Defense

Navy establishes permanent cyber division

Navy personnel IT

The Navy is working to get a handle on its cyber threat exposure. Without a running tally of IT systems and the provenance of their parts, network operators don't know what's on or off; what's vulnerable or secure.

Navy officials are trying to build on the momentum of the yearlong Task Force Cyber Awakening to drive a lasting, more secure cyber posture at the service. And so the chief of naval operations last month established the Navy Cybersecurity Division, a 40-person office responsible for evaluating big cyber investments and ensuring policy requirements.

One of the chief tasks of the new division, according to Vice Adm. Ted Branch, deputy chief of naval operations for information dominance, will be to "make sure that they have the requirements right at the front end so we can bake in some of the cybersecurity, as opposed to having it bolted on like we have done up until now."

The task force was a deep dive into the cyber postures of the service's many components, from the Naval Sea Systems Command to the Space and Naval Warfare Systems Command. It set priorities for boosting resiliency and led the Navy to reallocate approximately $300 million in fiscal 2016 budget to help treat the service's cyber vulnerabilities.

The task force came at "a time of need," Branch said at an Oct. 1 press briefing. "We had a lot going on without a lot of focus and pursuit of our 2013 incursion."

Branch was referring to a breach, attributed to Iranian hackers, of the Navy Marine Corps Intranet, the service's massive internal computer network. A months-long operation known as Operation Rolling Tide, which drove the hackers off of the unclassified portion of NMCI, has become a blueprint for Navy cyber operations.

The task force initially focused on the transport layer of Navy networks, where the 2013 breach had occurred, Branch said. Drawing on modeling done by experts at Johns Hopkins University, the task force ranked and prioritized vulnerabilities on Navy networks and then suggested remedies. Officials later broadened the scope of assessment to include weapon and facility systems.

Troy Johnson heads the new cyber division. Johnson spent 22 years as a cryptologist and information operations planner in the Navy, and played an integral role in the cyber task force.

The systems commands that contribute the building blocks that make up Navy networks will need to mature, according to Branch. "The expertise that needs to be resident in systems commands for design and engineering frankly isn't there yet, certainly not in the capacity that we need it to be," he said.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

  • Comment
    Blue Signage and logo of the U.S. Department of Veterans Affairs

    Doing digital differently at VA

    The Department of Veterans Affairs CIO explains why digital transformation is not optional.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.