CACI Announces Release Of Cybersecurity Report

Report publishes recommendations from the most recent symposium in the new Asymmetric Threats series on cybersecurity

August 5, 2010

4 Min Read

PRESS RELEASE

Arlington, VA, August 2, 2010 - CACI International Inc (NYSE:CACI) and the U. S. Naval Institute (USNI) today announced the release of a report on Cyber Threats to National Security: Countering Challenges to the Global Supply Chain. The report publishes recommendations from the most recent symposium in the new Asymmetric Threats series on cybersecurity. Copies of the report may be downloaded from CACI's website at www.caci.com or from the dedicated Asymmetric Threat website at asymmetricthreat.net.

Held on March 2, 2010 at Ft. Myer, Virginia, the Cyber Threats symposium featured keynote speakers that included former Secretary of Homeland Security Tom Ridge, former Deputy Secretary of Defense Gordon R. England, and former Virginia Governor James S. Gilmore, III. Participants included thought leaders and key decision-makers from across government and industry.

The report notes how cybersecurity has increasingly become a national security priority over the past decade. Cyber threats may be perpetrated with little cost and few resources. Cyber attacks are typically anonymous, launched from any of billions of sources worldwide. Impacts may be immediate and obvious, or elude recognition for years.

U.S. supply chains have historically been protected from threat because they were generally internal to North America, the report adds. This is no longer true in the cyber age. The vast majority of U.S. supply chains rely on information technologies that can be compromised at any time. Global partners and worldwide connectivity increase the risk. The responsibility to protect U.S. cyber assets must be shared among the government, the private sector, and every private citizen.

According to CACI President and CEO Paul Cofoni, "As U.S. troops engage in armed conflict on the ground, adversaries of all kinds are also moving to the cyber battlefield. At CACI, while we continue our support for services and solutions that enable and protect the warfighter, we are also committed to developing the thought leadership and cyber capabilities our nation needs to counter cyber threats from any party that would do us harm."

CACI Chairman of the Board Dr. J.P. (Jack) London, who gave the welcoming remarks at the Cyber Threats symposium, said, "The CACI-USNI report, Cyber Threats to National Security: Countering Challenges to the Global Supply Chain, captures the thinking of today's leaders and experts in national security. It recommends strongly that the U.S. aggressively pursue supply chain security as part of a comprehensive cybersecurity policy. The participants from the first Cyber Threats symposium, and from all the Asymmetric Threat symposia, are committed to promoting a national dialogue that will help our government respond to and preempt cyber attacks, and deal with all asymmetric threats."

USNI CEO Major General Tom Wilkerson (Ret) added, "The recent WikiLeaks controversy should serve as a flare that warns us of how vulnerable we are to cyber threats. When a low-level analyst can easily access thousands of classified documents and instantly make them available to an international audience, it shows that our security is disturbingly inadequate. We must be diligent in identifying where and how we are susceptible to all types of cyber attacks and prevent more intrusions."

About the Symposia

The Asymmetric Threats symposia were begun to provide a forum for thought leadership on national security. The first Asymmetric Threats series focused on threats to U.S. and global security. Symposium One, co-sponsored by CACI and the National Defense University and held on May 8, 2008 at the National Defense University in Washington, D.C., defined and characterized the asymmetrical threat problem. Symposium Two, co-sponsored by CACI and USNI and held at Ft. Myer, Virginia on October 21, 2008, addressed the efficacy of soft power instruments such as diplomacy and economic aid. Symposium Three, co-sponsored by CACI and USNI and held at Ft. Myer on March 24, 2009, concluded the series by addressing how soft power can be combined with military hard power to form "smart power" tools for defeating asymmetric threats. The new Asymmetric Threats series now focuses on cybersecurity, and the second in a projected series of Cyber Threats symposia is planned for the spring of 2011.

About CACI

CACI provides professional services and IT solutions needed to prevail in the defense, intelligence, homeland security, and federal civilian government arenas. We deliver enterprise IT and network services; data, information, and knowledge management services; business system solutions; logistics and material readiness; C4ISR integration services; cyber solutions; integrated security and intelligence solutions; and program management and SETA support services. CACI services and solutions help our federal clients provide for national security, improve communications and collaboration, secure the integrity of information systems and networks, enhance data collection and analysis, and increase efficiency and mission effectiveness. CACI is a member of the Fortune 1000 Largest Companies and the Russell 2000 index. CACI provides dynamic careers for approximately 13,100 employees working in over 120 offices in the U.S. and Europe. Visit CACI on the web at www.caci.com and www.asymmetricthreat.net.

About USNI

Since 1873, the non-profit U. S. Naval Institute has promoted independent ideas in its respected journals Proceedings and Naval History, and in the books of the Naval Institute Press. Its publications, conferences and online content establish USNI as the Nation's premier independent forum for critical thinking on seapower and issues critical to national defense. For more information, visit www.usni.org.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights