tag:blogger.com,1999:blog-3758747359382999584.post530181214086614877..comments2024-01-01T11:53:37.594-05:00Comments on I Like The Cut Of His Jib !!: Cyber Warriors All (Some, Any, None)Mike Lamberthttp://www.blogger.com/profile/04268185984165305315noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-3758747359382999584.post-22871692033378145812009-09-08T12:33:45.919-04:002009-09-08T12:33:45.919-04:00"Cyber Warriors All"
I disagree complet..."Cyber Warriors All"<br /><br />I disagree completely. The IT who ensures the network is up and operating is no more a "Cyber Warrior" than is the Postal Clerk that keeps our mail coming. Ok, bad analogy, but it makes the point. <br /><br />"Cyber Warriors" are those individuals who achieve a warfare commanders intent in and/or through cyberspace, not your average user who can barely type, create a strong password, spell CNO, etc. <br /><br />Those average users are operating in cyberspace, but they are not a warrior in it...they are bystanders. Those who are "warriors" are focused on seizing the initiative in/through cyberspace for very specific purposes, akin to maneuver warfare.<br /><br />Just my 2 cents, but we need to stop overselling "we are all cyberwarriors" because if we were, our networks would be much more secure and our adversaries would be much more worried about theirs!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3758747359382999584.post-52648289423041842772009-09-05T09:13:50.567-04:002009-09-05T09:13:50.567-04:00While it may be hard to disagree with the comments...While it may be hard to disagree with the comments as posted, the question I have for the Navy CIO is, "What are you doing to overcome these challenges?" The Navy can't keep preaching work-life balance, tech savvy jobs, and a desire to leverage "web 2.0" without IT policies that help enable them. The quickest reaction to a newly discovered security vulnerability is a policy to ban or limit the tool that created the vulnerability. Doing so may be a necessary interim step, but the Navy appears to be failing at implementing a long term solution that addresses the vulnerability and restores the capability. At the end of the day, the Navy's IT policies affect recruiting, retention and operating efficiency. We can't continue to preach don't without figuring out how we can do.Anonymousnoreply@blogger.com