ASMC The Business of Defense

  • The Defense Department's testing its own version of cybersecurity standards for cloud systems. The Defense Information Systems Agency is working with all the military branches to find a cybersecurity program that protects the cloud with Level-3 security requirements. DISA's enterprise cloud broker is conducting the software tests. DoD's chief of the risk management oversight division in the chief information officer's office,Kevin Delaney, isn't sure when the tests will be over. He says the development needs to run incrementally so each level of security controls are working right. The tests are coinciding with the deadline for agency cloud systems to earn security certification through the Federal Risk and Authorization Management Program. Right now FedRAMP offers cloud certification for low to moderate security levels.

    June 19, 2014
  • DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.

    June 19, 2014
  • Whenever re-evaluating your federal marketing ask yourself if the information is optimally positioned to first be heard, then understood and finally acted upon.

    June 18, 2014
  • The alleged Benghazi ring leader Ahmed Kattala was captured on June 15th, but it wasn't announced until June 17th. Pentagon spokesman Rear Admiral John Kirby explains the time lapse as, "This was very much an interagency effort. There is a legal component to this and we had to respect the integrity of that process." There is also the question of why it took almost two years to find him when journalists could get him. Experts say he simply made himself available to the journalists, while hiding very well from others.

    June 18, 2014
  • With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.

    June 18, 2014
  • Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.

    June 18, 2014
  • As technology rapidly changes, government contracts become outdated and might not match the purpose they were originally designed to serve.

    June 17, 2014
  • The Army has initiated its investigation into the facts and circumstances surrounding the disappearance and capture of Sgt. Bowe R. Bergdahl from Combat Outpost Mest-Lalak in Paktika Province, Afghanistan on or about June 30, 2009. The Army has appointed as the investigating officer Maj. Gen. Kenneth R. Dahl, an Army officer with Afghanistan combat experience. The Army says the primary function of its investigation, as in any other investigation, is to ascertain the facts. With that being said, the Army's top priority remains Sgt. Bergdahl's health and reintegration.

    June 17, 2014
  • Cybersecurity projects and programs are getting some hefty backing from the Senate.

    June 16, 2014
  • The Pentagon is preparing a range of options for President Obama, which include air strikes. They are designed to help Iraq deal with the Islamic State in Iraq and the Levant, or ISIL. ISIL, which is outnumbered 100-1 by Iraqi forces, have marched unimpeded to Baghdad's doorstep. Obama described them as "vicious" and a "terrorist organization" that could eventually pose a threat to Americans.

    June 13, 2014
  • Sgt. Bowe Bergdahl left Landstuhl Hospital in Ramstein, Germany late Thursday and he's being processed into Brooke Army Medical Center (BAMC) in San Antonio, Texas. Brooke is the flagship of Army medicine and is a level one trauma center. It is comprised of ten separate organizations that provide both inpatient care outpatient care. The hospital is a 450-bed facility which is expandable to 653 beds in the event of a disaster. Bergdahl was held by the Taliban for 5 years.

    June 13, 2014
  • Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.

    June 13, 2014
  • This week "Inside Government" celebrates National LGBT Pride Month by re-airing interviews with Frank Fragomene, an EEO specialist and attorney from the AFGE Women's and Fair Practices Department; Sasha Buchert, a staff attorney at the Transgender Law Center; and, Darren Phelps, the AFL-CIO executive director of Pride at Work. Caniesha Washington, an EEO Specialist from the AFGE Women's and Fair Practices Department, previews the upcoming Diversity Week trainings in Minneapolis.

    June 12, 2014