DOD releases 5-point cyber defense plan

The Defense Department's new strategy for defending computer networks brings government and industry together as partmers, said Deputy Defense Secretary William Lynn in announcing the plan July 14.

Lynn stressed the critical threat the nation faces and the need for a multi-faceted, evolving approach – including key partnerships – to counter the threat.

“The cyber environment we face is dynamic. As such, our strategy must be dynamic as well,” Lynn said. “While today is an important milestone, it is only one part of the department’s first ever Strategy for Operating in Cyberspace.”

As in previous public comments on cyber operations, Lynn stressed the need for strategic partnerships. To support that idea, he revealed the establishment of a public-private pilot program to build up both public and private cyber defense capabilities – and help protect critical infrastructure – by sharing information.

He said the voluntary Defense-Industrial Base (DIB) Cyber Pilot comprises less than two dozen commercial defense companies with which DOD shares classified threat intelligence.

“This program provides these companies with more robust protection for their networks. By furnishing this threat intelligence, we are able to help strengthen these companies’ existing cyber defense,” Lynn said. “By leveraging infrastructure that already exists, the pilot suggests we can provide substantial additional protections across our critical infrastructure for only a fractional increase in costs.”

He said the pilot program has already prevented some intrusions and helped participants better understand various techniques employed by adversaries. An assessment of the program is expected to conclude by the end of the summer, and possible expansion will be considered in the fall, he said.

“The DIB Cyber Pilot breaks new ground in recognizing the interconnectedness of cyber and the important role of stakeholders in thwarting attacks,” Lynn said.

He also highlighted international partnerships, including with Australia, Canada, the United Kingdom and NATO.

The overarching DOD strategy hinges on five strategic pillars, including:

  • The establishment of cyberspace as an operational domain like air, sea, land or space, and organize, train and equip forces accordingly to perform cyber missions.
  • The introduction and employment of new operating concepts on networks, including active defenses using sensors, software and signatures. 
  • Partnership with the private sector and other government agencies, particularly the Homeland Security Department, which is responsible for civilian network protection, to protect critical infrastructure.
  • The build-up of collective cyber defenses in coordination with U.S. allies and international partners.
  • Capitalization of U.S. technological and human resources, including an exceptional cyber workforce and rapid technological innovation.

“Over the past year, we have made progress in each of these pillars,” Lynn said. “Although no network will ever be perfectly secure, our military networks today are better defended, and our cyber hygiene more effective, than before.”

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.