A team from the U.S. Navy Reserve successfully resolved vulnerabilities within unclassified computer networks of the service branch during an annual U.S. Fleet Cyber Command operation.
This year’s Operation Cyber Dragon, which was held from March to August, demonstrates how Reserve Sailors could be useful in defending Navy assets, the command said Thursday.
The exercise, led by Chief Warrant Officer Scott Bryson, involved more than 100 reservists within and outside the command who were chosen regardless of technical knowledge in information technology.
“Whether it’s a commercial business, military or government, your attack surface varies all the time from malicious hackers that are trying to poke and prod you. We’re always going to have vulnerabilities,” Bryson said.
He noted the team identified and resolved nearly all gaps that exposed the systems from outside threats.
Related Articles
Nick Schiffler, marketing manager at Deltek, said proposal artificial intelligence is becoming a key capability for government contracting teams seeking to respond quickly to requests for proposals and improve competitiveness in the federal marketplace. Streamlining Proposal Development With AI In a guest post published on SAME’s website, Schiffler wrote that proposal AI tools could help GovCon proposal teams respond to requests for information, complete their capture plans, develop compliance matrices and transform complex solicitations into more manageable parts. “These tools are built to understand the structure, language, and compliance requirements of federal RFPs, helping teams respond faster and more accurately,” he added.
Michael Cadenazzi announced on LinkedIn Tuesday that he has been confirmed as assistant secretary of defense for industrial base policy. Who Is Michael Cadenazzi? Cadenazzi is a seasoned aerospace and defense executive with a proven track record in driving growth, innovation and risk management. He most recently served as the managing director at EY for nearly four years. He was also senior vice president of product development and director of solutions at Govini. The executive dedicated five years to McKinsey & Company, holding key roles such as associate partner, senior knowledge expert and solutions general manager of VisualDoD—the innovative startup he
The Department of Defense has started implementing a five-phase construct that seeks to provide real-time cyber defense at operational speed and ensure that U.S. warfighters maintain technological superiority against evolving cyberthreats. 5 Phases of DOD’s Cybersecurity Risk Management Construct DOD said Wednesday the Cybersecurity Risk Management Construct, or CSRMC, consists of five phases aligned to system development and operations: design, build, test, onboard and operations. The design phase, for instance, aims to ensure resilience of system architecture by embedding security at the outset. “This construct represents a cultural fundamental shift in how the Department approaches cybersecurity,” said Katie Arrington, a Wash100 awardee who