"Information technology, and the world's reliance on it, has redefined the front lines of national security, Deputy Defense Secretary William J. Lynn III said at the Council on Foreign Relations in New York City yesterday.
"The department was always aware of the threats posed by hackers, nation states or terror groups in the cyberworld, but DOD experienced a wake-up call in 2008 when an intrusion into military networks extended to the classified realm.
"The compromise, he said, occurred when someone in the Middle East used a thumb drive to transfer data from the unclassified network to the classified network. The department launched Operation Buckshot Yankee to repair the breach and spent a lot of time, energy and money to remedy the situation. The attack led to a new approach to cyber security in the Pentagon, Lynn said.
"Lynn expanded on a recent article he wrote for the council's Foreign Affairs magazine. He detailed the attributes of the threats in cyberspace. First, he said, cyber is an asymmetric threat. It costs very little to develop a cyberthreat, while defending against it costs quite a lot.
"A second attribute of the cyberthreat is the difficulty of finding out who launched the attack, Lynn said, noting a keystroke can fly around the world in seconds.
"This situation, Lynn said, breaks down conventional deterrence strategy that was employed during the Cold War.
"A third attribute, Lynn said, is that cyberwarfare is offense-dominant. The Internet, he said, was not developed with security in mind. Instead, he added, the Internet is open, transparent and encourages ease of technical innovation.
"Given the nature of the cyberthreat, Lynn said, DOD cannot adopt a bunker-type, defensive mentality -- hunkered down behind a seemingly impenetrable wall, but in reality exposed to dangers.
"The bottom line, he said, is that cyber is a new domain of warfare, like land, sea, air and space. The new domain needs policies, doctrine, planning, resources and strategy like the other domains, Lynn said, noting this is one reason why the department stood up U.S. Cyber Command in May.
"Cyberdefenses need to be active, Lynn said. While computer hygiene and perimeter defenses will catch and stop about 80 percent of cyberthreats, he said, the final 20 percent need active defenses. So, DOD needs tools that search and hunt down cyberthreats inside networks, he added.
"Lynn said the department also needs to participate in protections to critical infrastructure such as power grids, transport and financial networks. Though the Department of Homeland Security has the cyberdefense lead for the U.S. government, DOD can provide expertise when needed, he said.
"Cyberdefense also is a shared activity, Lynn said, with the more attack signatures identified, the better the protection. Shared warning among allies -- a basis of Cold War strategy -- is just as important today, he said, noting the United States is sharing information with the United Kingdom, Australia and Canada.
"The United States is now looking to NATO to expand that cyberdefense umbrella, the deputy secretary said, noting there will likely be a strong statement on cybersecurity during the November NATO summit in Lisbon, Portugal.
"The Defense Advanced Research Projects Agency and other DOD organizations, he said, are looking at this offense-defense balance and ways it may be made more equal."
To see the entire presentation by Deputy Secretary Lynn, click the video link.