Skip to the main content.

CRITICAL INFRASTRUCTURE 
When is it safe and secure?

CRITICAL INFRASTRUCTURE
When is it safe and secure?

Reducing risk

for military avionics

INDUSTRY SECTOR DYNAMICS

On March 2, 2023, the Biden administration released its long-awaited National Cybersecurity Strategy. The release occurs after significant cyber intrusions and ransomware attacks, including SolarWinds, Microsoft Exchange, Colonial Pipeline, and JBS Foods. The Strategy’s vision is to secure the promise of the digital future by making the ecosystem:

  • Defensible, where cyber defense is less complex, affordable for everyone, and more effective
  • Resilient by minimizing the impact of cyber incidents and errors
  • Values-aligned, where values like economic security and prosperity, respect for human rights, trust in democracy, and an equitable and diverse society shape and are reinforced by the digital world
  • While the focus above is US policy, similar policies have either been passed or are progressing through governmental bodies in other parts of the world.

 

 

INDUSTRY SECTOR DYNAMICS

Across the world, budgets continue to rise. In March 2023, the Pentagon released its initial request for Fiscal Year ‘24. Across Europe, budgets continue to rise at a pace that outstrips inflation. Once factors like military aid are added, the result is a budget request approaching $1B which represents the highest military budget since World War II.

Technology is clearly at the heart of this and the word we continue to hear (and view being operationalized) is accelerating the time to deployment as the US and its Allies look to main its advantages over other world powers. Great servants to the military like the BlackHawk Helicopter and F-16 fighter jet need to be upgraded with programs that include Future Attack Reconnaissance Aircraft (FARA), Future Long Range Assault Aircraft (FLRAA), and F-35 Joint Strike Fighter. 

Much has been written about the vision of the connected battlefield. The implementation of this at a rapid pace requires a massive change in product creation and deployment.
  • Development must embrace cloud development and harnessing of technologies such as machine learning, digital twins and virtual targets
  • Secure System Connectivity becomes critical as data is gathered and shared between a diverse set of endpoints (soldiers, UAVs, planes, satellites) and insights made in real time
  • Systems must build in adaptability to add functionality once deployed to extend the useful life of the platforms and ensure our residents, their information and their systems are protected to the fullest extent

 

 

THE MOST DEVASTATING CYBER-ATTACK IN HISTORY

0

seconds was all it took for NotPetya to fully infect one system

$0

estimated total damages as a result of this same attack

security

See this article for reference.