Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

Sharing Intelligence Helps Contractors Strengthen Cyber Defenses

Sharing Intelligence Helps Contractors Strengthen Cyber Defenses

By Donna Miles, American Forces Press Service.

Baltimore, Maryland -- (AFPS) -- August 16, 2011 – A new pilot program in which the Defense Department shares classified threat intelligence with defense contractors or their commercial Internet service providers is showing promise in increasing their cyber defenses and preventing enemy intrusions into sensitive government networks, Deputy Defense Secretary William J. Lynn III said today.

Deputy Defense Secretary William J. Lynn III addresses about 2,700 participants at the Defense Information Systems Agency's Customer and Industry Forum at the Baltimore Convention Center, Baltimore, Aug. 16, 2011. Lynn's discussed the threats of cyber warfare in the digital age. DOD photo by R.D. Ward.

Deputy Defense Secretary William J. Lynn III addresses about 2,700 participants at the Defense Information Systems Agency's Customer and Industry Forum at the Baltimore Convention Center, Baltimore, Aug. 16, 2011. Lynn's discussed the threats of cyber warfare in the digital age. DOD photo by R.D. Ward.

Lynn shared initial findings of the Defense Industrial Base Cyber Pilot with attendees here at the Defense Information Systems Agency’s Customer and Industry Forum.

About midway through the 90-day pilot, launched in partnership with the Homeland Security Department, Lynn said the pilot is bearing fruit among about 20 participating companies that operate DOD networks.

“Already, the pilot has shown us hundreds of signatures we wouldn’t previously have seen” and stopped hundreds of attempted intrusions, Lynn reported. He noted that loading these signatures onto existing systems dramatically increases cybersecurity.

“So in the coming months, we are looking at the possibility of deepening the defense industry involvement in this pilot [and] bringing more and more companies” into the program, he said.

Lynn called intelligence the “special sauce” that enables participating companies to improve their cyber defenses. DOD shares threat intelligence provided by U.S. Cyber Command and the National Security Agency, along with expertise so they can employ it for network defense.

The companies, in turn, use the intelligence and expertise to protect networks they operate for DOD.

“We rely on private-sector networks and services to operate nearly every facet of the department,” Lynn told today’s gathering. “And the fact is that the private firms we depend on are susceptible to the same cyber threats we seek to protect dot-mil networks from.”

Over the past decade, “we have lost terabytes of data” through intrusions and attacks on defense companies’ corporate networks, Lynn said. Some of the stolen data was relatively mundane, involving specifications for small parts of tanks, airplanes and submarines.

“But a great deal of it concerns our most sensitive systems,” Lynn said, including aircraft avionics, surveillance technologies, satellite communications systems and network security protocols.

“We realize that we must help our partners protect their networks,” he said.

Meanwhile, DOD is looking toward other government agencies to see if this same concept can be applied to protect other sectors, including power, transportation and energy sectors. DIB Cyber Pilot “is intended to demonstrate that we can utilize this public-private partnership to protect critical infrastructure networks, starting with the defense sector,” Lynn said.

Lynn called on DISA and DOD’s industry partners to help make the new concept work.

“This is not a type of problem like air defense where the military can take the mission largely on its own. Nor is it an area in which the private sector can do everything they need to do on their own,” he said. “It has to be a partnership between the types of capabilities and intelligence the government can bring, and the types of capabilities and technology the private sector can bring. And those two need to be combined to protect our vital infrastructure.”

This cooperation is critical to the success of the new DOD strategy for operating in cyberspace, which recognizes the importance of cyber defenses to prevent enemies from exploiting, disrupting or destroying critical networks.

“In the face of this threat, we have a window of opportunity to develop much more substantial defenses, not only on our military and government networks, but also the networks that support our critical infrastructure,” Lynn said.

“We must have the capability to defend against the full range of cyber threats,” he said. “That is indeed the goal of the department’s cyber strategy, and it is why we are pursuing the strategy with such urgency.”

Biographies:
William J. Lynn III

Related Sites:
Special
Transcript

See also :

The Pentagon's Cyberstrategy One Year Later : defending Against Next Cyberattack by William J. Lynn III, U.S. Deputy Secretary of Defense, in Foreign Affairs, September 28. 2011. More destructive cyberweapons are being created every day, and an increasingly sophisticated technology black market virtually guarantees that they will eventually land in the hands of the United States' enemies. Robust defenses are no longer a luxury, they are a necessity.

Defending a New Domain : The Pentagon's Cyberstrategy, by William J. Lynn III, U.S. Deputy Secretary of Defense, and Nicholas Thompson, in Foreign Affairs, September 28. 2011. Deputy Secretary of Defense William Lynn discusses the various new strategies used by the Pentagon to identify information technology threats, combat cyber warfare, and protect U.S. infrastructure.


Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin





Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).

Contact