HomeNewsArticle Display

IT Experts Discuss DOD's Use of Digital Communications

It's essential to modernize the Defense Department's perimeter-based security models and compliance requirements that prevent DOD from transforming the way it achieves its objectives, information technology experts said in response to evolving cyber risks.

Peter T. Ranks, deputy chief information officer for Information Enterprise, discussed a range of IT issues yesterday at the Defense One Tech Summit via remote video. He was joined by Jeanette Manfra, the director of government security and compliance for Google Cloud. Manfra served in the Army as a communications specialist and a military intelligence officer and in high-level IT positions in DOD and the Department of Homeland Security.

Ranks said DOD has served as a model for other agencies during the COVID-19 pandemic as the department has increasingly realized the value of having infrastructure in place for workers to work remotely, particularly in cloud computing.

Man types on keyboard.
Computer Program
Air Force Staff Sgt. Caleb uses a computer program to identify network issues during his unit's training period at Berry Field Air National Guard Base, Nashville, Tenn., May 5, 2019. For security reasons, the airman’s last name is withheld and the photo has been altered to blur out identification badges.
Photo By: Air Force Tech. Sgt. Mark Thompson
VIRIN: 190505-Z-IA427-1011M

Working remotely involves an architecture that meets the need of users wherever they are so they have access to data, he said. But Ranks noted that it's important to have a zero-trust mentality when it comes to cloud computing, which means being aware of the possibility of getting hacked.

Manfra noted that two forces are tugging in different directions in digital communications: security compliance and mission outcomes, which involve speed, productivity and agility.

"Security compliance acts as blocker sometimes," she said, adding that security compliance often doesn't measure and detect what it's supposed to. 

"You have to have a zero-trust mindset and move beyond the idea that a perimeter is going to keep you safe," she said, noting that insider threats exist.

A solution to the two competing forces, she advised, is to bring in security experts early in software development so there's a dialogue and an understanding about each other's expectations and what is possible.

A service member types at a laptop keyboard.
Typing
A service member types at a laptop keyboard.
Photo By: Marine Corps
VIRIN: 081123-M-ZZ999-010

A particular area where transparency is necessary, she said, is having a good dialogue with cloud providers to aid in managing risk and reducing uncertainty.

Manfra also suggested that the "digital fortress" mentality that aims to keep intruders out can also hamper the innovations offered by commercial clouds, such as data analytics, artificial intelligence and edge computing. 

Ranks and Manfra both emphasized the importance of having a well-trained workforce. They said not everyone needs to know how to code, but everyone should understand the fundamentals.

USAF Comments Policy
If you wish to comment, use the text box below. AF reserves the right to modify this policy at any time.

This is a moderated forum. That means all comments will be reviewed before posting. In addition, we expect that participants will treat each other, as well as our agency and our employees, with respect. We will not post comments that contain abusive or vulgar language, spam, hate speech, personal attacks, violate EEO policy, are offensive to other or similar content. We will not post comments that are spam, are clearly "off topic", promote services or products, infringe copyright protected material, or contain any links that don't contribute to the discussion. Comments that make unsupported accusations will also not be posted. The AF and the AF alone will make a determination as to which comments will be posted. Any references to commercial entities, products, services, or other non-governmental organizations or individuals that remain on the site are provided solely for the information of individuals using this page. These references are not intended to reflect the opinion of the AF, DoD, the United States, or its officers or employees concerning the significance, priority, or importance to be given the referenced entity, product, service, or organization. Such references are not an official or personal endorsement of any product, person, or service, and may not be quoted or reproduced for the purpose of stating or implying AF endorsement or approval of any product, person, or service.

Any comments that report criminal activity including: suicidal behaviour or sexual assault will be reported to appropriate authorities including OSI. This forum is not:

  • This forum is not to be used to report criminal activity. If you have information for law enforcement, please contact OSI or your local police agency.
  • Do not submit unsolicited proposals, or other business ideas or inquiries to this forum. This site is not to be used for contracting or commercial business.
  • This forum may not be used for the submission of any claim, demand, informal or formal complaint, or any other form of legal and/or administrative notice or process, or for the exhaustion of any legal and/or administrative remedy.

AF does not guarantee or warrant that any information posted by individuals on this forum is correct, and disclaims any liability for any loss or damage resulting from reliance on any such information. AF may not be able to verify, does not warrant or guarantee, and assumes no liability for anything posted on this website by any other person. AF does not endorse, support or otherwise promote any private or commercial entity or the information, products or services contained on those websites that may be reached through links on our website.

Members of the media are asked to send questions to the public affairs through their normal channels and to refrain from submitting questions here as comments. Reporter questions will not be posted. We recognize that the Web is a 24/7 medium, and your comments are welcome at any time. However, given the need to manage federal resources, moderating and posting of comments will occur during regular business hours Monday through Friday. Comments submitted after hours or on weekends will be read and posted as early as possible; in most cases, this means the next business day.

For the benefit of robust discussion, we ask that comments remain "on-topic." This means that comments will be posted only as it relates to the topic that is being discussed within the blog post. The views expressed on the site by non-federal commentators do not necessarily reflect the official views of the AF or the Federal Government.

To protect your own privacy and the privacy of others, please do not include personally identifiable information, such as name, Social Security number, DoD ID number, OSI Case number, phone numbers or email addresses in the body of your comment. If you do voluntarily include personally identifiable information in your comment, such as your name, that comment may or may not be posted on the page. If your comment is posted, your name will not be redacted or removed. In no circumstances will comments be posted that contain Social Security numbers, DoD ID numbers, OSI case numbers, addresses, email address or phone numbers. The default for the posting of comments is "anonymous", but if you opt not to, any information, including your login name, may be displayed on our site.

Thank you for taking the time to read this comment policy. We encourage your participation in our discussion and look forward to an active exchange of ideas.

 

315th AW Facebook 315th AW on  Instagram 315th AW on Twitter 315th AW on YouTube Dvids Behind the Wing Podcast