SAP NS2’s Mark Testoni: US Should Manage Cyberspace Like Battlefield

Mark Testoni
Mark Testoni

Mark Testoni, president and CEO of SAP National Security Services, has observed espionage methods being used in cyberspace are somewhat similar to tactics that spies use in the physical world, Defense Systems reported Thursday.

He told Defense Systems in an interview that many hacking groups target the private sector and he believes the U.S. should approach cyber domain in the same way as a physical battlefield.

“We have to go on the attack and punish those that are trying to get on the inside.”

“Whether you’re a state actor, you’re some sort of a non-state actor affiliation… if you come after us, you’re going to pay a price – much like if you were to attack our military overseas or our homeland.”

Testoni, an inductee into Executive Mosaic’s Wash100 list for 2015, also noted government and industry collaboration as key to address the U.S.’ cybersecurity issues.

You may also be interested in...


Army Taps Charles River Analytics for Trauma Care Algorithm

Charles River Analytics has received almost $1 million in funds from the U.S. Army to develop an agent-based algorithm that could provide teams of robotic and human caregivers with direction and assistance in treating traumatic injuries.

U.S. Army

Army Names Six Companies to Bid for Orders Under $76M Design-Build Contract

The U.S. Army has selected six companies to design, build, sustain, modernize and restore military and civilian facilities under a $76M multiple-award contract. The construction companies will compete for task orders under the firm-fixed-price contract and work to complete duties by Jan. 21, 2026, the Department of Defense said Friday.


CISA Seeks Market Info on Incident Mgmt Tracking System

The Cybersecurity and Infrastructure Security Agency wants to identify market sources of a system that would help operators track incident management activities.

CISA said Friday in a SAM notice its threat hunting unit needs an incident management work tracking system with an encryption level of at least 140-2 in an effort to enhance the security of information technology enterprise of the federal government.