Charlie Croom is VP, Customer and Mission Alignment, Lockheed Martin Information Systems and Global Solutions, and a retired USAF Lt. Gen. and former DISA director. (File)
The cybersecurity threat is evolving every day. These threats range from hackers and criminals attempting to steal critical data for fun or profit, to the nation-state actors who want to siphon intellectual property slowly from a system for competitive, political or power advantages. The threats are formidable, determined and aggressive. We are now beginning to see some trends where the end game is destruction.
We all must take the threat seriously and realize that the adversary is here now — on our networks.
According to the U.S. Computer Emergency Readiness Team (US CERT), nearly 50,000 cyber security incidents were reported in 2012 from federal agencies alone. That’s an exponential leap compared to the six years prior when they received only 5,500 incident reports. As our world continues to get “smaller” with our increased dependence on the Internet, it becomes more dangerous, making it difficult to protect our networks and the critical data stored on them.
So what does this mean to the government executive, chairman of the board or anyone who is concerned about their vulnerability to the cyber threat? It means your networks are at risk and you should be considering strategies of how to manage that risk and protect your most important data.
Over the next several months, I’ll be joined by some of my colleagues here at Lockheed Martin to address the cybersecurity threat, break it down into categories of threats, and share some helpful information to mitigate the risks posed by these threats. Our blogs will cover topics such as:
■The types of threats and how they are changing.
■Our cyber approach at Lockheed Martin.
■Responding to the “80% threat.”
■Responding to the “20% threat.”
■The insider threat.
■Cybersecurity: It’s a team sport.
■The business case for cybersecurity.
■Supply chain challenges.
■How to organize for cybersecurity.
■The value of a cyber range.
■What does the cyber future look like.