by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : February 2013
road that make them slower, that make them less ef cient and make it more costly for them to execute on their objectives. This is a big change. We call it intelligence-driven defense. QCybersecurity experts increasingly talk about the importance of situational awareness. What does this mean in the context of cybersecurity? What goes into developing situational awareness? AIt's like any other situational awareness that we talk about -- from commanders on the battle eld to operators of the network to the quarterback sitting behind the center. Situational awareness means that you are aware of your surrounding environment, aware of the threats that you face in that environment. These requirements exist not only for a quarterback but for those who want to defend their information and their networks. So, situational awareness involves having some means of getting information in real time that can help you make decisions about how to protect yourself. In part, that means putting sensors on the network, so you can receive status updates on how well you are doing and how well your mission is operating. You want indications or warning sensors that identify barriers to success, be it intruders or network failures. The commercial world provides many great tools and capabilities that organizations can use to defend the desktop or an entry point to your network. But what we try to do is integrate these speci c tools, so that they are communicating with each other. This is part of situational awareness. QWhat is being done to spur the development of cybersecurity innovation? What are some of the areas of research that appear to be most promising? AWe are seeing greater and greater cooperation by companies. We recognized that early on, and so we formed the LM Cyber Security Alliance. We knew that we couldn't possibly expend all of the R&D money necessary to protect every facet of the enterprise, so we have partnered with 18 best-of- breed technology companies. We take their solutions and integrate them into a seamless fabric that can stretch across anyone's enterprise. It's this ability to work strategically with our partners -- understanding the R&D that is coming from them in the future and integrating that into seamless enterprise solutions -- that separates us from many businesses that have a good idea but can't scale that across a large enterprise. We constantly hear that Lockheed Martin is not innovative -- that it's the small business that is innovative. But innovation doesn't come from companies -- it comes from people. You've got to enable that innovation and use it. A lot of people have good ideas, but if they don't scale across large enterprises they are not very good to implement. At Lockheed Martin we try to take these great ideas coming from many of these companies and make sure they integrate and scale across a large enterprise. QMany experts continue to worry about the long- term development of the cybersecurity workforce in the federal space. What is being done to address these concerns? AWe all compete trying to recruit from the limited talent pool that is out there. You know, Lockheed Martin defends its own global network. It's massive in size, serving 120,000 employees. And because we work on our nation's weapons systems and protect our nation's secrets, we are a high end target for adversaries, not unlike those going after the Department of Defense. So we have a Security Intelligence Center, where we have cyber intel analysts who actually study our adversaries, who study our intrusions backward and forward along the cyber kill chain. But that means nding talented folks. And that means taking six to nine months to train those folks before we put them in an operational environment. But that's too long. It takes too long to give them on-the-job training. So we are trying to speed the process. We have a great need, because not only are we trying to protect Lockheed Martin but we are now selling these [analyst services] to the federal government and commercial organizations. So we have created our own training program, which we call EXCITETM. This program provides high-end, intel-driven defense training programs that reduce the amount of time it takes to get a cyber-intel analyst onto the oor. The bottom line is we are recruiting from within the company, nding people who have cyber skills and taking them to a new level.