Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: New Command to Focus on Cybersecurity for DoD and IC
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > New Command to Focus on Cybersecurity for DoD and IC
Uncategorized

New Command to Focus on Cybersecurity for DoD and IC

BobGourley
BobGourley
3 Min Read
SHARE

The Wall Street Journal just ran an article titled:  “New Military Command to Focus on Cybersecurity.”   In it they indicate “current and former officials familiar with the plans” say a new military command will be established to coordinate the defense of Pentagon computer networks and improve US offensive capabilities in cyberwar.

WSJ also reports that Defense Secretary Gates plans to announce the creation of a new military cyber command after the rollout of the White House review.   

My opinion:  This WSJ article seems more balanced and accurate than the article I discussed in my post “NYT wants cyber security to be a divisive issue.”  

The WSJ article is in consonance with what is going on and what should be going on.  I believe NSA should be formally given the lead for defending DoD/IC systems, but defense remains a team sport, and DHS should be given the lead for defending the rest of .gov networks (while still leaning on NSA/DoD/DNI as required).  And all players need to work well with industry and allies in a coordinated, fast moving way.

More Read

Change Management: The What, Why, and How
The Senate, ObamaCare, the NYT, and R
Data Visualizations: This Isn’t 1996
Top 6 BI Social Network Organisations
Four important SOA metrics that need to be watched

What does this mean for enterprise technologists?  For the most part it is
…


The Wall Street Journal just ran an article titled:  “New Military Command to Focus on Cybersecurity.”
  In it they indicate “current and former officials familiar with the
plans” say a new military command will be established to coordinate the
defense of Pentagon computer networks and improve US offensive
capabilities in cyberwar.

WSJ also reports that Defense
Secretary Gates plans to announce the creation of a new military cyber
command after the rollout of the White House review.   

My opinion:  This WSJ article seems more balanced and accurate than the article I discussed in my post “NYT wants cyber security to be a divisive issue.”  

The
WSJ article is in consonance with what is going on and what should be
going on.  I believe NSA should be formally given the lead for
defending DoD/IC systems, but defense remains a team sport, and DHS
should be given the lead for defending the rest of .gov networks (while
still leaning on NSA/DoD/DNI as required).  And all players need to
work well with industry and allies in a coordinated, fast moving way.

What
does this mean for enterprise technologists?  For the most part it is
good news.  But for day to day security operations in most enterprises,
the relationships you have with other organizations will remain the
same as before– for now.   And the current body of best practices
remains in place.  You still need to understand and implement and
follow the Common Audit Guidelines, for example.  Doing that is going to help you and will help others too.   

 


Link to original post

TAGGED:ciocomputer securityctosecurity
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Edge Computing in IoT
Unique Capabilities of Edge Computing in IoT
Exclusive Internet of Things
Turning Geographic Data Into Competitive Advantage
The Rise of Location Intelligence: Turning Geographic Data Into Competitive Advantage
Big Data Exclusive
AI Recruitment Software Solution
The Best AI Recruitment Software Solution: Transforming Hiring with Smarter Tech
Artificial Intelligence Exclusive
real estate data
How Big Data Is Changes How We Buy and Sell Real Estate
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Image
Uncategorized

Where to Go to Learn About Network Security

6 Min Read
Analytics

How can CIOs Build Business Value with Business Analytics?

8 Min Read

8 Suggestions for Every Data Protection Strategy [VIDEO]

1 Min Read
facebook libra cryptocurrency
Big DataBlockchainExclusivePrivacy

Does Facebook “Libra” Illustrate The Dark Side Of Big Data?

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?