The Air Force announced Friday it will locate its cybersecurity command at Lackland Air Force Base in San Antonio, Texas, pending an environmental impact study that should be completed by summer.
In opting for Lackland, the Air Force said officials considered a number of factors including proximity to other cyber operational missions, access to scientific and technical expertise and communications and bandwidth capabilities.
The headquarters reportedly will employ 400, and include the commander's staff and an operations center.
The Air Force announced in October the creation the cybersecurity command and in January identified five locations to be considered for the command headquarters in addition to Lackland: Barksdale AFB, La.; Langley AFB, Va.; Offutt AFB, Neb.; Peterson AFB, Colo.; and Scott AFB, Ill.
Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
From heightened risks to increased regulations, senior leaders at all levels are pressured to
improve their organizations' risk management capabilities. But no one is showing them how -
until now.
Learn the fundamentals of developing a risk management program from the man who wrote the book
on the topic: Ron Ross, computer scientist for the National Institute of Standards and
Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37
- the bible of risk assessment and management - will share his unique insights on how to:
Understand the current cyber threats to all public and private sector organizations;
Develop a multi-tiered risk management approach built upon governance, processes and
information systems;
Implement NIST's risk management framework, from defining risks to selecting, implementing
and monitoring information security controls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.