The Pentagon Goes Shopping For A New Mobile Phone

2014_11_FedTalks-560.jpg

Defense Department CIO Terry Halvorsen

The U.S. Defense Department made news last spring when Ash Carter became the first defense secretary in almost 20 years to visit Silicon Valley. In a media call Tuesday, Pentagon Chief Information Officer Terry Halvorsen told a handful of reporters what the Pentagon plans to learn from the private sector, including technology that could automate cyber response, and also provided updates on a plan to outfit parts of the Pentagon with Wi-Fi. 

Here are a few takeaways from that conversation:
1. Sometime in the fall, DOD plans to test out smartphones that can access top-secret information.
Halvorsen confirmed DOD is deploying the top-secret smartphones in the fall, but declined to provide any more detail on the efforts because, he said, “I don’t want people to know when we’re actually going live with those.” He added that the Pentagon has already done some preliminary testing on the phones and is ”continuing to see great results on that.”
2. By the end of fiscal year 2016’s first quarter, DOD plans to deploy civilian employees into Silicon Valley for 6-month rotations, Halvorsen said. This program, modeled after another program that sends military employees for year-long rotations in the private sector, is part of a series of efforts to connect with Silicon Valley tech talent, including a new Pentagon outpost in California, as well as $75 million investment in a coalition of companies and universities working on flexible and wearable electronic devices.
3. DOD is trying to adapt private sector cyber technology.  
The Pentagon is paying attention to cyber solutions offered by startups, Halvorsen said. “Many times they may have really good ideas, but in their initial format they just don’t scale,” he said. “What I’m working with Silicon Valley on, and what we’re trying to [find out] is ‘where do we do the testing to see if they will scale? First of all, where do we test to see if they really will work?’” He added the Pentagon wants to be able to complete pilot programs and tech experiments faster. ”But we also need Silicon Valley to be able to understand that when you can field a tool for 5,000 to 10,000 people, and there’s a market for that, I am not the market for that,” Halvorsen said. “ What I need to look at has to be able to scale to millions of people.”
DOD also wants to automate cyber defense. For now, officials are looking at the basics, such as automatically patching updates. ”At a certain point, I want to be able to have some cyber defense completely automated where a certain set of conditions occur, and the system takes its own response,” Halvorsen added. 

The Pentagon is keeping pace with Fortune 50 companies in terms of cloud adoption, Halvorsen said.
Commercial companies are using private and commercial, just as DOD is, he said. “We’re all trying to find what is going to be that hybrid sweet spot, and how much [data] do you put out there,” he said. 
Within DOD, as in the private sector, there isn’t going to be “one cloud answer . . . there’s going to be some stuff that goes into a perfectly commercial cloud, that’ll work,” he said. “There are going to be things that go into a hybrid cloud where it might be a partnership with the federal government and DOD, maybe federal and state governments.”
An incident in which computers in Pentagon’s food court were hacked, potentially exposing employee information, isn’t really the DOD CIO’s problem.  
“If the food court was hacked, that would not be the DOD that was hacked,” Halvorsen said, adding that he did not have any more data about the incident. 

But he said that plans to install Wi-Fi, including a guest network, in the Pentagon are moving forward and the network is on track to be operational by the end of December. The department is prioritizing major meeting areas and some common spaces. “The key part for us is having all of the sensors in place to assure me that I am using Wi-Fi in all the right ways, and then when I want to say, ‘OK, now turn off the Wi-Fi because I’m doing something else,’ I can be assured that the Wi-Fi is off,” he said.
DefenseOne:  http://bit.ly/1L2VD1j

 

 

 

« FBI Urges Firms to Plan For Cyber Attack
India and US Cyber Agree Security Pact to Combat Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.