The biggest threat to cybersecurity is not enough info sharing

The biggest threat to cybersecurity is not enough info sharing

Even the Department of Defense is working hard to keep pace with the changing landscape of cybersecurity threats. The key, by most estimates, is Information sharing. But whether the DOD and other agencies are ready for the level of sharing required is another matter.

At the Defensive Cyber Operations Symposium held this past June, Justin Ball, technical director for the Department of Defense Information Network's Operations and Defensive Planning Division, spoke about some of the challenges faced by the agency in the face of new and increased security threats.

The Department of Defense Information Network (DoDIN) is a globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating and managing information on-demand to warfighters, policy makers and support personnel.

Ball acknowledged that considerable attention has been given recently to the standing up of cyber mission teams in the DOD, and the importance of cyber workforces throughout all levels of government. For these teams and workforces to succeed, however, he noted that threat information must be shared broadly and systematically.

A successful cybersecurity program must not only be defensive but offensive, Ball explained. It’s important to know against whom you should initiate proactive countermeasures, rather than just reacting to the latest advanced threat.

And advanced threats themselves are on the increase, with network compromises more insidious and harder to detect than ever before. One of the lessons driven home after the colossal security breach of the Office of Personnel Management in 2015 was how long it can actually take for a threat to be detected. The average lag time is a shocking 205 days, and even 250 days is not unheard of.

Because of the interconnectedness of communications, new mobile vulnerabilities and new malware variants are being continually introduced. It’s becoming nearly impossible for any agency to keep up all by itself.

Ball used DoDIN as an example. While DoDIN’s priority is operations, it is also tasked with “freedom of action” in Cyberspace while denying that same freedom to adversaries. System operators must conduct full spectrum Cyberspace operations (computer network defense, computer network attack and computer network exploitation.) Cyberspace operations are informed by Intel and threat indicators from traditional and advanced sensors, sharing vulnerability information from both DOD and non-DOD sources.

How can you achieve this goal of cyber freedom of action, Ball asked, without knowing the threats that are out there?

DOD is using a variety of systems to gather threat information, Ball said. These include Host Based Security Systems, web content filters, an enterprise email security gateway and the Joint Regional Security Stack for the military’s Joint Information Environment.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Analysis: Data Protection in India

1 May, 2017

The government of India recently informed the Supreme Court of India that it expects to put in place a comprehensive …

Read more

EU’s GDPR: What Will American Companies Have To Do To Comply?

9 Aug, 2017

Starting next spring, the European Union will begin operating under the General Data Protection Regulation (GDPR). Once it becomes enforceable …

Read more

When to Stay Inside Your Comfort Zone

11 Sep, 2016

Learning to stretch outside your comfort zone is critical for learning and growing, advancing in your job and career, and …

Read more

Recent Jobs

IT Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Data Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Applications Developer

Washington D.C., DC, USA

1 May, 2024

Read More

D365 Business Analyst

South Bend, IN, USA

22 Apr, 2024

Read More

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.