|
David Ambrose: So as you know, the administration has identified that the cyber security threat is one of the most serious national security, public safety and economic challenges we face as a…
|
|
Dr. Ron Ross: Well thanks Jim, I think we’ve had a really good year at NIST. We, as you know over the past 10 years, worked developing all the standards and guidelines under the Federal…
|
|
David Ambrose: …and not from a technology standpoint, more from a process…
JIm Flyzik: Okay.
David Ambrose: [Continuing] We have implemented a risk-based approach to our information…
|
|
Dr. Ron Ross: Well, there is a brand new one that we just started about three or four months ago. It has to do with the other side of the security problem. We talked about continuous diagnostics and…
|
|
David Bennett: Take that is absolutely on target. The identity piece of this is going to be key as we move forward as we put enterprise email into place. We created identity synchronization service…
|
|
Ltg Ed Cardon: Being in the Army, you don’t win on the defense, right? And so – because the problem is you know you have to be right a hundred out of a hundred times. Your attack must be…
|
|
Radm Marshall Lytle: Sure Jim. There’s certainly lots to talk about in this domain. It’s very fast moving, things are changing, very complex. The DODs IT environment is extremely complex…
|
|
Ltg Ed Cardon: So Jim we’ll just highlight four areas.
JIm Flyzik: Okay.
Ltg Ed Cardon: So first, we've created a global standardized security posture. So then we can better see our…
|
|
Brendan Goode: Certainly the threat doesn’t go away.
JIm Flyzik: Yeah.
Brendan Goode: I think there’s too much of a reward for people that are successful. The low bar venture to get in to…
|
|
Brendan Goode: In particular I see it as an era of increased focus on information sharing. I think that's one of the most challenging and significant strategic challenges that we face, in…
|
|
Ltg. Ed Cardon: Well this sector of the army has been pretty clear on mission to defend all the army networks and build them, what Jason had said, you know, often people talk about it like an egg,…
|
|
Ltg Ed Cardon: Well I think there's two. The use of red teams is critical. Red teams to hammer your own network and find your vulnerabilities so you can patch those and then be able to operate…
|
|
Radm Marshall Lytle: [inaudible 00:00:01] is pretty set and since we started up as a command several years ago we were kind of in the same line. We have five major priorities. First is a training…
|
|
Radm Marshall Lytle: I’d like to build on something General Cardone mentioned about this, Cyber Mission Force. Cybercom has three main missionaries -- defend the nation, operate and defend the…
|
|
Brendan Goode: Sure. First of all, it’s always fun doing these panels because you continue to see common themes being shared.
JIm Flyzik: Really, yeah. I’m taking little notes here when I…
|
|
Brendan Goode: That's a tough question, because we've had several successes at the department over the past year. I'd like to pick one that's specific to me, which is the Einstein…
|