LandWarNet 2008: Three days of defining the domain, building the enterprise and securing the data
This year’s iteration of LandWarNet displayed several distinct themes. They include defining the domain, building the enterprise and securing the data.
LandWarNet 2008 began Monday evening in the shadow of Tropical Storm Fay, but as the storm moved north, the rays of sunshine that followed complemented the illumination of ideas taking place inside the Broward County Convention Center.
Slightly more than 5,600 general officers, command sergeant majors, Army personnel, senior executive service officials and industry executives attended this year’s event, breaking all prior records for both attendance and number of exhibitors on the show floor.
Between the keynote sessions, highlighted by a live video teleconference with Army Chief of Staff GEN George Casey and an in-person presentation by Gen. Kevin Chilton, commander of U.S. Strategic Command, and seven tracks of informational briefings and discussions, this year’s iteration of LandWarNet displayed several distinct themes. They include defining the domain, building the enterprise and securing the data.
The following highlights some of the interesting statements made on each of those subjects.
Defining the Domain
— Army Chief of Staff George Casey
—USSTRATCOM Commander Gen. Kevin Chilton
— Brig. Gen. Susan Lawrence, commanding general, Network Enterprise Technology Command/9th Signal Command
“As a result we need to optimize for the unknown. It is [about] understanding how to move and share information. It is not just connecting with people, but helping them with the ability to make a decision.”
— DISA Director Rear Adm. Elizabeth Hight
— COL Wayne Parks, director of the Army Computer Network Operations-Electronic Warfare Proponent, Fort Leavenworth
Building the Enterprise
—USSTRATCOM Commander Gen. Kevin Chilton
— Brig. Gen. Susan Lawrence, commanding general, Network Enterprise Technology Command/9th Signal Command
— Army CIO/G6LTG Jeffrey Sorenson
— DISA Director Rear Adm. Elizabeth Hight
— Army CIO/G6LTG Jeffrey Sorenson
— Brig. Gen. Brian Donahue
“It’s about consuming the information from an FCS standpoint, not about how you develop the sources of that information. What I’m talking about is thinking about something that is much larger than ourselves.”
— DISA Director Rear Adm. Elizabeth Hight
Securing the Data
— USSTRATCOM Commander Gen. Kevin Chilton
— Brig. Gen. Susan Lawrence, commanding general, Network Enterprise Technology Command/9th Signal Command
“If you open a vulnerability in our network are there consequences for that? When was the last time someone was called before the commander’s office, not the G6’s office, about opening a vulnerability. We need to teach people how to use the network and then hold them accountable.”
— USSTRATCOM Commander Gen. Kevin Chilton
”It’s a proactive approach to thinking about security from the inside out. The best available information assurance products have inherent weaknesses; it is only a matter of time before an adversary will find and exploit a vulnerability.
“An effective countermeasure is to deploy multiple defense mechanisms between the adversary and his target. Each of these defenses must present unique obstacles to the adversary. Each should include protection and detection measures, and complement while not duplicating each other.
“Defense in depth is a process, not a product. Security continues to be an on-going process. Constant vigilance and user awareness play equally important roles in building the best security posture for the enterprise network.”
— Lt. Col. Glenn Herrin, deputy commander, U.S. Army Network Operations and Security Center.
— Don Renner, vice president of enterprise technologies and service for CACI International