Search blog
Author: CIO/G-6 Created: 12/22/2010 3:02 PM
CIO/G6 Leader Blog
By CIO/G-6   on 3/21/2016 1:43 PM

by COL Linda Jantzen
Acting Director, Army Architecture Integration Center

Today, the Army fights and operates in an information-saturated environment. Greater network capacity and computing power have given us the ability to generate and store vast quantities of data. But the sheer volume has far outpaced our ability to make use of and maximize the value of that information. Harnessing data and making them readily usable by the individual Soldier, the commander and the strategic decision maker will be the key to retaining the Army’s warfighting edge.

By CIO/G-6   on 10/28/2015 9:12 AM

by COL Greg Conti
Director, Army Cyber Institute

One of the challenges created by the ubiquity of Internet connected devices we use every day is the manner in which we interact with our devices as different user roles. If you are at work, on the Department of Defense Information Network (DoDIN), chances are you are a general user, with very little ability to alter your system other than through ordinary use. Even as an information security specialist and cyber officer, my current workstation restricts me to the rights and privileges afforded to any other general user. At home, on our laptop, tablet, or phone, however, we mostly operate as privileged users, often with complete control of security, updates, software, and use. On our personal devices we assume personal responsibility for the way we use our devices, the software we install, and the security of our data. As users we must be able to resolve the differences in our user roles and act with diligence across domains and devices.

By CIO/G-6   on 10/15/2015 2:03 PM

by LTG Edward C. Cardon
Commanding General, U.S. Army Cyber Command

Today our Army’s successful execution of Unified Land Operations relies heavily upon cyberspace to deliver combat power to the tactical edge. Cyberspace facilitates unprecedented connectivity and flow of information required for mission command, intelligence, maneuver, fires, protection, and sustainment that helps enable our ground combat units to achieve overmatch against our adversaries. At the same time, reliance on cyberspace has made our Army vulnerable to a wide range of cyber threats.

Contact Us Accessibility/Section 508 Privacy & Security FOIA