{"id":9337,"date":"2022-02-01T10:34:09","date_gmt":"2022-02-01T13:34:09","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9337"},"modified":"2022-02-01T10:34:09","modified_gmt":"2022-02-01T13:34:09","slug":"el-departamento-de-defensa-de-eeuu-debe-centrarse-en-las-personas-calificadas-no-solo-en-la-nueva-tecnologia","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9337","title":{"rendered":"El Departamento de Defensa de EEUU debe centrarse en las personas calificadas, no solo en la nueva tecnolog\u00eda"},"content":{"rendered":"<p>Un informe del Pent\u00e1gono indica la conveniencia de reenfocar los esfuerzos de ciberseguridad en el personal en lugar de depender principalmente de las nuevas tecnolog\u00edas para proteger las redes. Las herramientas automatizadas a veces son necesarias para frustrar las amenazas cibern\u00e9ticas que atacan las redes a la llamada velocidad de la m\u00e1quina. Pero la naturaleza din\u00e1mica de estas amenazas requiere un enfoque combinado que utilice humanos y m\u00e1quinas juntos.<\/p>\n<hr \/>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">WASHINGTON \u2014 The Pentagon should refocus cybersecurity efforts on human defenders instead of primarily relying on new technologies to protect networks, the department\u2019s weapon tester asserted in its annual report.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">Automated tools are sometimes necessary to thwart cyberthreats that attack networks at so-called machine speed. But the dynamic nature of these threats requires a combined approach using humans and machines together.<\/p>\n<p>\u201c[C]yber assessments and operational tests continue to show that where systems or networks are actively defended by well-trained personnel in environments employing Zero Trust concepts, Red Teams emulating cyber actors have difficulty degrading critical [Department of Defense] missions,\u201d read the fiscal 2021 annual report of the Office of the Director, Operational Test and Evaluation.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\"><a href=\"https:\/\/www.c4isrnet.com\/it-networks\/2022\/01\/25\/welcome-to-thunderdome-pentagon-awards-zero-trust-architecture-prototype\/\" target=\"_blank\" rel=\"noopener\">Zero trust<\/a>\u00a0refers to a mindset that assumes networks are already compromised and continuously validates users, devices and data. It is not a single entity, but rather an architecture deploying a series of tools across the network.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">In examining combatant command and service exercises from FY14 through FY20, DOT&amp;E noted the importance of defending every stage of a cyberattack, particularly where an adversary moves within a network to find an objective, which can pose detection challenges for human cyber defenders.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">Emerging technologies such as Office365\u2032s cloud environment and zero-trust architectures promise to increase defender visibility into these attacks, the report said.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">Network tools are good at tipping off human operators that something malicious might be afoot. These human operators are then best suited to use their reasoning skills to\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/01\/29\/hand-to-hand-combat-on-computer-networks-how-cyber-threat-hunters-work\/?contentQuery={%22section%22%3A%22%2Fhome%22%2C%22exclude%22%3A%22%2Fnewsletters%2Fdaily-news-roundup%22%2C%22from%22%3A125%2C%22size%22%3A10}&amp;contentFeatureId=f0fmoahPVC2AbfL-2-1-8\" target=\"_blank\" rel=\"noopener\">actively hunt, or search on the network for potential threat actors<\/a>.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">\u201cSome of the greatest innovations in cybersecurity in recent years involve the use of advanced technologies like artificial intelligence\/machine learning to radically improve the speed and efficacy of threat detection and prevention,\u201d said Robert Sheldon, director of public policy and strategy at cybersecurity firm CrowdStrike. \u201cBut even for organizations leveraging the most sophisticated tools, people still comprise an essential layer of defense. Whether performing novel research, interpreting context around weak or ambiguous signals, or conducting hypothesis-driven threat hunting, human defenders are key.\u201d<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">John Davis, who served as a senior military adviser for cyber at the DoD, praised the refocus on people, but said it\u2019s \u201cjust as important to recognize the impact that modern innovations in both technology and processes are having on the skills that today\u2019s modern cyber defenders need to be successful.\u201d<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">\u201cAutomation tools can relieve [security operations center] analysts of hours of wearisome and mundane tasks, giving them time to develop and document processes for the complex work they perform and allowing them to respond to new or complex threats that are coming across attack surfaces,\u201d said Davis, who is currently vice president of the public sector for cybersecurity specialist Palo Alto Networks. \u201cAutomating processes to account for innovations in best practices and threat intelligence sharing can help ensure that junior analysts have the correct insight to make the best determination as quickly as possible and flag issues for more experienced analysts.\u201d<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">DOT&amp;E recommended the department refocus cybersecurity efforts on people rather than technology alone. This includes doctrine, organization and training to ensure personnel can use technology to thwart intrusion attempts.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">\u201cCybersecurity must be built into system design and the human defender should be included early on in cyber defense engineering and programmatic priorities for both system usability and training,\u201d the report stated. \u201cCyber defenders can and should include dedicated mission defense teams, system users, response-action teams, commanders and network operators, all of whom should be trained and equipped to fight though cyberattacks to complete critical missions.\u201d<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">The Air Force in recent years has transitioned its communications squadrons into groups of cyber defenders called mission defense teams,\u00a0<a href=\"https:\/\/www.c4isrnet.com\/newsletters\/daily-brief\/2019\/01\/18\/will-enterprise-it-as-a-service-create-a-more-digital-air-force\/\" target=\"_blank\" rel=\"noopener\">offloading the mundane day-to-day information technology and network-related responsibilities to the commercial sector<\/a>. These teams, which differ from cyber protection teams that each armed service provides to U.S. Cyber Command, are specialized groups that protect critical Air Force missions and installations such as critical infrastructure or computers associated with aircraft and remotely piloted systems.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">The Army, for its part, is working to\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/10\/28\/the-army-wants-to-bolster-its-local-cybersecurity-defenders\/\" target=\"_blank\" rel=\"noopener\">improve the ability of its local network defenders<\/a>, which will bolster its cybersecurity posture. The effort stems from its\u00a0<a href=\"https:\/\/www.c4isrnet.com\/it-networks\/2021\/10\/11\/ausa-merging-worlds-the-us-army-is-creating-a-unified-network-to-ensure-the-force-has-global-connectivity\/\" target=\"_blank\" rel=\"noopener\">unified network plan<\/a>, which aligns various modernization efforts to provide a network the service needs to share data from the enterprise to the tactical sphere in support of multidomain operations.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">Specifically, the Army wants to establish roles and responsibilities at each echelon for the cybersecurity operators that actually own their own network terrain.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">Currently, the Army and joint force are not optimized holistically to conduct cybersecurity operations, officials have said, which is largely because there are varying levels of responsibilities, standards and tasks for cybersecurity service providers, the local or installation level network operators, and defenders.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">This has created the need to deploy the very high-end and limited cyber protection teams.<\/p>\n<p class=\"sc-csuQGl hhYAnu body-paragraph body-paragraph\">The new plan aims to get cyber protection teams back to doing what they do best: hunting on networks and focusing on threats.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/01\/28\/dod-must-focus-on-skilled-cyber-defenders-not-just-new-tech-warns-weapons-tester\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un informe del Pent\u00e1gono indica la conveniencia de reenfocar los esfuerzos de ciberseguridad en el personal en lugar de depender principalmente de las nuevas tecnolog\u00edas&hellip; <\/p>\n","protected":false},"author":1,"featured_media":9338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9337"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9337"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9337\/revisions"}],"predecessor-version":[{"id":9339,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9337\/revisions\/9339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/9338"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}