By: Mark Pomerleau
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/L2HNRYXSSRBQDCLG2A7HQPLCH4.jpg)
One way DISA is seeking to reduce these attack vectors to the network is implementing a cloud-based internet isolation solution to protect from browser-born threats.
The Defense Information Systems Agency is looking for internet browsing to take place on a commercial cloud and away from Department of Defense servers.
“By taking the internet browser off the work station and placing it in a remote cloud-based server outside of the DoD [Information Network], we can review traffic from afar and protect the network while preventing malware and cyberattacks,” she said, noting DISA is interested in hearing about industry’s solutions in this space.
Reducing the attack vector and the architecture itself reduces the amount of cybersecurity attacks that DISA has to manually respond to and ultimately ensures resiliency to support mission accomplishment, Norton said.
“Cybersecurity needs to be at the forefront of our operations. Cyber is our battlespace and resiliency in that battlespace is key for our networks, applications and systems,” she said.
Each person is responsible for cyber hygiene and cyber defense today, according to Vice Adm. Nancy Norton, director of DISA and commander of Joint Force Headquarters-DoD Information Networks.
Norton also described efforts to automate and orchestrate key defensive processes that will help the team expedite actions that historically were performed manually.
This includes exploring the use of enterprise tools, machine learning, robotics and artificial intelligence to expand the effectiveness of analysis with existing staff, Norton said. These capabilities will use sensor data to help the agency readily identify long-term cybersecurity trends, uncover changes in adversary behavior and develop algorithms to identify suspicious activity.
“We must do this across cybersecurity in order to pace the threat inside cyberspace,” she said.
No comments:
Post a Comment