A Pentagon official says some 24,000 Department of Defense files were “lost” in March in a cyberattack on a military contractor. It may be the most damaging breach the U.S. military has seen. Deputy Defense Secretary William J. Lynn III didn’t disclose what kind of files were stolen or who took them at the Pentagon’s cyber strategy Thursday. The Department of Defense relies on 15,000 networks and 7 million computing devices around the world for its military, intelligence and business operations.
“The department and the nation have vulnerabilities in cyberspace,” a Defense report states. “Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity – the security of the technologies that we use each day.”
Department of Defense’s five strategies for operating in cyberspace:
- Treat cyberspace as an operational domain to organize, train, and equip so that DoD can take full advantage of cyberspace’s potential.
- Employ new defense operating concepts to protect DoD networks and systems.
- Partner with other U.S. government departments and agencies and the private sector to enable a whole-of-government cybersecurity strategy.
- Build robust relationships with U.S. allies and international partners to strengthen collective cybersecurity.
- Leverage the nation’s ingenuity through an exceptional cyber workforce and rapid technological innovation.