LandWarNet2009
- Track 2: Information Assurance –The Defender’s Challenge
- Ms. Carol Assi, Director, Army Office of Information Assurance & Compliance
- 60 pages
- August 18, 2009
Traditional & Constant Threats
- Pirated applications
- Copyright violations
- Hijacking
- Illegal downloads
- Illegal applications
- Attachments
- Insider threats
- Phishing
- MALWARE
- BOTNETS
- Espionage
- PII compromise
- Spillage
- P2P
- OPSEC violations
…
AR 25-2 IA Future
Major Revision with Army SME staffing in progress–
– Refine IA tools approval and acquisition processes for Army
– HQDA IG IA inspection program
– End-point security mandates -HBSS
– Revise IAW emerging OMB, DoD, and Joint policy and doctrine
– Updates personnel security investigation requirements
– Identity Protection and Management (HSPD-12, CAC)
– Updated guidance for compromised information systems
– COMSEC modernization
– Mandates proactive collaboration/sharing for IA/CND data
– Mandates IA/CND tools integration into Army/Joint AS&W
– BBP mandate and clarification
– Standardized DOD and Army user agreement
– Mandates sharing/collaboration of IA assessment reports
– CIO/G-6 SAP/SAR responsibilities…