Inside DOD

By Amber Corrin

Blog archive

DOD to announce cyber strategy: What to expect

The Defense Department is gearing up to release an unclassified version of its first overarching strategy for cyberspace operations.

The official announcement of the Defense Strategy for Operating in Cyberspace will come the afternoon of July 14 from outgoing Deputy Secretary William Lynn, who will speak at the campus of the National Defense University in Washington. Lynn is expected to outline the strategy and answer press questions.

However, published reports indicate the public likely won’t be getting a meaty description of DOD operations in cyberspace. In the past, Lynn and other DOD officials have warned of the dangers of cyberattacks, but little has been said publicly about how the department defends against such attacks or how it runs offense against adversaries.

In the past, Lynn has spoken about the nascent cyber strategy. On the circuit at various conferences, he has acknowledged the lack of cohesive governance as a critical issue.

“Until recently, the military’s cyber effort was run by a loose confederation of joint task forces spread too far and too wide, both geographically and institutionally, to be fully effective,” he said in May 2010 at a U.S. Strategic Command Cyber Symposium in Omaha, Neb.

According to Stars and Stripes, at the RSA conference in San Francisco in February, Lynn said the DOD strategy will hinge on active defense systems, planning and coordination with the Homeland Security Department and a strong public-private partnership – comments that echo what Lynn has said at other speaking engagements.

Still, expect the bulk of the juicy details of DOD’s cyber arsenal to be absent from the unclassified release.

“The unclassified version, you will find, follows much of what was in the administration’s [international cyber strategy released in May],” Pentagon spokesman Col. Dave Lapan told reporters at the Pentagon July 11, per Stars and Stripes. “This isn’t about acts of war – this is about an overall cyber strategy, and how we defend ourselves against cyber threats.”

Even if it is a watered-down version that is released to the public, it sets the stage for discussions set to take place in coming days in Washington. The July 15 AFCEA Cybersecurity Summit will have several DOD officials on tap, discussing network security, the U.S. Cyber Command and related issues.

At 1105 Media’s upcoming FOSE conference July 19-21, several different aspects of cybersecurity will be discussed by an array of high-level government officials and industry insiders. 1105 Media is the parent company of Federal Computer Week and Defense Systems, which publish the Inside DOD blog.

Posted by Amber Corrin on Jul 13, 2011 at 12:14 PM


The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Thu, Aug 25, 2011 Mike

Very useful article, but I think the problem between the defense systems and the hacker will never end.
Someone to spend time and money to create a super system, but one man can find a vulnerability in the short time... (

Mon, Jul 25, 2011 Jill Baltimore

This article is very interesting because cyber security and control is something we need to get a handle on if we don't want to be susceptible to cyber attacks, which would be truly detrimental to our society. I understand that this is an unclassified article but it seems to lack consistency in informational needs for a reader. I think the the meaty details on this topic are probably a solid strategy. This brief explanation leaves this reader wanting to know more about what to actually expect in the future of our cyber world. The 'wave of the future' has been riding around for years, the possibilities of the internet now seem endless. As the young generation has seemed to master the concepts behind this type communication tool, it is of dire importance that we have a way to protect and defend this freedom of speech and the many other variables that go along with it.

Thu, Jul 14, 2011

Our computers and networks will become slower than now!!

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above