The pilot program was launched by the Department of Defense (DoD), in cooperation with the Department of Homeland Security (DHS), in June of last year to share classified information about cyber threats with defense contractors and their network providers. Under the program, the network providers scan email traffic entering the defense contractors’ networks for malware based on malicious code signatures supplied by the Pentagon.
In August, the Pentagon announced that it would expand the pilot program from the initial 20 companies. The announcement on May 11 converts the initiative from a pilot into a permanent program – the DIB Cyber Security/Information Assurance (CS/IA) Program – and expands the scope of cooperation to include additional classified threat and technical information.
“The expansion of voluntary information sharing between the department and the defense industrial base represents an important step forward in our ability to catch up with widespread cyber threats”, commented Ashton Carter, Deputy Secretary of Defense. “Increased dependence on internet solutions have exposed sensitive but unclassified information stored on corporate systems to malicious probes, theft, and attacks. This expanded partnership between DoD and the defense industrial base will help reduce the risk of intrusions on our systems.”
17 May 2012
This is definitely interesting and should have been in place from day one. One of the biggest problems with crime solving was agencies and departments not talking to one another.
I wonder if any technology of this type will be featured at the North Alabama Cyber Security Summit in June? If Doc of Operation Cyber Protect is going to be there, it shoud be interestig at least!
Note: The majority of comments posted are created by members of the
public. The views expressed are theirs and unless specifically stated are not those
Elsevier Ltd. We are not responsible for any content posted by members of the public
or content of any third party sites that are accessible through this site. Any links
to third party websites from this website do not amount to any endorsement of that
site by the Elsevier Ltd and any use of that site by you is at your own risk. For
further information, please refer to our Terms & Conditions.
Comment on this article
You must be registered and logged in to leave a comment
about this article.