3. Develop approaches to protect 5G infrastructure and technologies: In accordance with the National Strategy to Secure 5G, DoD must assess 5G vulnerabilities and develop security principles for equipment, architectures, and operations. To address strategic risks such as coercive leverage or state ...
1 The strategy is a security framework and mindset that set a path for achieving Zero Trust. The strategy outlines strategic goals for adopting culture, defending DoD Information Systems, accelerating technology implementation, and enabling Zero Trust. The DoD Zero Trust Strategy includes seven...
“Advanced microelectronics technology is essential for current and next-generation defense capabilities,” said Kristen Baldwin, deputy director of strategic technology protection and exploitation for the DoD, at a recent event. “Our spectrum of requirements range from boutique, legacy and almost obsolet...
Accelerating development cycles with security in mind Before Colonel Krolikoski was CIO at Space Systems Command, she talked about her time at the Kobayashi Maru (KM) Program Cyber Coding Factory. Star Trek fans may recognize the Kobayashi Maru reference that refers to an unwinnable training simula...
Currently, Richard is a cyber security lecturer at Charles Sturt University in Australia and a strategic advisory member of the International Data Sanitization Consortium. His book, There Will Be Cyberwar, was named a Washington Post bestseller in April 2016. Richard is regularly featured in news ...
The Defense Department's ongoing Strategic Choices and Management Review could take weeks longer to complete than originally anticipated, according to Pentagon officials. Defense Secretary Chuck Hagel set a May 31 deadline in a March 15 memo that chartered the review. In congressional testimony in Ap...
In a recently revised strategic planning document thatDISApublished for the next two years, developing the zero-trust reference guide and building out from there was one of the first milestones for the agency.DISA noted it is workingwith the National Security Agency, U.S. Cyber Command andDOD ...
Cybersecurity Maturity Model Certification Accreditation Body board Chairman Karlton Johnson says his organization is not slowing down its activities in support of the Defense Department's cyber certification program, and denied reports that the CMMC-AB is taking a "strategic pause"...
Telos Secure Networks, a leading IT and cybersecurity solutions and services provider, transforms project requirements into superior results for government and commercial customers. We offer unmatched technical expertise, global reach, and strategic partnerships—combined with a culture of innovation that’...
DHS’sElectromagnetic Pulse Shielding Mitigationsreport—which includes input from the Federal Emergency Management Agency, the Cybersecurity and Infrastructure Security Agency and feedback from industry and government representatives—builds on the best practices used to protect the...