Cloud

DISA director: Industry has a role in Pentagon cloud

hands and cloud

Cloud computing developed by government and industry is the Defense Information Systems Agency’s answer to the largest leak of classified information in U.S. history.

“Private [Chelsea] Manning and Mr. [Edward] Snowden have accentuated the need for us to pay attention to the insider-threat arena,” said DISA Director Lt. Gen. Ronnie Hawkins at a May 12 AFCEA event in Baltimore, Md. “We’re making sure that we do that with the volume, the velocity and the variety,” he added, referring to the harvesting of big data to detect threats.

The rationale behind such data consolidation is that the Snowden and Manning disclosures were enabled by a widely dispersed network of data used by defense and intelligence agencies. The leaks may have underlined the importance of the Joint Information Environment – a DOD-wide effort to standardize IT operations – but it is unclear if they accelerated the project’s timetable for completion. There is no clear-cut deadline for rolling out JIE to all geographies and military branches, according to a DISA official.

Hawkins is intent on using the cloud to heuristically analyze insider threats and better understand the movements and capabilities of government personnel, but that is a work in progress. “We believe we’ve got a pretty good defense in depth as we look at what the outsider threat is doing. But in order for us to manage the capabilities and the requirements tied to the insider threat -- that’s where we’re going,” he said.  

The Snowden leaks do not seem to have curbed the agency’s ambitious plans for JIE. DISA wants JIE to be accessible anywhere in the world, and for the data within to be secure at rest and in transit, no matter the mobile device used by an employee.

The DISA director also addressed what he described as misconceptions in the defense industry that his agency is hogging its cloud work. Industry is involved in more than 60 percent of DISA’s cloud and over 80 percent of the agency’s telecoms network, he said: “DISA cannot function without industry.”

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group