Q: How do Raytheon's cybersecurity developers prevent cyber threats from entering intelligence and space systems?
A: Cybersecurity developers must think like an attacker and develop not only solutions to block the cyber threat from entering intelligence and space systems, but also implement monitoring capabilities and responsive, adaptive architectures to operate through a cyber attack and accomplish the intended mission. This cannot be accomplished with simply the integration of the best available commercial cybersecurity technologies. It requires technologies to close the gap against this severe threat. Raytheon works on the leading edge of cybersecurity and has an understanding of the mission requirements and system architecture of our nation's most critical intelligence and space systems.
Q: Information sharing is often critical to mission success. Can you provide an example of how Raytheon facilitates information sharing, while protecting sensitive data?
A: Many ground systems operate in classified environments and require access to unclassified resources or distribute their resulting mission products to users at multiple levels of security. Raytheon has successfully incorporated new technologies to move security services such as trusted cross-domain and multiple domain information sharing solutions into an embedded infrastructure. Through partnership with intelligence and space system developers to develop a cross-domain solution, we can ensure that data maintains its designated sensitivity level throughout the information sharing and transmission processes.
Q: How else can the intelligence and space community protect itself against cybersecurity threats?
A: Increasingly, we face internal risks to critical networks and systems from trusted employees, whether the incident is malicious or accidental. Raytheon's insider risk management approach involves a continuous process of monitoring, risk assessment, policy definition for mitigating those risks, situation analysis and remediation of problems that occur. Insider threat protection solutions proactively defend against internal threats, constantly monitoring and protecting against breach, fraud, data and intellectual property leaks, theft and sabotage.