jp3_12r
jp3_12r
jp3_12r
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter I<br />
c. Private Industry. Many of DOD’s critical functions and operations rely on<br />
commercial assets, including Internet service providers and global supply chains, over which<br />
DOD has no direct authority to mitigate risk effectively. Therefore, DOD will work with the<br />
Department of Homeland Security (DHS), other interagency partners, and the private sector<br />
to improve cybersecurity. One example of such cooperation is the 2010 memorandum of<br />
agreement signed by DOD and DHS to align and enhance cybersecurity collaboration. The<br />
memorandum formalizes joint participation in program planning and improves a shared<br />
understanding of cybersecurity. Under this memorandum USCYBERCOM and DHS<br />
exchange liaison personnel. DOD supports DHS in leading interagency efforts to identify<br />
and mitigate cyberspace vulnerabilities in the nation’s critical infrastructure. DOD has the<br />
lead for the defense industrial base (DIB) sector, but will continue to support the<br />
development of whole-of-government approaches for managing risks associated with the<br />
globalization of the ICT sector. The global technology supply chain affects mission critical<br />
aspects of the DOD enterprise and IT risks must be mitigated through strategic public-private<br />
sector cooperation. DOD is partnering with the DIB to increase the safeguarding of DOD<br />
program information residing or transiting DIB unclassified networks. To increase<br />
protection of DIB networks, DOD launched the DIB Cybersecurity and Information<br />
Assurance Program. The DOD Cyber Crime Center serves as DOD’s operational focal point<br />
for this voluntary cyberspace information sharing and incident reporting program.<br />
d. As the JFC integrates CO capabilities into joint operations, careful consideration<br />
must be given to some of the unique aspects of cyberspace, as well as its commonalities and<br />
synergies with operations in the physical domains: the relationship with IO; legal, political,<br />
and technical drivers and constraints; and the role of non-DOD actors in US CO. The<br />
employment of cyberspace capabilities and their effective integration with other military<br />
operations are discussed in detail in the next chapter.<br />
I-8 JP 3-12