Search blog
Author: CIO/G-6 Created: 12/22/2010 3:02 PM
CIO/G6 Leader Blog
By CIO/G-6   on 10/28/2015 9:12 AM

by COL Greg Conti
Director, Army Cyber Institute

One of the challenges created by the ubiquity of Internet connected devices we use every day is the manner in which we interact with our devices as different user roles. If you are at work, on the Department of Defense Information Network (DoDIN), chances are you are a general user, with very little ability to alter your system other than through ordinary use. Even as an information security specialist and cyber officer, my current workstation restricts me to the rights and privileges afforded to any other general user. At home, on our laptop, tablet, or phone, however, we mostly operate as privileged users, often with complete control of security, updates, software, and use. On our personal devices we assume personal responsibility for the way we use our devices, the software we install, and the security of our data. As users we must be able to resolve the differences in our user roles and act with diligence across domains and devices.

By CIO/G-6   on 10/15/2015 2:03 PM

by LTG Edward C. Cardon
Commanding General, U.S. Army Cyber Command

Today our Army’s successful execution of Unified Land Operations relies heavily upon cyberspace to deliver combat power to the tactical edge. Cyberspace facilitates unprecedented connectivity and flow of information required for mission command, intelligence, maneuver, fires, protection, and sustainment that helps enable our ground combat units to achieve overmatch against our adversaries. At the same time, reliance on cyberspace has made our Army vulnerable to a wide range of cyber threats.

By CIO/G-6   on 10/5/2015 9:08 AM

by Lt. Gen. Robert S. Ferrell, Chief Information Officer, G-6

October is Army Cybersecurity Awareness Month – our annual campaign to improve the Army’s security posture by increasing awareness of organizational cybersecurity practices and training. It is an opportunity to build a culture of cybersecurity awareness throughout our entire workforce. This year's theme is “Stay Protected While Connected” which appropriately emphasizes individual and leader responsibilities for protecting the Army against cybersecurity threats that endanger personnel, compromise operations, and consume resources.

Contact Us Accessibility/Section 508 Privacy & Security FOIA