NSA, Navy See Collaboration, Training as Key to Improving Cybersecurity Posture
The Navy and NSA believe collaborative public-private partnership and training will significantly boost overall cybersecurity posture.
As ransomware incidents and state-sponsored cyber threats rise in sophistication and impact across the world, national security and defense agencies are trying to strengthen defenses accordingly.
While a number of strategies are in play to meet evolving threats, the National Security Agency and Department of Navy are tightening collaboration and training to help agencies significantly improve their overall cybersecurity postures.
NSA Cybersecurity Collaboration Center Subject Matter Expert Dr. Josiah Dykstra said at GovCIO Media & Researchโs Blueprints of Tomorrow event Thursday that collaboration allows public and private entities to create community, as well as share key data and important information to understand the threat landscape. NSA is trying to foster this community now with its bi-directional information-sharing with more than 200 partners.
โWe talk together physically and virtually about what we are seeing and how we can learn from each other โ that is the real value of those partnerships,โ Dykstra said. โBy our account weโve had more than 4000 analytic exchanges this year alone. This isnโt just talk. It is real exciting to see it in practice.โ
Dykstra said NSA has also started providing defense companies with several cybersecurity services, including the Protective Domain Name System.
โIn the pilot of this program weโve processed more than 3 billion queries and blocked more than 6 million malicious domains, including spear phishing and malware, so we know that it works and that itโs stopping bad things,โ Dykstra said.
NSA is also fostering collaboration across other agencies to strengthen cybersecurity efforts. Dykstra said that software bill of materials can help align software security with the Pentagonโs new software modernization strategy.
NSA has been collaborating with CISA and others in the cybersecurity community to try and figure out what are the right requirements and uses for SBOM.
โIt has emerged as one of the key building blocks for cybersecurity, it wonโt solve all of our problems, but it is an advancement to help the software supply chain and many people across cyber ecosystem recognize that,โ Dykstra said. โI look forward to its implementation and the broad adoption, but I think we will learn a lot of lessons as we refine this model but itโs leading us in a very good direction.โ
The Navy is also working on ways to address vulnerabilities that software dependencies can pose for DOD missions, the agencyโs Principal Cyber Advisor Chris Cleary added.
Cleary also noted that the Defense Department has focused on collaboration across its own the workforce โ especially around holding everyone to similar standards for cyber awareness and training.
โWeโre aggressively pursuing this and keeping the workforce aware of vulnerabilities that they present with using equipment,โ Cleary said. โEveryone could be the savior, or everyone could be the problem. Spear phishing can really get you. Itโs just continuing to build that awareness โ you can be anywhere in the ecosystem and be a part of the attack surface.โ
From a culture perspective, Cleary added that the Navy is trying to enforce the idea of โfighting hurt.โ
โYouโre going to have systems that are compromised, whether itโs restoration processes or learning how to operate without certain pieces of technology,โ Cleary said. โWhen we get into the fight, we arenโt going to have the advantage of turning everything off. โฆ Some things are going to be degraded and there are certain levels of risk we must be willing to accept in the way that we execute mission. I think thatโs the kind of attitude to have moving forward. There will never be a perfectly patched system.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Pentagon's CMMC Deadline Arrives Amid Government Shutdown
The Pentagon will enforce new cybersecurity requirements across the defense supply chain amid a federal shutdown.
4m read -
IHS CISO Says Zero Trust Strengthens Patient Safety, Care Delivery
IHS is embedding zero trust into its EHR system to protect health data and ensure secure, uninterrupted patient care.
2m read -
FBI Scales Defensive AI to Strengthen Cybersecurity Operations
FBI officials say artificial intelligence will help automate threat detection and strengthen national security.
2m read -
Executing the RMF as an Engineering Discipline, Not a Paperwork Exercise
The Risk Management Framework aligns security with system design and operational telemetry to enable continuous, real-time authorization.
6m read