Information Assurance Menu

.
Skip Search Box

IA News

2015 IAD Top Technology Challenges

  1. Resiliency - Resilient Architecture and Operations
  2. Automated Risk Detection - Monitoring heuristic / Behavioral - Large scale / Real-time / Multi-domain
  3. Automated Risk Mitigation - One respond to risks at network speed, proactive and predictive mitigation
  4. Secure Mobility - Usable and assured; spanning endpoints, links, infrastructure
  5. Secure Operations - Security operations for cloud-hosted user environments (e.g., blue, forensic, incident, . . .)
  6. Threat Mechanisms - Detection and response mechanisms for insider threats (timely, fine-grained)
  7. Secure Government Services - Operate secure government services on public/commercial clouds
  8. Cryptography Foundations - Foundations of future Cryptography
  9. Secure Composite Systems - Engineering, testing, and operating secure composite systems
  10. Leverage Classified Knowledge - Leverage classified knowledge/signatures in a host-based system
  11. Developing and Deploying Advanced Cyber Tradecraft - Developing, deploying, and operating countermeasures for advanced cyber tradecraft

 

Date Posted: Jan 15, 2009 | Last Modified: Feb 28, 2014 | Last Reviewed: Feb 28, 2014

 
bottom