June 30, 2019
By Daniel Gouré
DoD also has a litany of consumer devices running on its networks, from printers to video monitors and cameras to refrigerators. These devices are continually communicating with one another, as well as with higher headquarters all the way back to the Pentagon. Some observers call this the “Internet of Battlefield Things” (IOBT). The exponential growth of the IOBT is creating new vulnerabilities to cyber attacks at an alarming rate. Compromised IOT/IOBT devices are increasingly the “easy” way for attackers to get a foothold inside an organization’s network. Seven years ago, the DoD created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. The C2C approach combines existing cybersecurity technologies with newer technologies to deal with the changing nature of DoD’s network architecture. The core tenet of C2C is understanding what devices and people are connecting to DoD networks and their security posture.
The views and opinions expressed in this issue brief are those of the author.
Daniel Gouré, Ph.D., is a vice president at the public-policy research think tank Lexington Institute. Goure has a background in the public sector and U.S. federal government, most recently serving as a member of the 2001 Department of Defense Transition Team. |