While physical weapon stores can remain relevant for multiple decades, cyber defense weapons have a much shorter shelf life. Combine that with the unrelenting cyber attacks against military infrastructure, and its obvious that focus on cyber-security is paramount to effective mission fulfillment for military commands.
To speak to these challenges, The Association of the United States Army Institute of Land Warfare hosts their Army Cyber Hot Topic forum each year. This year’s event, “Cyber: The Convergence of the Information and Operational Environment,” offered opportunity for senior leaders from industry as well as the military to collaborate on the future direction of Army’s cyber strategy. This collaboration is imperative as “(T)echnology…continues to converge functions and concepts at unprecedented rates.”
The issue also begs the question: Can Army, as well as other military commands, adapt to the changing weapons landscape to effectively deliver on mission critical operations?
To answer this question, the forum brought together industry experts with Army IT leaders. The event featured speakers such as General Keith Alexander- U.S. Army Retired, Founder and Chief Executive Officer, IronNet Cybersecurity- and Lieutenant General Edward C. Cardon- Commanding General, U.S. Army Cyber Command.
Among the industry voices in attendance was Chris Steel- Chief Solutions Architect at Software AG Government Solutions. Highlighting the need for evergreen cyber weapons’ solutions, Steel proposed a proactive cyber defense architecture that could efficiently detect attacks while also predicting later phases of a multi-phase attack. Additionally, Steel acknowledged the need for the ability to detect cyber-attacks in real time and the ushering in of a new generation of IT tools.
According to Steel, the following are some instrumental steps within the process:
• Monitor real-time security feeds.
• Combine and correlate data feeds and build predictive models.
• Analyze patterns to predict system, network, and social vulnerabilities.
• Automate response workflows that proactively prevent threats.
• Store relevant data in a system like Hadoop for historical analysis and real-time investigations.
Ultimately, the key to combating cyber-attacks is a proactive threat response architecture. It is only through using predictive analytics combined with automation that we can efficiently challenge cyber-attacks or better yet, stop them before they even happen.
To learn more about the importance of predictive analysis and how it can strengthen cyber-defense, click here.