DISA has crucial role to play in budget drawdown, Lynn says

Effective streamlining, budget wrangling will depend on effective IT strategies

As the Defense Department faces an ominous budget battle and rapidly evolving wartime requirements, IT is taking on a growing, prominent role in defense transformation, DOD Deputy Secretary William Lynn said Aug. 16.

That role is increasingly being filled by the Defense Information Systems Agency, which provides an IT and communications infrastructure that is expanding in capacity and importance.

“Changes in information technologies have revolutionized how our militaries organize, train and fight. The information backbone DISA enables our most important military capabilities,” Lynn told the audience at the DISA Customer and Industry Forum in Baltimore.

"From ISR and global strike to navigation and command and control, our defense community relies on the networks you are responsible for to keep America safe," he said. "You provide the IT foundation for the most effective fighting force in the world. And you do so at a time where technology is not stagnant, but rather in a constant and rapid state of evolution.”

That focus on IT, much of which hinges on DISA-led strategies, will only continue to grow in significance as Washington’s budget clamp-down exacts deep cuts in defense spending, Lynn noted.

“For the past decade, we have lived in a world where we could meet new security challenges with increased resources. Those days are over. We are going to have to make hard choices – our challenge is to accommodate changing fiscal circumstances without undercutting our military effectiveness,” he said. “IT has a unique role in contributing to the budget drawdown. Given the potential savings generated by IT efficiencies, IT is also helping us manage our fiscal situation.”

However, DOD’s increasing dependence on IT networks and capabilities, coupled with the military’s still-young presence in the cyber realm, were among the chief factors in the recent release of the department’s Defense Strategy for Operating in Cyberspace, he said. He pointed out that defense IT and the cyber threat are intertwined.

“The reality is that our reliance on IT presents a significant vulnerability,” said Lynn. “This kind of cyber exploitation does not have the dramatic impact of a conventional military attack. But over the long term it has a deeply corrosive effect. It blunts our edge in military technology.”

According to Lynn, DISA’s unique posture and resources are critical to national defense against the cyber threat.

“DISA plays a crucial role in our effort to address the cyber threat, and a key role in each part of the strategy,” Lynn said. “Nowhere is this role more important that DISA’s support of [U.S. Cyber Command]. Together with [the Cyber Command], DISA has operational control over our defense networks. Being co-located alongside CyberCom [at Ft. Meade, Md.] will strengthen each organization and reinforce our cybersecurity efforts.”

In his comments, Lynn also stressed the importance of the private sector in establishing cybersecurity policy and securing national interests in cyberspace. He highlighted progress being made in the Defense Industrial Base Cyber Pilot program, a public-private partnership effort to share threat intelligence that was rolled out with the DOD cyber strategy in July.

Lynn said that his office is in the middle of an initial 90-day pilot initiative that has already stopped hundreds of intrusions, and an expansion to include more agencies and organizations is under consideration.

Reader Comments

Mon, Aug 22, 2011

Long-haul comms, and probably raised-floor areas, should be common-serviced DoD or even Fed wide. That would save some bucks. But everyone wants their own small pond to be the big fish in, and absolutely has to reinvent the wheel.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts

  • How Do You Support the Project Lifecycle?

    How do best-in-class project-based companies create and actively mature successful organizations? They find the right mix of people, processes and tools that enable them to effectively manage the project lifecycle. REGISTER for this webinar to hear how properly managing the cycle of capture, bid, accounting, execution, IPM and analysis will allow you to better manage your programs to stay on scope, schedule and budget. Learn More!

  • Sequestration, LPTA and the Top 100

    Join Washington Technology’s Editor-in-Chief Nick Wakeman as he analyzes the annual Top 100 list and reveals critical insights into how market trends have impacted its composition. You'll learn what movements of individual companies means and how the market overall is being impacted by the current budget environment, how the Top 100 rankings reflect the major trends in the market today and how the biggest companies in the market are adapting to today’s competitive environment. Learn More!