by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : February 2013
often from operationally- focused customers who are interested in our cybersecurity solutions: How can I get cyber situational awareness out of this integrated solution that you are providing? They know that situational awareness means one thing on the battle eld, but it means something totally different in cyberspace. In cyberspace, situational awareness means understanding what's going on in your network. Perhaps a device is not performing up to speed because it's under duress --- what impact will that have on your overarching mission? Think about it in terms of a large military operations center. It is critical for operators to integrate cyber situational awareness with combat situational awareness. This way, if the network is attacked, commanders will be able to quickly assess how an enemy cyber intrusion will decrease mission effectiveness. QWhat is being done to spur the development of cybersecurity innovation? What are some of the areas of research that appear to be most promising? ACybersecurity innovation comes from numerous sources - universities, government, within companies - even from our high school interns. Both at the university level and in-house, we're researching cloud, mobile devices, encryption, and identity management -- all areas that are promising for innovation. Our Cybersecurity Research Consortium, which includes Carnegie Mellon, MIT, and Purdue, is entering its fourth year providing our researchers new ways to solve complex problems. The Northrop Grumman Cync Incubator at University of Maryland, Baltimore County (UMBC) has been a great way to cultivate small companies and speed innovative solutions to our customers. We also plan to extend the program globally to spur increasing diversity of expertise to combat a threat that has no borders. Our DoD and Intelligence Community customers are tying ef ciency to innovation, and rightfully so. For example, if defenses are architected appropriately, with agility being part of the original design, they can adapt to provide the protections needed for new technologies or services to be introduced. We're also innovating to strengthen the capabilities of our products. The Host-Based Security System we support for DISA is a great example of an evolving capability to handle the wide range and huge number of threats while accommodating emerging platforms. QMany experts continue to worry about the long- term development of the cybersecurity workforce in the federal space. What is being done to address these concerns? A There is much concern over our nation's cybersecurity workforce and whether or not there will be enough trained professionals in the right areas. This past summer, I was privileged to serve alongside a great collection of representatives from academia, government and industry on the Homeland Security Advisory Council Task Force on cyber skills. The group released its nal report last October with eleven recommendations for what to do to build a pipeline of individuals with the right skills to be successful in cyber. It's not just one school or one solution; there are numerous ways to build this talent pool - from attending two- year universities, to training returning veterans, to standing up a cyber reserve-type force. The rst step is to identify what is really important about cyber and build a competency model around it so you are clear about what you are training people to do. If you just want to have a lot of smart people in cyber, you are missing an opportunity to really de ne the problem up front. That was our number one task force recommendation. At Northrop Grumman, grooming tomorrow's cyber workforce is paramount! This year alone, we partnered with the University of Maryland to fund the Advanced Cybersecurity Experience for Students program, which will immerse undergraduate students in all aspects of the eld. We funded a grant to UMBC to start the CyberScholars program, which aims to increase the number of women and underrepresented minorities in the eld. We are Presenting Sponsor for CyberPatriot, the national high school cyber defense competition, and have developed a Cyber Academy to continue developing our own cyber workforce. Like the threat, our workforce is never static.