Government // Cybersecurity
News
4/22/2009
02:41 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Pentagon Creating Cyber Warfare Command

The Defense Department will unify information security for all the military branches under a command focused on waging cyberwarfare.

Though a new cybercommand might break down silos inside the Defense Department that may hinder a cogent sense of direction on cybersecurity, it would still be but one of several national security authorities on the issue.

The Department of Homeland Security has much of the authority over cybersecurity, but it's also broken down among the National Security Agency, the Defense Information Systems Agency, and the Pentagon itself. It's unclear what role the Defense Department's cybersecurity command would play, but The Wall Street Journal said it would support the Department of Homeland Security.

It's also unclear how the Pentagon's cybersecurity efforts would relate to and interact with normal computer network operations and maintenance at the Defense Department.

"The intelligence culture is different than the security culture, which is different than a network operations culture," cautioned Rod Beckstrom, former director of the National Cyber Security Center at the Department of Homeland Security. Beckstrom himself resigned last month in the midst of a cybersecurity turf war with the NSA.

However, even simply unifying cybersecurity efforts in the military would be a start. "DOD has a lot of rice bowls in cybersecurity that can confound unity of purpose," Greg Garcia, who served as assistant secretary of cybersecurity and communications at the Department of Homeland Security under President George W. Bush, said in an e-mail.


InformationWeek Analytics has published an independent analysis on government IT priorities. Download the report here (registration required).

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest September 18, 2014
Enterprise social network success starts and ends with integration. Here's how to finally make collaboration click.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
The weekly wrap-up of the top stories from InformationWeek.com this week.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.