Home / News / John Hickey: DISA Aims to Detect Network Threats Via Identity Mgmt, Cyber Protection Teams

John Hickey: DISA Aims to Detect Network Threats Via Identity Mgmt, Cyber Protection Teams

cybersecurityJohn Hickey, cyber development director at the Defense Information Systems Agency, has said DISA relies on cyber protection teams, identity management and integrated security to help detect and protect the agency’s information networks from cyber threats.

Hickey said that DISA collaborates with the Joint Force Headquarters-Department of Defense Information Networks to provide training to CPTs, DISA said Wednesday.

He told Federal Computer Week Security Summit attendees in Washington that CPTs under DISA undergo training on the Joint Regional Security Stacks, cyber situational awareness and big data platforms, as well as immersion training through deployments and exercises.

Hickey also cited the need to deploy the JRSS system, which aims to provide DISA visibility into all network endpoints, and to partner with industry in order to facilitate the integration of security with the cyber environment.

He also mentioned DISA’s programs that work to protect the agency’s networks from unauthorized access and insider threats, such as the Public Key Infrastructure as well as form-factor and derived-credentials programs for tablet computers and other mobile devices.

Check Also

Lead HHS Cyber Auditor Says Team ‘Well Aligned’ to Face Challenges

The head of cybersecurity at the Health and Human Services Department’s Office of the Inspector General recently said that he and his team are learning as much as they can about supply chain threats and application development security, to respond to such issues effectively, Federal News Network reported Friday. Jarvis Rodgers, HHS OIG Cybersecurity and IT Audit Division director, told Federal News Network via email that his unit is aware that risks related to global supply chains “present a unique set of challenges” and that poorly written code can result in costly and persistent security vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *