21 août 2020 | International, C4ISR, Sécurité

Here’s what US Cyber Command wants next for its training platform

WASHINGTON — As the U.S. Defense Department matures its cyber force and training, it wants greater visibility over the readiness of its teams and a more realistic training environment that replicates the entirety of the internet, including social media.

These two areas were the focus of the latest industry day for the Persistent Cyber Training Environment, or PCTE, which is U.S. Cyber Command's online client that allows worldwide cyber mission force teams to connect and conduct individual and team training as well as mission rehearsal.

The Army is running the program on behalf of Cyber Command and the joint cyber force.

The Aug. 19 industry day specifically focused on what the PCTE program office is calling Cyber Innovation Challenge 4. Officials have said that Cyber Innovation Challenge 4 differs from its predecessors, partly because how the program office has matured and better integrated with the operational force at Cyber Command and the service cyber components.

The challenges are ways to deliver incremental capability to the training platform. They also serve as competitions to award contracts and layer new technologies onto the platform, oftentimes involving smaller, nontraditional defense companies. There were 78 companies registered to the industry day — 25 percent of which were new to PCTE competitions and cyber innovation challenges.

“What do I need from you? The two major areas we're focused on today are cyber mission force assessment, which is improving our ability to assess our training of the force, and two, traffic generation. Increasing the realism of operating [in] the internet,” Lt. Gen. Stephen Fogarty, commander of Army Cyber Command, told the industry audience during the remote event.

These two focus areas emerged from multiple discussions with Cyber Command and the service cyber components, officials said. Part of what is driving the greater need to assess the force and understand its readiness is new reporting requirements from Congress.

“The assessment functionally must be able to incorporate defined training standards which will enable USCYBERCOM to accurately measure and maintain team and mission readiness, which has become even more critical with the 2020 National Defense Authorization Act directing quarterly reviews of the cyber mission force's readiness,” said Col. Tanya Trout, the outgoing director of the Joint Cyber Training Enterprise, which is the nonmaterial component to PCTE at Cyber Command. “Being able to demonstrate how we're impacting readiness is the gamechanger.”

A staffer for the House Armed Services Committee said the quarterly assessment is set to be delivered along with the quarterly briefing on cyber operations, as mandated in a previous NDAA. However, due to the ongoing pandemic, the committee has been unable to schedule the briefing. The staffer added that despite not having the report in hand, the committee is encouraged to see the Pentagon has made progress in creating metrics to evaluate the cyber mission force.

Commanders also want a better way to see how their forces perform during training so they can review scenarios and modify it as needed.

Specific requests to industry include planning tools, a scoring engine, an assessment repository and data collection, analytics dashboards and aggregation, and external reporting.

“These capabilities will give commanders better tools to assess their force. Commanders will be able to look at data and assess individual ... and unit readiness. These capabilities will also give training managers planning tools to meet commander's goals,” Fogarty said.

Regarding traffic generation, Fogarty said there's a need for forces to be able to operate across the continuum of the information environment, not just within a certain set of networks. These include friendly space, gray space — which refers to the neutral area of the broader internet — and adversarial networks (known as red space).

“The environment that PCTE replicates has to actually replicate the real-world environment,” he said. “We need a way to define, shape and record realistic traffic emulation capabilities that mirror real-world activities and terrain across the cyber domain. But also, very importantly, in the information environment, that includes social media because it would be very simple for us if all we had to do was worry about just the network. What we have to worry about is the entire information environment.”

The program office is now looking for host/user-based traffic activities, cyber traffic terrain, network traffic layers, information operations and social media layers, and traffic command-and-control dashboards.

https://www.c4isrnet.com/cyber/2020/08/20/heres-what-us-cyber-command-wants-next-for-its-training-platform/

Sur le même sujet

  • 5 questions with the deputy director of DISA’s contracting arm

    2 décembre 2020 | International, C4ISR

    5 questions with the deputy director of DISA’s contracting arm

    WASHINGTON — Mass telework brought on by the coronavirus pandemic has made 2020 a busy year for the Defense Information Systems Agency. Throughout the year, the Pentagon's top IT organization has had a hand in the department's Commercial Virtual Remote Environment, which provides collaboration tools for more than 1 million users. DISA has also helped set up IT capabilities for the Navy's two hospital ships as they docked in New York City and Los Angeles to assist with the COVID-19 response. As a result, it has also been a busy year for Debra Daniels, DISA's vice procurement services executive and deputy director of the Defense Information Technology Contracting Organization. Daniels started at DISA in March, right as workers were being sent home. She joined from the Small Business Administration after about 30 years with the Army and now helps oversee a $17 billion portfolio at DISA. C4ISRNET interviewed Daniels about her new position, the unexpected tool she uses to communicate and meeting small business goals. This interview has been edited for length and clarity. What is it like to take over a massive IT portfolio during a pandemic? It makes you think differently and do things differently. It definitely increases communication as DISA provides IT and cybersecurity support. One of the most basic things that I use to make sure to communicate and get on board is the telephone. It works well on picking up and introducing yourself to not only the workforce but the mission partners themselves, stakeholders, small business, in order to do the job. It just makes you reach out more. But I'm going to tell you: DISA has all of the tools in place that allow us to stay in and keep connected so far. DISA never shut down during the pandemic. We just moved from a federal workspace to our own home workspaces and kept going. And what I can say about the contracting force is they never lost momentum, they never lost focus on the priorities at all in doing that. How have your first six months gone? As our contracting operations moved to a home space, it never shut down, never closed, it never lost a beat. I would say probably the momentum increased with the contracting force on just what they were doing in reaching out, making sure that the war fighter had the capability. I'm proud of the fact that, again, we definitely met or exceeded our small business goals. [Specifically], there's about five new records that were [recently] set that continue to build the small business industrial base. This fiscal year, we did $7.6 billion in obligations, which was about a billion dollars more than they did in FY19, I would say just with increasing requirements in the need for the IT and cyber solutions across the Department of Defense but also probably related to some of the pandemic-related urgent and emerging requirements that we provided in that. This is a very difficult time for small business. What should small businesses expect when interacting with your office? What I would want small businesses to know is they're definitely vital to us meeting our goals and our demands and capabilities for the war fighter. And they help us meet those demands. More often, as you know, we get great support — even greater support from them. We could not do it without them. So for industry I would like to say they always want to know how can they participate in the request for information. I would definitely say to continue to reach out, but I would ask them [to] definitely do [your] homework [related to] whatever product or solution they're seeking to provide to make sure that it fits within DISA's capability and its needs. We also partner right now in contracting; definitely a key member at the table at the beginning of acquisition planning is our Office of Small Business Programs here in DISA. Definitely reach out to them, I would say, particularly if [you] want to partner with us to be invited to one of the DISA one-on-one small business orientation offerings that says how you can partner with us. I'll also say that as we get ready in this season to prepare for the DISA Forecast to Industry virtual conference, we will give our industry partners, particularly to include small business, our forecasts. I would say if you want to, you can probably see on the DISA website the forecast from fiscal 2019, and we actually updated that forecast of offerings for the upcoming years. We posted that earlier this summer. So you get an indication of what we're looking for. I would also say a biggie for industry to participate with us is answer requests for information and attend the industry days so you can definitely learn about DISA's mission and what it's seeking, particularly war fighter-specific [needs] and the capability we're looking for. What do small businesses need to know about the cybersecurity requirements at DISA? That is one of the main focuses of DISA as the premier IT support agency and [a trusted provider that] connects and protects the war fighter in cyberspace. So cybersecurity is very important to us, and also should be important to our industry and our small business partners. I think they want to protect their intellectual property and capital just as much as we do. So if you're wanting to work with DISA and the DoD, be accountable also for cybersecurity throughout the life cycle of the capability you're providing. What is DISA doing in relation to the new Cybersecurity Maturity Model Certification — the new cybersecurity audit standards? As we're tracking right now, we do have new requirements that are coming out [because of] the Cybersecurity Maturity Model Certification in the DoD. So as that starts in its implementation process, the Procurement Services Directorate is definitely working to understand these new interim rules — and following [those rules] so we can implement that cybersecurity process once we have the application and accreditation requirements. So we definitely know it will impact all of our industry partners. It will not impact or affect our cybersecurity posture. So if you're going to work with us, cybersecurity is definitely a key. There's a perception that we want to prioritize speed of delivery in deployment over cybersecurity. No. In DISA, in the department — again, I can't harp on [enough] — cybersecurity is one of our utmost priorities, and that is something that we will not diminish or lower the standard on. So it's important that while we deliver with speed and relevance to meet the needs, we're also maintaining our cybersecurity. https://www.c4isrnet.com/show-reporter/disa-forecast-industry/2020/12/01/5-questions-with-the-deputy-director-of-disas-contracting-arm

  • BAE Systems secures Future Maritime Support Programme contracts worth over £1 billion

    6 avril 2021 | International, Naval

    BAE Systems secures Future Maritime Support Programme contracts worth over £1 billion

    The contracts, worth up to £1.3 billion over five years, will commence on 1 October 2021 following a transition period

  • India clears $2.12 billion purchase of Hellfire-equipped naval helicopters

    21 février 2020 | International, Aérospatial, Naval

    India clears $2.12 billion purchase of Hellfire-equipped naval helicopters

    By: Vivek Raghuvanshi NEW DELHI — India on Wednesday cleared the purchase of 24 Sikorsky MH-60R naval multirole helicopters through the U.S. Foreign Military Sales program, according to a Ministry of Defence official. The acquisition, which is worth about $2.12 billion, was approved by India's top defense clearance body, the Cabinet Committee on Security, which is headed by Prime Minister Narendra Modi. The MoD had approved funds for the purchase in August 2018. The clearance comes ahead of a two-day visit to India by U.S. President Donald Trump beginning Feb. 24. The MoD official said a formal government-to-government contract for the MH-60R helicopters will be signed once cost negotiations are finalized. No timeline has been set, but delivery will take place three years after the contract is inked, he added. A previous attempt to buy naval multirole helos failed when the MoD canceled the planned purchase of 16 S-70B Seahawks from Sikorsky, a Lockheed Martin subsidiary, in June 2017 following expiry of the $1 billion price tag offer. The 2009 tender for 16 helos was sent to Sikorsky, NHIndustries, Airbus Helicopters and Russian Helicopters. The S-70B was selected over NHIndustries' NH90 helicopter in 2011; the other potential contenders did not participate. The cost of weapons was not included in the original program, but the recently approved deal for 24 MH-60Rs does include a weapons package, according to an Indian Navy official. The helicopters are to be armed with multi-mode radar, Hellfire missiles, Mark 54 torpedoes and precision-kill rockets. The Navy plans to use the helicopters for its front-line warships to replace its outdated British Sea King Mark 42 helicopters. They are also to be used in limited intelligence gathering roles, for surveillance missions, and in search and rescue efforts, the Navy official said, adding that the procurement of the helicopters is the top-most priority for the service. The helicopters are also expected to have the capability for conducting amphibious assault and anti-submarine warfare missions. https://www.defensenews.com/naval/2020/02/20/india-clears-212-billion-purchase-of-hellfire-equipped-naval-helicopters/

Toutes les nouvelles