Defense

DOD wants tools to support cyberstrategy

Shutterstock image (by fotogestoeber): virus infection spreading out in a network.

It's been a year since the Defense Department unveiled a cyber strategy to signal both friend and foe that the U.S. military was serious about the digital domain. Now DOD officials are calling on tech firms to provide a host of tools to complement the strategy, starting with a pitch session this summer.

In June or July, DOD's Rapid Reaction Technology Office, whose mandate is to "provide a hedge against technical uncertainty," will host a demonstration session for firms to show off their technical capabilities, according to a DOD notice.

Defense officials are looking for capabilities listed under categories such as situational awareness; insider threat detection; wireless, embedded and industrial control systems; malware detection; forensics and analysis; enterprise and cloud security services; and big data.

The capabilities sought by RRTO take trends in cybersecurity technologies and adapt them to Pentagon needs. Interest in "IP-enabled command and control paths" and "autonomous planning and reasoning" are two examples of that tailoring.

The pitch session matches up directly with the Pentagon's goal of building and maintaining adept forces and capabilities.

The RRTO notice expresses interest in the security of the industrial control systems that underpin U.S. infrastructure. Officials are seeking "network discovery and mapping for wireless and ICS networks," and ICS "centralized security management," the document states.

There are other signs that ICS security could be gaining more traction at the Pentagon. The commanders of U.S. Northern Command and U.S. Pacific Command in February sent a letter to Defense Secretary Ash Carter asking him to consider including ICS security in a monthly cyber scorecard that he reviews.

Carter has taken a personal interest in hearing from network security firms with potential solutions to DOD cybersecurity problems. Last month during a trip to Silicon Valley, Carter grilled an executive from endpoint security firm Bromium.

Firms that impress Pentagon officials at this summer's pitch session could be chosen for a pilot project or another form of experimentation, according to the notice. RRTO anticipates some 150 to 200 registrants for the event, according to Pentagon spokesman Maj. Adrian Rankine-Galloway. The department won't be naming the firms registered, he added.

Companies have until April 19 to apply for the pitch session.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.