The new office is slated for October, Pentagon CIO John Sherman said, while also giving updates on the Spectrum Strategy implementation plan and the cyber workforce strategy.
By Brad D. WilliamsIOM will enable Joint Force Headquarters-DoD Information Network to gain real-time visibility over all defense networks.
By Barry Rosenberg“Today’s EMS Superiority Strategy combined our electromagnetic warfare and spectrum equities for the first time ever,” said Vice Chairman John Hyten. “The Strategy’s I-Plan sets us on a path to dominate the future battle space. We are determined to get there and achieve spectrum superiority in all domains.”
By Brad D. WilliamsThe single biggest increase in proposed year-over-year cyber funding appears to be for cryptology, and the budget includes a new line item for zero-trust architectures.
By Brad D. WilliamsDISA, using automation, is reducing the time it takes to deploy mission applications in DoD cloud from a year, months, or weeks to hours.
By Brad D. WilliamsDefense Enclave Services will “establish the modern infrastructure foundation and united frame of thought needed to deliver cohesive combat support capabilities to the warfighter.”
By Kelsey AthertonDES “is an incredibly important endeavor,” said Danielle Metz, acting deputy CIO for information enterprise at the Defense Information Systems Agency. “It is one of the crown jewels.”
By Kelsey Atherton“Zero Trust [is] where we see a lot of departmental capabilities moving over the next 12 to 18 months,” said John Hale, chief of cloud services at DISA
By Kelsey AthertonDesigned to help secure the supply chain, CMMC requires the defense industrial base to protect Controlled Unclassified Information.
By Barry RosenbergThis updated strategic plan focuses on cyber defense, the cloud, and enterprise solutions
By Kelsey AthertonDue out this fall, the Zero Trust Reference Architecture is about upgrading cybersecurity in existing systems, without buying all-new tech. The Army is enthusiastic – mostly.
By Sydney J. Freedberg Jr.“We met with a vendor on the West Coast — I can’t say who — and saw how they had implemented it end-to-end in their own infrastructure. They looked at (cybersecurity) holistically from the user identity, to the identity of the endpoint, to the application. I was very impressed with what they had done,” says DISA’s Steve Wallace.
By Barry RosenbergDISA will offer industry multiple contract opportunities to provide third-party tools to defend against malware and Zero Day attacks.
By Barry Rosenberg