
Sign up to save your podcasts
Or
Maintaing operations while under attack
Today we have the first part of a three-part series with a focus on Cyber Threats 2023 in the DoD. This initial interview looks at high level considerations: cloud, identity management, and maintaining a secure network while undergoing improvement.
An argument can be made that in the past 20 years the DoD has responded to attacks in a siloed manner. In other words, they may have gotten a solution that worked, but it may not have interoperated with other aspects of the DoD.
Today’s threats are so overwhelming that focusing on a silo will make you vulnerable. Enterprise organizations are always difficult to change; the DoD is no different. Attacks have become so rampant that the DoD has had to review where they are, how they go there, and produce a plan to remediate concerns.
Cloud-based systems begin with identity management and can achieve the goals of quick response, reaching endpoints securely, and adapting to a rapidly changing attack environment. Proof of concept is an idea called Secure Access Service Edge. It allows the military to score access to any point in the globe. The success of this program showed that the military can leverage the cloud to secure the edge.
This is not being done in a theoretical environment, there is an initiative that a zero-trust architecture must be implemented by 2027.
Twitter: @FedInsider
LinkedIn: https://www.linkedin.com/company/fedinsider/
Facebook: https://www.facebook.com/FedInsiderNews
5
55 ratings
Maintaing operations while under attack
Today we have the first part of a three-part series with a focus on Cyber Threats 2023 in the DoD. This initial interview looks at high level considerations: cloud, identity management, and maintaining a secure network while undergoing improvement.
An argument can be made that in the past 20 years the DoD has responded to attacks in a siloed manner. In other words, they may have gotten a solution that worked, but it may not have interoperated with other aspects of the DoD.
Today’s threats are so overwhelming that focusing on a silo will make you vulnerable. Enterprise organizations are always difficult to change; the DoD is no different. Attacks have become so rampant that the DoD has had to review where they are, how they go there, and produce a plan to remediate concerns.
Cloud-based systems begin with identity management and can achieve the goals of quick response, reaching endpoints securely, and adapting to a rapidly changing attack environment. Proof of concept is an idea called Secure Access Service Edge. It allows the military to score access to any point in the globe. The success of this program showed that the military can leverage the cloud to secure the edge.
This is not being done in a theoretical environment, there is an initiative that a zero-trust architecture must be implemented by 2027.
Twitter: @FedInsider
LinkedIn: https://www.linkedin.com/company/fedinsider/
Facebook: https://www.facebook.com/FedInsiderNews