Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Bringing Cyber Capabilities Into The Battlespace

by GTI Editors
June 4, 2014
in Cybersecurity
Reading Time: 3 mins read
A A
Share on FacebookShare on Twitter

Learning to “hunt as a pack” in cyberspace is a challenge for the branches of the U.S. military and U.S. Cyber Command, but essential for effectiveness.

That is just one element of developing the cyber strategy for the Department of Defense, said Vice Adm. Jan Tighe, Commander, U.S. Fleet Cyber Command, U.S. Tenth Fleet, at the 13th Annual C4ISR & Networks Conference held in Pentagon City in May.

U.S. Cyber Command is a subordinate organization within U.S. Strategic Command. The partnership between the services and the DoD organization is “[e]volving into functional relationships,” said Tighe, who runs the Navy’s cyber operations. Part of it is developing “a commonality in how we talk to our service leaders.”

Similar partnerships also have to evolve between the military and industry, she said, noting that vendors have to be protected “since they have data.”

The Navy – and all services – requires “information dominance” to be able to act effectively. There are three pillars to that dominance, Tighe said:

–          Assured command and control of warfighting assets, from ships to aircraft to troops. Cybersecurity “is a critical area” to maintain and protect that;

–          Intelligence, also termed “battlespace awareness.” Here, Cyber Command uses many different types of sensors and devices to collect real-time information, and the ability to analyze Big Data is essential; and

–          “Integrated fires.” By this, Tighe said, kinetic weapons – physical, what people think of when they think of the military – have to be able to use the data that has been gathered, while using “non-kinetic” weapons, such as cyber tools, have to be integrated into an overall plan of attack.

Expanding the battlespace into the cyber realm presents unique challenges. There are differences between “disruptive” attacks on financial institutions and “destructive” attacks such as the cyberattack on Aramco, the Saudi national oil company, she said. Similarly, there are differences between hackers and hacktivists, criminals, insider threats, and nation-states.

“We are constantly assessing risks and maneuvering our networks,” Tighe said. When looking at cyber threats, the assessment has to consider “both the capability the adversary possesses, [but] also the intent of the adversary to do harm.”

It also is very hard to explain the dangers to military leaders unfamiliar with cyber technology. “One of the harder parts in that calculus is communicating [what is at] risk to others,” she said.

Tags: C4ISRCyber ThreatCyberattackcybersecurityDODU.S. Cyber Command

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5370 shares
    Share 2148 Tweet 1343
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Arizona Department of Economic Security Combats Unemployment Benefits Fraud

    61 shares
    Share 24 Tweet 15

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us