BLOG - Doubly Vigilant: Resolving Our Role as Users
In this post, our guest blogger, COL Greg Conti, Director of the Army Cyber Institute discusses the evolving role of the user in cybersecurity. One of the challenges created by the ubiquity of Internet connected devices we use every day is the manner in which we interact with our devices as different user roles. If you are at work, on the Department of Defense Information Network (DoDIN), chances are you are a general user, with very little ability to alter your system other than through ordinary use. Even as an information security specialist and cyber officer, my current workstation restricts me to the rights and privileges afforded to any other general user.
Information Technology Approval System (ITAS) Replaced Goal One Waiver in November
The Information Technology Approval System (ITAS) tool replaced the Goal One Waiver as the Army’s primary means to simplify the waiver process for IT policy compliance. ITAS will not only simplify the user experience, it will streamline approvals and provide data mining and reporting capabilities which don’t exist in the Goal One Waiver system.
LTG Ferrell discusses JRSS at CYBERCON 2015
The Army is moving forward with what Pentagon leaders consider to be a crucial piece of the future defense IT backbone: the Joint Regional Security Stacks. The set of servers, switches and software tools, which has been dubbed a "firewall on steroids," is processing network traffic at several Army installations in the United States, with some overseas garrisons to follow this fiscal year, said Army CIO Lt. Gen. Robert Ferrell.
Army Releases Commercial Cloud Policy
WASHINGTON D.C. (July 30, 2015) The Army recently released a policy for migration to commercial cloud service providers. This policy complements the successful release of the Army Cloud Strategy in March, and for the first time provides a defined path for acquiring and using Commercial Cloud Services Providers (CSPs).
Army Enterprise Network Vision
  A secure, integrated, standards-based environment that ensures uninterrupted global access and enables collaboration and decisive action throughout all operational phases across all environments.  
Leader Blog


Doubly Vigilant: Resolving Our Role as Users

Cybersecurity Awareness Month Resources (CAC req)

Contact Us Accessibility/Section 508 Privacy & Security FOIA