Defense

ITA official tracks data for cyber insights

Shutterstock image (by Everett Historical): aerial of the Pentagon.

(Everett Historical / Shutterstock)

The proliferation of data at the Defense Department via mobile devices and other means has made perimeter-focused defense an outdated notion, according to Thomas Sasala, chief technology officer at the Army’s Information Technology Agency.

The data boom means there is no “hard outer shell,” or enterprise firewall through which to make DOD networks impregnable, Sasala said July 29 at an FCW-sponsored event in Washington, D.C. “Our attack surface is bigger than we want it to be and in some cases, it’s completely unknown how big it is in reality.”

Sasala’s comments echo those of other federal IT officials urging a paradigm shift toward assuming hackers will always find a way into networks and focusing on ways to limit the damage done. His organization is part of a seismic shift underway at the Pentagon to a single IT services provider that is expected to yield gains in efficiency and scale.

Reliance on a signature-based security system makes zero-day vulnerabilities – those unknown to IT professionals – a challenge for the Pentagon. “The system is not smart enough to know and look for abnormal behavior,” Sasala said With the specter of zero-days never far from their thoughts, Pentagon officials have urged software vendors to get them patches more quickly.

The ITA CTO also made clear the extent to which DOD networks are flooded with cyber incidents – about 190 million different incidents in one recent month, he said. Of those, a tiny fraction (in the hundreds) are investigated, making analytics all the more important to hone in on serious threats, Sasala added.

Such robust analysis of cyber incidents requires large storage capacity, a point that Nick Psaki, a former Army IT official, picked up on later in the conference. While servers and switches have “progressed dramatically” over the last 10 years, storage technology has lagged as the “broken leg of the stool,” said Psaki, who is now a system engineer at Pure Storage, a Mountain View, Calif.-based firm.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • IT Modernization
    Eisenhower Executive Office Building (Image: Wikimedia Commons)

    OMB's user guide to the MGT Act

    The Office of Management and Budget is working on a rules-of-the-road document to cover how agencies can seek and use funds under the MGT Act.

  • global network (Pushish Images/Shutterstock.com)

    As others see us -- a few surprises

    A recent dinner with civil servants from Asia delivered some interesting insights, Steve Kelman writes.

  • FCW Perspectives
    cloud (Singkham/Shutterstock.com)

    A smarter approach to cloud

    Advances in cloud technology are shifting the focus toward choosing the right tool for the job and crafting solutions that truly modernize systems.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.