Advertisement

You will be redirected to the page you want to view in  seconds.

The cyber adversary is already on our networks

Jan. 9, 2014 - 05:30PM   |  
By CHARLIE CROOM   |   Comments
Charlie Croom is VP, Customer and Mission Alignment, Lockheed Martin Information Systems and Global Solutions, and a retired USAF Lt. Gen. and former DISA director.
Charlie Croom is VP, Customer and Mission Alignment, Lockheed Martin Information Systems and Global Solutions, and a retired USAF Lt. Gen. and former DISA director. (File)
  • Filed Under

The cybersecurity threat is evolving every day. These threats range from hackers and criminals attempting to steal critical data for fun or profit, to the nation-state actors who want to siphon intellectual property slowly from a system for competitive, political or power advantages. The threats are formidable, determined and aggressive. We are now beginning to see some trends where the end game is destruction.

We all must take the threat seriously and realize that the adversary is here now — on our networks.

According to the U.S. Computer Emergency Readiness Team (US CERT), nearly 50,000 cyber security incidents were reported in 2012 from federal agencies alone. That’s an exponential leap compared to the six years prior when they received only 5,500 incident reports. As our world continues to get “smaller” with our increased dependence on the Internet, it becomes more dangerous, making it difficult to protect our networks and the critical data stored on them.

So what does this mean to the government executive, chairman of the board or anyone who is concerned about their vulnerability to the cyber threat? It means your networks are at risk and you should be considering strategies of how to manage that risk and protect your most important data.

Over the next several months, I’ll be joined by some of my colleagues here at Lockheed Martin to address the cybersecurity threat, break it down into categories of threats, and share some helpful information to mitigate the risks posed by these threats. Our blogs will cover topics such as:

■The types of threats and how they are changing.

■Our cyber approach at Lockheed Martin.

■Responding to the “80% threat.”

■Responding to the “20% threat.”

■The insider threat.

■Cyber talent.

■Cybersecurity: It’s a team sport.

■The business case for cybersecurity.

■Cybersecurity metrics.

■Supply chain challenges.

■How to organize for cybersecurity.

■The value of a cyber range.

■What does the cyber future look like.

More In C4ISR & Networks

Start your day with a roundup of top defense news.

Subscribe!

Subscribe!

Login to This Week's Digital Edition

Subscribe for Print or Digital delivery today!

Exclusive Events Coverage

In-depth news and multimedia coverage of industry trade shows and conferences.

TRADE SHOWS:

CONFERENCES:

Defensenews TV

  • Sign-up to receive weekly email updates about Vago's guests and the topics they will discuss.