by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : June 15, 2015
Cybersecurity 18 June 15, 2015 FCW.COM another question altogether. “We’re getting faster and faster with our operations,” Cardon said. “The challenge we still have is the disparate nature of the networks.” Barriers to private- sector collaboration Despite Cyber Command’s focus on offensive and defensive operations, cybersecurity analyst Richard Stien- non likes to think of the command as a “centralized IT security department” for the Pentagon, albeit one that is sti- fled by acquisition regulations. Cyber Command “can only buy things that the big contractors have figured out how to sell,” said Stien- non, who is founder and chief ana- lyst at IT-Harvest. “So they can’t go to Silicon Valley and talk to the start- up that’s got the solution for Win- dows XP. They can’t get the latest breach-detection solution because no startup in their right mind would takeayearandahalfouttogo through the [federal] qualification process.” Cardon acknowledged that barri- ers to entry are a sticking point in his outreach to the private sector. A lot of technology firms don’t want to deal with the government because they find the process cumbersome, he said. “We have to figure that out because we’re going to need them because the money that they’re investing in sci- ence and technology and research and development dwarfs the Department of Defense,” he added. The federal acquisition process is one impediment to the greater interac- tion between Cyber Command and pri- vate-sector IT experts sought by Car- don and his boss, U.S. Cyber Command and National Security Agency leader Adm. Michael Rogers. Another hurdle is the cultural differences between IT experts who have spent their careers in the private sector and Pentagon offi- cials who view cyberspace as a war- fighting domain. “Cyber, to us, is a form of a maneu- ver,” Cardon said. “So to me...the danger is the IT world views things through [what] I call the role of the help desk. Just make my computers, phones, everything work, [and] I’m happy, as opposed to thinking, ‘Hey, this space is contested and you have to protect it.’” Regardless of how Pentagon offi- cials view cyberspace, many of them are looking at it through nontechni- cal eyes, said Carl Herberger, a for- mer electronic warfare officer in the Air Force. “Computer warfare is being thrust upon most of the senior [military] lead- ership, and I don’t think most of them have a foundational knowledge of how packets get routed, how applications get crafted” and other technical activi- ties, said Herberger, who is now vice president of security solutions at data security firm Radware. Yet military leaders generally won’t be the ones defending DOD networks. That is the work of the cyber forces that Cardon and his counterparts in the other military services are developing. The Army cyber force will consist of 41 protection teams that will defend Army networks from intrusions, and Cardon said the service is making progress in recruiting. “We had a lot of failure rates in the beginning,” he said, adding that some of the early recruits for the cyber force lacked the technical aptitude for the job. But now candidates take an exam that gauges their technical skills and their likelihood of passing the train- ing process. Those cyber soldiers will enter a contested space that Cardon and other Pentagon leaders believe they have no choice but to enter. “Sometimes you hear the term, ‘We’re militarized in cyberspace.’ No, that’s not it at all,” he said. “In fact, the struggle is already ongoing between criminal groups, nation-states, etc. The question is, in the construct of military operations, how do we use cyber?” n “ COMPUTER WARFARE IS BEING THRUST UPON MOST OF THE SENIOR [MILITARY] LEADERSHIP, AND I DON’T THINK MOST OF THEM HAVE A FOUNDATIONAL KNOWLEDGE OF HOW PACKETS GET ROUTED, HOW APPLICATIONS GET CRAFTED. ” CARL HERBERGER, RADWARE 0615fcw_016-018.indd 18 5/27/15 2:33 PM
May 30, 2015
June 30, 2015