
Greg Otto writes Schneck told an Intel Security-sponsored forum that the department uses the system, nicknamed Einstein, to gain situational awareness of cyber threats as DHS’ National Protection and Programs Directorate explore ways to bolster the platform’s intrusion detection and prevention functions.
She added DHS aims to facilitate exchange of threat information between companies and agencies through the department’s Automated Indicator Sharing initiative.
The report said the department also uses data collected during cyber investigations by the Secret Service and the Immigration and Customs Enforcement.
Related Articles
Nick Schiffler, marketing manager at Deltek, said proposal artificial intelligence is becoming a key capability for government contracting teams seeking to respond quickly to requests for proposals and improve competitiveness in the federal marketplace. Streamlining Proposal Development With AI In a guest post published on SAME’s website, Schiffler wrote that proposal AI tools could help GovCon proposal teams respond to requests for information, complete their capture plans, develop compliance matrices and transform complex solicitations into more manageable parts. “These tools are built to understand the structure, language, and compliance requirements of federal RFPs, helping teams respond faster and more accurately,” he added.
Michael Cadenazzi announced on LinkedIn Tuesday that he has been confirmed as assistant secretary of defense for industrial base policy. Who Is Michael Cadenazzi? Cadenazzi is a seasoned aerospace and defense executive with a proven track record in driving growth, innovation and risk management. He most recently served as the managing director at EY for nearly four years. He was also senior vice president of product development and director of solutions at Govini. The executive dedicated five years to McKinsey & Company, holding key roles such as associate partner, senior knowledge expert and solutions general manager of VisualDoD—the innovative startup he
The Department of Defense has started implementing a five-phase construct that seeks to provide real-time cyber defense at operational speed and ensure that U.S. warfighters maintain technological superiority against evolving cyberthreats. 5 Phases of DOD’s Cybersecurity Risk Management Construct DOD said Wednesday the Cybersecurity Risk Management Construct, or CSRMC, consists of five phases aligned to system development and operations: design, build, test, onboard and operations. The design phase, for instance, aims to ensure resilience of system architecture by embedding security at the outset. “This construct represents a cultural fundamental shift in how the Department approaches cybersecurity,” said Katie Arrington, a Wash100 awardee who