GNEC Briefing - PowerPoint PPT Presentation

About This Presentation
Title:

GNEC Briefing

Description:

Title: GNEC Briefing Author: Burns, Ron Last modified by: H. Martin Haley, Jr. Created Date: 12/7/1999 10:07:55 PM Document presentation format: On-screen Show – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 6
Provided by: Burn91
Category:
Tags: gnec | briefing | tradoc

less

Transcript and Presenter's Notes

Title: GNEC Briefing


1
BG Steven Smith Chief, ARSTAF Cyberspace Task
Force
2
Integrated Security
  • Enhance the Armys Cyber Security posture through
    extensive knowledge sharing, collaboration,
    compliance standardization and situational
    awareness
  • Integrate Information Assurance and Computer
    Network Defense efforts at an Enterprise level
  • Improve the ARSTAF Cyberspace Task Forces
    ability to provide oversight to all Army Cyber
    initiatives
  • Facilitate the capability to develop and track
    the Armys Cyber Warriors by close collaboration
    with TRADOC, FORSCOM, SIGCEN and HRC
  • Collaborate with AGNOSC to create an initial
    SIPRNET DKO-S Cyber Dashboard that gives Army
    senior leadership a visible snapshot status of
    Key Cyber and Information Assurance status by
    command
  • Facilitate standardized Cyber Security products
    and processes across HQDA

Cyber Security Enterprise Approach
Effective Enterprise Cyber Security Leverages
Enterprise Collaboration
  • People
  • Processes
  • Technology

Increased Response Effectiveness
Enterprise Directorate
Strengthened Security Posture
Visibility is Provided
Enterprise Dashboard
Enterprise Standardization
Centralized Vision Steering
Key Objective Establish and use an
Enterprise-wide risk management approach that
increases LandWarNet cyber security defense by
allowing decision makers to effectively balance
risk cost with mission benefits
15 May 2009
3
Situational Awarenessis goodreally
told you so ?
4
Challenges
  • Vulnerability of critical infrastructures
  • Banking, Finance, etc.
  • Impact on military operations
  • Adversaries are well trained and equipped
  • Users are our greatest vulnerabilitythey are
    attacked 24/7
  • Risks posed by foreign interests/ownership of
    tools we purchase
  • Need for cyber professionals
  • Deep technical skills that cross all cyber
    elements
  • Understand how to incorporate cyber operations
    into the deliberate planning process

15 May 2009
5
steven.smith13_at_us.army.mil
Write a Comment
User Comments (0)
About PowerShow.com