WASHINGTON – An upcoming cyber conference could help the U.S. Army better understand how its cyber defense efforts are used to protect critical assets and nurture a national cybersecurity ecosystem. stronger.
The Jack Voltaic . Seriesdeveloped by the Army Cyber Institute at the United States Military Academy to address the state of cybersecurity in local ports, opens its next conference on February 24 at the Citadel military college in Charleston , South Carolina.
The exercise so far has focused on securing critical infrastructure in two cities – Charleston and Savannah, Georgia – allowing them to better understand incident management should a network outage occur.
The Army’s Cyber Command, as well as the Guard and Reserve, have cyber defense teams dedicated to hunting down Department of Defense cyber actors and destroying threats. This exercise can provide insight into how to better use and deploy those groups.
“Where are the right places to apply those capabilities, and then what mechanisms are there to do that,” Lt Gen. Stephen Fogarty, Army Cyber Command, told C4ISRNET, of the articles. the learning he hoped to draw from the event. Fogarty is delivering the conference opening keynote.
One mechanism he proposes is “Civil Services Defense Assistance,” the process by which the U.S. military can assist state and local entities.
From an Army perspective, it has to be deployed from the ports. If those areas, which are under the control of state and local governments, are not immune to cyberattacks, it will hamper the Army’s ability to deploy. Therefore, it is in the best interest of the Army and the rest of the industries to assist localities in improving their cyber defense capabilities, in order to better ensure national cybersecurity.
“We require strategic mobility. Again, we don’t want to fight on our shores; We want to keep it abroad. We have to be able to fight,” said Fogarty. “For us, it ensures that the civil authorities clearly understand what our request is, what our expectations are and what we can then do. [do] to support them and protect that strategic capacity for the nation. “
After Jack Voltaic 3.0 in September 2020, officials realized there was a need to keep the conversation going regarding critical infrastructure resiliency.
“It’s too important to do it once, write down some lessons, and then move on,” said Colonel Jeffrey Erickson, director of the Army Cyber Institute. “Instead, we want to continue to foster an ecosystem of information and knowledge exchange through a series of conferences with the Norwich University Institutes of Applied Research, the Georgia Network Center, The Citadel and the Critical Infrastructure Resilience Institute at the University of Illinois.”
Events like Jack Voltic also help the Army better tailor certain threats, Fogarty said, noting that partnerships with industry and academia help alert the service to different types of challenges. and vice versa for local government.
There is “a wide range of threats to which local authorities – they will be the main responders. Their ability to identify these [threats] — basically to rehearse their reactions, understand what their capabilities are, where their limitations are, where they invest — that’s really what they’re mostly getting out of this,” said Fogarty. speak. “For the Army, what I want to do is worry about getting the people, the materials we need to conduct our operations there.”
Officials believe that success means raising awareness across all sectors.
“This week’s success looks like increased awareness in the community, new (and larger) connections between the public and private sectors, and potential critical infrastructure resilience events. Future. Only through more innings and reps can we continue to increase resilience at every level,” said Erickson.
Mark Pomerleau is a reporter for C4ISRNET, specializing in information warfare and cyberspace.
https://www.defensenews.com/cyber/2022/02/23/us-army-cyber-conference-seeks-to-bolster-holistic-national-cybersecurity/ U.S. Army Cyber Conference seeks to enhance national cybersecurity comprehensively