[Busec] FW: Agency Update on DoD Cybersecurity "Hack the Pentagon" Pilot Program

Bestavros, Azer best at bu.edu
Mon Mar 7 14:07:15 EST 2016



From: Burlij, Emily
Sent: Monday, March 7, 2016 1:51 PM
To: Klapperich, Catherine M <catherin at bu.edu>; Sclaroff, Stan <sclaroff at bu.edu>; Crovella, Mark E <crovella at bu.edu>; Bestavros, Azer <best at bu.edu>; Grosser, Linda <lgrosser at bu.edu>; Chitkushev, L. T. <ltc at bu.edu>
Cc: Grodsky, Jennifer <grodsky at bu.edu>; Waters, Gloria S <gwaters at bu.edu>; Tokarz, Kat <ktokarz at bu.edu>
Subject: Agency Update on DoD Cybersecurity "Hack the Pentagon" Pilot Program

Good afternoon all-

Some of your faculty or students might be interested in participating in this DOD hackathon. We'll be sure to send around more details as they become available.

Thanks,
Emily


______________________________________________
Emily Alves Burlij
Boston University Federal Relations
701 8th Street, NW, Suite 850, Washington, DC 20001
(202) 393-7272
http://www.bu.edu/federal




From: "Naomi M. Webber; Ph.D." <Naomi at lewis-burke.com<mailto:Naomi at lewis-burke.com>>
Date: Friday, March 4, 2016 at 9:02 AM
To: Jennifer Grodsky <grodsky at bu.edu<mailto:grodsky at bu.edu>>
Cc: Emily Burlij <eaburlij at bu.edu<mailto:eaburlij at bu.edu>>, "Ruch, Bill" <bill at lewis-burke.com<mailto:bill at lewis-burke.com>>, "Trimble, Paula" <paula at lewis-burke.com<mailto:paula at lewis-burke.com>>
Subject: Agency Update on DoD Cybersecurity "Hack the Pentagon" Pilot Program

________________________________

Agency Update: DoD Unveils "Hack the Pentagon" Cybersecurity Initiative to Invite Hackers to Test Its Own Vulnerabilities

Lewis-Burke Associates LLC - March 3, 2016

The Department of Defense (DoD) announced yesterday the federal government's first cyber "bug bounty" program to invite vetted hackers to challenge the Department's applications, web sites, and networks to expose vulnerabilities.  The pilot program is anticipated to launch in April 2016.

According to the DoD, the cyber bug bounty program is modeled after similar competitions conducted by some of the nation's biggest companies to improve the security and delivery of networks, products, and digital services.  The program, led by the Defense Digital Service (DDS) and launched by Secretary of Defense Ashton Carter in November 2015, will use commercial sector crowdsourcing to allow qualified participants to conduct vulnerability identification and analysis on the DoD's public web pages.  Participants will be required to register and submit to a background check, and once vetted will participate in a controlled, limited duration program that will allow them to identify vulnerabilities on a predetermined DoD system.  Participants may be eligible for monetary awards and other recognition.

The "Hack the Pentagon" program is consistent with both the White House Cybersecurity National Action Plan unveiled February 9, 2016, and remarks made by Defense Secretary Carter on March 1, 2016, at the Commonwealth Club in San Francisco, CA.  Carter said defending DoD networks and weapon systems is, "job one for the Department of Defense in cyberspace."  He noted the DoD plans to invest $35 billion over the next five years to defend DoD networks, to help other agencies defend against cyberattacks from abroad, and to provide offensive cyber options that can be used in conflicts, such as countering the Islamic State (ISIL) in Syria and Iraq.

Lewis-Burke will pass along more details on requirements for participation and other ground rules in the next few weeks as DoD makes them available.

Sources and Additional Information:

  *   The DoD press release is available at http://www.defense.gov/News-Article-View/Article/684616/dod-invites-vetted-specialists-to-hack-the-pentagon.
  *   Statement by Pentagon Press Secretary Peter Cook is available at http://www.defense.gov/News/News-Releases/News-Release-View/Article/684106/statement-by-pentagon-press-secretary-peter-cook-on-dods-hack-the-pentagon-cybe.
  *   DoD's Cyber Strategy is available at http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy.
  *   Fact Sheet on the Cybersecurity National Action Plan is available at https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.


Naomi M. Webber
Lewis-Burke Associates, LLC
1341 G Street NW
Eighth Floor
Washington, DC 20005
202-289-7475
202-289-7454 Fax
Naomi at lewis-burke.com<mailto:Naomi at lewis-burke.com>

Lewis-Burke is on the Move!  As of April 1, 2016 our new address is:
440 1st street NW Suite 700
Washington, DC 20001
Our phone number remains: (202) 289-7475<javascript:void(0)>




________________________________
Disclaimer: This message is intended only for the named recipient. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.
________________________________
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cs-mailman.bu.edu/pipermail/busec/attachments/20160307/b21bc636/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Agency Update on DoD Hack the Pentagon Cybersecurity Initiative.pdf
Type: application/pdf
Size: 511616 bytes
Desc: Agency Update on DoD Hack the Pentagon Cybersecurity Initiative.pdf
URL: <http://cs-mailman.bu.edu/pipermail/busec/attachments/20160307/b21bc636/attachment-0001.pdf>


More information about the Busec mailing list