Defense Information Systems Agency Mission Statement

DISA, a Combat Support Agency, engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.

DISA Principles

  1. Our mission and responsibilities are global
  2. Our enterprise supports the Defense Department and its mission partners
  3. We must support the full spectrum of operations
  4. We operate in contested battle space
  5. We provide integrated, interoperable, assured infrastructure, capabilities, and services that recognize the enterprise begins at the edge
  6. Our goal is to enable and ensure end-to-end service
  7. The DISA enterprise must be always-on

Cyber/Information Technology Trends

  1. DISA provides advanced information technology and immediate communications support to the president, vice president, secretary of defense, military services, and combatant commands. DISA is the key provider and designer of the Global Information Grid (GIG).
  2. DISA works very close with all Information Assurance stakeholders in DoD and the rest of the federal government. They help set and promulgate standards and guides for IA and will continue to do so long into the future. Even with standup of Cyber Command DISA will play a key roll in fielding security into the GIG enterprise.
  3. DISA is consolidating spaces and being moved in a major BRAC effort.


DISA’s workforce is in a bit of turmoil due to the BRAC efforts. Many in the workforce are deciding to seek work elsewhere. This will have an impact on those seeking to do business with DISA. Cyber business with DISA will focus on IT related aspects, like IA and CND. Not CNA or CNE.

Items of Interest

US Military Turns to Virtualization

The DoD and individual services are turning more and more to virtualization to improve the efficiency and flexibility of their IT networks. As the Obama administration is pushing government agencies to consolidate data centers, DISA Is on the front line of virtualization. DISA is currently going application by application to determine what can be virtualized. They use VMware as the virtualization technology of choice. If you wish to sell applications to DISA (or DoD) it is integral that they be VMware compatible.

DISA using BRAC as an IT forcing function

BRAC has made DISA a classified facility and is enabling access to secret and classified networks easier for employees. Additionally, they are implementing RFID to track and manage assets, providing better visibility across the enterprise. DISA is up to 1700 SIPRNet terminals, up significantly from last year.

Military Looking for best ways to protect stored data

DISA Struggles to ensure freedom in cyberspace

The Defense Information Systems Agency has four goals around information assurance. Three of them, dependability, sharing safely and keeping information secret, are easy for them to get their arms around. The fourth, ensuring freedom of action in cyberspace, is not so clear, said Richard Hale, DISA’s chief information assurance executive.

Hale, who spoke at a recent lunch sponsored by AFCEA, said there are trends in the field, including using shared infrastructure and public networks, which are requiring the Defense Department to take a closer look at this issue.

DISA puts military unclassified network behind DMZ – And over the next two years, all unclassified applications across the Defense Department will have to go through this virtual no-man’s land to reach the public Internet.

“If we are under a cyber attack we could potentially crank up the level of security for most of our servers inside and yet leave certain critical e-commerce servers open to the Internet, still with security controls, but we don’t have to cut them off,” said Dave Mihelcic, DISA’s chief technology officer, Thursday at a lunch sponsored by the AFCEA-DC chapter in Arlington, Va. “It’s a collection of services to secure both inbound and outbound traffic, and control what is exposed and what isn’t.”