Navy Chief Information Officer Robert Carey has outlined several possible approaches to improving cyber-security within the sea branch of the US armed forces.
According to Carey, industry, academia, military, civilians and contractors must work as a team towards a «singular» purpose: to operate and defend the Department’s networks against attack, while enabling access to information for those who require it.
«Defenders [must be] trained as attackers. While I know this is done in small pockets, it has yet to become doctrine throughout the Department,» he explained in an official blog post.
US Navy outlines cyber-security strategy»We need to ensure that our network defenders possess the same skills and knowledge as our attackers. Our goal should be to break down the barriers between the defenders and the red teams. After all, we are all on the same team.»
However, Carey acknowledged that a multi-pronged approach was necessary – as «no one tool» was capable of «carrying» the day.
«[Indeed], different proprietary tools produce non-interoperable solutions, which produce exploitable gaps in our defenses.
«[As such], the Department’s tools must be smartly integrated into a defensive suite, using automation where appropriate so that we can, in fact, defend at Internet speeds.»
Aharon Etengoff
Navy Chief Information Officer Robert Carey has outlined several possible approaches to improving cyber-security within the sea branch of the US armed forces.
According to Carey, industry, academia, military, civilians and contractors must work as a team towards a «singular» purpose: to operate and defend the Department’s networks against attack, while enabling access to information for those who require it.
«Defenders [must be] trained as attackers. While I know this is done in small pockets, it has yet to become doctrine throughout the Department,» he explained in an official blog post.
«We need to ensure that our network defenders possess the same skills and knowledge as our attackers. Our goal should be to break down the barriers between the defenders and the red teams. After all, we are all on the same team.»
However, Carey acknowledged that a multi-pronged approach was necessary – as «no one tool» was capable of «carrying» the day.
«[Indeed], different proprietary tools produce non-interoperable solutions, which produce exploitable gaps in our defenses.
«[As such], the Department’s tools must be smartly integrated into a defensive suite, using automation where appropriate so that we can, in fact, defend at Internet speeds.» Continuar leyendo «US Navy outlines cyber-security strategy»
-34.552356
-58.443076
Me gusta esto:
Me gusta Cargando...
Debe estar conectado para enviar un comentario.