{"id":15061,"date":"2024-06-28T13:54:31","date_gmt":"2024-06-28T16:54:31","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=15061"},"modified":"2024-06-28T13:57:04","modified_gmt":"2024-06-28T16:57:04","slug":"disa-contempla-el-objetivo-agresivo-de-automatizar-el-75-por-ciento-de-las-capacidades-ciberneticas","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=15061","title":{"rendered":"DISA contempla el objetivo &#8216;agresivo&#8217; de automatizar el 75 por ciento de las capacidades cibern\u00e9ticas"},"content":{"rendered":"<p>Mientras DISA se prepara para la amenaza inminente de China , la agencia estableci\u00f3 un objetivo ambicioso de tener el 75 por ciento de sus capacidades de ciberseguridad de tipo administrativo completamente automatizadas por inteligencia artificial.<\/p>\n<hr \/>\n<p>TECHNET CYBER 2024 \u2014 As DISA prepares for the <a href=\"https:\/\/breakingdefense.com\/2024\/06\/us-falls-further-behind-in-ai-race-could-make-conflict-with-china-unwinnable-report\/\" target=\"_blank\" rel=\"noopener\">looming<\/a><a href=\"https:\/\/breakingdefense.com\/2024\/06\/us-falls-further-behind-in-ai-race-could-make-conflict-with-china-unwinnable-report\/\"> threat of China<\/a>, the agency set an ambitious goal of having 75 percent of its administrative-like cybersecurity capabilities completely automated by <a href=\"https:\/\/breakingdefense.com\/tag\/artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">artificial intelligence<\/a>, Brian Hermann, cybersecurity and analytics director at <a href=\"https:\/\/breakingdefense.com\/tag\/disa\/\" target=\"_blank\" rel=\"noopener\">DISA<\/a>, told a media roundtable Tuesday.<\/p>\n<p>\u201cThe only way that we can actually do our job with the pacing threat of <a href=\"https:\/\/breakingdefense.com\/tag\/china\/\" target=\"_blank\" rel=\"noopener\">China<\/a> is to actually add that automation capability so that that the human analysts can take advantage of their brainpower to actually do the high-end fight stuff, not just the day-to-day normal stuff that happens all the time,\u201d he said here at the TechNet conference in Baltimore.<\/p>\n<p>\u201cSo I think that it\u2019s an aggressive goal for us, but it\u2019s something that we\u2019re working hard to get after as well.\u201d<\/p>\n<p>Hermann added that though there is no defined timeline for completing this automation goal,\u00a0\u201cit\u2019s not where it needs to be.\u201d<\/p>\n<p>However, he explained that DISA is making strides toward this goal by streamlining data into a collective space where it was created, instead of in separate silos.<\/p>\n<p>\u201cOur data analytics team has been creating a data lake architecture that allows us to have the data where it\u2019s essentially created. If you think about this, it connects back to the DoD cloud strategy [<a href=\"https:\/\/breakingdefense.com\/tag\/joint-warfighting-cloud-capability-jwcc\/\" target=\"_blank\" rel=\"noopener\">Joint Warfighting Cloud Capability<\/a>]. We have four primary cloud service providers under [JWCC] and so we\u2019re creating the lake of data in the environment where the cybersecurity tools are providing, so it\u2019s not going to generate a lot of exfiltration costs or transition costs,\u201d Hermann said.<\/p>\n<p>The creation of this data \u201clake architecture\u201d was DISA\u2019s next step after it sunset its Big Data Platform (BDP) in two parts that took place last year and earlier this year. With the BDP, DISA\u2019s data was separated from each other, making it harder to eventually automate. Now, with the data moving toward being all in one place, DISA can move toward automation.<\/p>\n<p>Hermann said DISA also plans for this central architecture to have a feature where users can log into one data-centric environment instead of having to use several tools to log into various databases\u00a0to find a specific piece of data.<\/p>\n<p>\u201cThe message that I got loud and clear from our analysts was that we\u2019ve created a number of different silos, [and] that generated the need for them to log into a lot of different environments to do their job on a day-to-day basis. We\u2019d like to have a more federated approach where they log into one portal and they\u2019re able to get access to all the data, get all the insights that they need,\u201d Hermann said.<\/p>\n<p>Another benefit of this data-centric layout, Hermann explained, is that <a href=\"https:\/\/breakingdefense.com\/tag\/zero-trust\/\" target=\"_blank\" rel=\"noopener\">zero trust<\/a> can be more easily implemented, since all the data is in one place, the necessary security precautions have the potential to be interoperable.<\/p>\n<p>\u201cWe had protections at the local user\u2019s desktop station, we had firewalls that existed at the various parts of our infrastructure, and they didn\u2019t really talk to each other very much. So now, that\u2019s the difference, they\u2019re starting to talk to each other,\u201d Hermann said.<\/p>\n<p><strong>Fuente:<\/strong> <em><a href=\"https:\/\/breakingdefense.com\/2024\/06\/disa-eyes-aggressive-goal-of-automating-75-percent-of-cyber-capabilities\/\" target=\"_blank\" rel=\"noopener\">https:\/\/breakingdefense.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mientras DISA se prepara para la amenaza inminente de China , la agencia estableci\u00f3 un objetivo ambicioso de tener el 75 por ciento de sus&hellip; <\/p>\n","protected":false},"author":1,"featured_media":15062,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/15061"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15061"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/15061\/revisions"}],"predecessor-version":[{"id":15063,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/15061\/revisions\/15063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/15062"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}