5 August 2024

The cybersecurity plan for what to do when adversaries breach the networ

Barry Rosenberg

Moderator: Barry Rosenberg, Technology & Special Projects Editor, Breaking Defense. Speakers: Gurpreet Bhatia, DoD Principal Director for Cybersecurity, DoD CIO; Army Brig. Gen. Mark Miles, Director, Command, Control, Communications & Cyber (J-6), U.S. Indo-Pacific Command; Sean Manning, Assistant Program Area Manager, Cyber Operations & Intelligence, Johns Hopkins Applied Physics Laboratory.

Defending defense networks from cyberattack has often meant erecting firewalls — the digital version of what militaries have done time immemorial by building fortifications and defending borders and boundaries. Those walls, however, are invariably breached, in the same way that adversaries have and continue to infiltrate networks to steal data and disrupt command, control, and communications.

That means there need to be additional layers of cybersecurity to augment the firewalls, so that when they are compromised and the bad guys are inside the network the damage that they inflict can be minimized.

“We’re good at the boundary, but we’re not good once they get inside our infrastructure or networks,” noted Gurpreet Bhatia, DoD principal director for Cybersecurity and deputy chief information security officer, speaking during a recent Breaking Defense webinar. “That’s the goal, to prevent data loss so we don’t lose troves of our sensitive, critical information [and to] protect against threats to our critical infrastructure.

“As our ecosystem evolves over time and becomes more integrated, we [also] want to make sure our industrial base, our critical partners, are part of that ecosystem [to address] that threat landscape. How do we think about this global supply chain challenge that we have today? [There are] lots of threat vectors that we think through, and at the end of the day how do we take all those threats in concert and figure out what is the acceptable risk that we want to operate within.”

No comments: