InvestorsHub Logo
Followers 5
Posts 3077
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Tuesday, 07/17/2018 5:33:03 PM

Tuesday, July 17, 2018 5:33:03 PM

Post# of 249945
If Your Weapons Aren’t Cyber-Hardened, Expect to Lose Pentagon Contracts

https://www.defenseone.com/business/2018/07/if-your-weapons-arent-cyber-hardened-expect-lose-pentagon-contracts/149783/

The Pentagon intends to start assessing its weapons’ resistance to hacks, instead of leaving that to manufacturers.

FARNBOROUGH, UK — The Pentagon could stop awarding contracts to companies whose weapons are deemed vulnerable to cyber attacks, according to senior U.S. Defense Department officials.

Today, companies are responsible for assessing whether their own products meet DoD cybersecurity standards.

Because of a couple recent events, we realized that that is not good enough,” Kevin Fahey, the assistant secretary of defense for acquisition, said Monday during a briefing at the Farnborough Air Show.

In February, Deputy Defense Secretary Patrick Shanahan issued a stern warning to companies: protect your networks or risk losing business. In June, Chinese hackers allegedly stole sensitive submarine warfare information from a contractor’s computer.


Officials from the Pentagon’s acquisition, intelligence, chief information officer and research-and-engineering offices are creating a way to test the cyber defenses of weapons when assessing bids from companies. The effort is called “Delivered Uncompromised.”

“If you think about our weapon systems today, the IT infrastructure is a part of our weapon system,” Fahey said.

MITRE Corp., a research-and-development firm, conducted a study, which is “the baseline of where we’re starting from,” Fahey said after the briefing.

The MITRE report noted supply chain vulnerabilities, according to a person familiar with its findings, and made a series of recommendations, including making cyber hardening a “fourth pillar” of acquisition, along with cost, schedule and past performance.

The Pentagon has taken a number of steps in recent months to tighten its cyber defenses. In February, the Defense Science Board made a series of recommendations to improve the way the Pentagon buys software. Two months later, Ellen Lord, the undersecretary for acquisition and sustainment, tapped Jeff Boleng — a former Air Force cybersecurity operations officer — as her special assistant for software acquisition. The Pentagon is also assessing the cyber vulnerabilities of its weapons and infrastructure. The efforts are all intertwined, according to a source with insight into the projects.

“We have to develop a way that we evaluate people’s capability in cyber security almost as a go, no-go versus it’s a comparison between cost, schedule and performance and cyber,” Fahey said after the roundtable. “Cost, schedule, performance always end up being one, two and three [in terms of priority] and then if you’re the fourth, you’re not that important.”

Officials are considering using a grading system for cyber standards that similar to the way it assesses the maturity of software. They are also considering creating “red teams” that would test contractors cyber defenses. Another consideration is offering contractors government-certified cyber tools.

“We know it’s really serious now that we need to make that as a priority and then figure out how do we help the small businesses, Fahey said. “One of the ideas is almost us maybe being able to deliver them the IT infrastructure as [government furnished equipment] that is cyber secure. That is a high priority across the department.”

Today companies have to declare that they comply with federal acquisition regulations, “but we really don’t check it,” Fahey said. If a company does not meet the standards, it’s not a condition that could prevent them from being awarded a contract. “You just have to come up with a plan on how you’re going to meet it,” he said.

Officials believe that requiring cyber hardening as part of a weapon competition will force companies to better protect their systems.

“If it becomes a competitive differentiator, then what ends up happening is you’ve got every incentive in the world to meet that standard and to use it because it’s something that you need to be successful,” Eric Chewning, deputy assistant secretary of defense for manufacturing and industrial base policy, said in an interview.

Said Fahey: “The only way you make it serious to industry is you make it part of the competition

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs


Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.