The State of Army Information Assurance Program

LandWarNet2009

  • Track 2: Information Assurance –The Defender’s Challenge
  • Ms. Carol Assi, Director, Army Office of Information Assurance & Compliance
  • 60 pages
  • August 18, 2009

Download

Traditional & Constant Threats

  • Pirated applications
  • Copyright violations
  • Hijacking
  • Illegal downloads
  • Illegal applications
  • Attachments
  • Insider threats
  • Phishing
  • MALWARE
  • BOTNETS
  • Espionage
  • PII compromise
  • Spillage
  • P2P
  • OPSEC violations

AR 25-2 IA Future
Major Revision with Army SME staffing in progress–
– Refine IA tools approval and acquisition processes for Army
– HQDA IG IA inspection program
– End-point security mandates -HBSS
– Revise IAW emerging OMB, DoD, and Joint policy and doctrine
– Updates personnel security investigation requirements
– Identity Protection and Management (HSPD-12, CAC)
– Updated guidance for compromised information systems
– COMSEC modernization
– Mandates proactive collaboration/sharing for IA/CND data
– Mandates IA/CND tools integration into Army/Joint AS&W
– BBP mandate and clarification
– Standardized DOD and Army user agreement
– Mandates sharing/collaboration of IA assessment reports
– CIO/G-6 SAP/SAR responsibilities

Share this:

Facebooktwitterredditlinkedinmail
A D V E R T I S E M E N T