Welcome!

Microservices Expo Authors: Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

Related Topics: @CloudExpo, Microservices Expo, Cloud Security

@CloudExpo: Article

RSA Conference 2011: Serious Keynotes: DoD & CyberCommand

CyberCommand, DoD and emerging threats

One thing you can say about RSA is that they have some serious people for their keynotes. Last year, Secretary of the Department of Homeland Security Janet Napolitano spoke. Earlier this week, Deputy Secretary of Defense, William J Lynn III gave a talk on the his view of the evolution of the cyber-threats. On Thursday, the NSA head and commander of the US Military’s CyberCommand talked about how cyber security is a “team sport.”

Deputy Secretary of Defense, William J Lynn III
Sec. Lynn’s talk was what you would expect to get from a Deputy Secretary of Defense. He was serious, spoke clearly and in stentorian tones. His presentation was formal and structured, and laid out the case for an expanded government presence in Cyberspace. Lynn’s first presented his threat model, which is a prioritized list of threats from least to greatest.

  1. Infiltration of our networks: This is the kind of hacking we all think of.
  2. Disruption of our networks. This includes DDOS attacks, of the kind that have been recently attributed to the group Anonymous.
  3. Destruction of our networks: This include actions which could lead to destruction of physical property and loss of life. Lynn’s argument is that we need to be prepared for this new threat.

In response to these threats Lynn mentioned that there is a new government strategy coming out shortly called Cyber 3.0. That strategy includes 5 pillars:

  1. The Defense Department should recognize that “Cyber” as Lynn said, is a threat domain as serious as air, land and sea.
  2. Network need to be equipped with “Active Defensives”, which sounds like anti-virus software on a much larger domain.
  3. The DoD needs to Ensure that critical infrastructure is protected. This includes government and financial systems,  and physical assets like the power grid.
  4. Building collective cyber-defenses with our allies. This is a marked change from the previous administrations go-it-alone approach.
  5. Marshal our technical and human resources to remain pre-eminent in in cyberspace. This included the introduction of a program akin to the cyber-security equivalent of the Civilian Conservation Corp from the 1930’s.

There was a strong suggestion that the government would be strengthening its cyber security in the coming years. However, what was notably absent from Lynn’s talk was any discussion of civil liberties.

General Keith B. Alexander, U.S. Cyber Command and National Security Agency
The opening keynote for Thursday was from General Keith B. Alexander, U.S. Cyber Command and National Security Agency/Central Security Service. He has spoken at RSA before, when he was merely the NSA Director. His talk was entitled “Active Defense and Concepts on a Secure Zone.” Many of his points were echoed in Lynn’s talk. What was different was the tone, and the substance as well.

First off, this is an Army General who has humor. He made a few wisecracks that were well received by the audience of an estimated 7000 people. Second, he believes that the US does not have to choose between Civil Liberties or

His role as head of CyberCommand is to secure the DoD networks. “We are scanned 1 Million times a day and get attacked 20,000 times a day.” Clearly, this is a big job.

Like Lyons he talked about making “cyberspace” a military theatre. Like Lynn, he talked about having “Active Defenses”, which means dynamic and adaptable defenses. He made a reference to the French attempt at thwarting German invsion in WWI via the Maginot line. This was ultimately ineffective, since Germany attacked via Belgium to the north. The point being made is that we need to adapt to an ever changing foe.

What was impressive about this talk was the General’s candor. He said “We do not have situational awareness” of what is on the Internet. This seemed to be a plea to the audience to come up with something.

Also a unique part of the speech was his call to help our schools do better in STEM: Science, Technology, Engineering and Math. That the military would make a better case of this than the civilian leader was an interesting contrast.

With all the General’s talk of cyber-security as a team sport, it could almost lead one to believe that public-private partnership in this area could be successful.

More Stories By Bill Roth

Bill Roth is a Silicon Valley veteran with over 20 years in the industry. He has played numerous product marketing, product management and engineering roles at companies like BEA, Sun, Morgan Stanley, and EBay Enterprise. He was recently named one of the World's 30 Most Influential Cloud Bloggers.

Microservices Articles
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...