b'States Army. Its been a positive opportunity for recruiting that also enhances the way we look at security.Little:When it comes to cloud and edge computing, the DOD learned quite a while back that you dont build the systems and then secure them. That doesnt work well. From the start, security has to be paramount in all the programs, in order to secure the 5G systems as they come into DOD.It plays a huge role across all of the tranches and the operate-through programs. This means looking at how we can take programs and put them in military applications, whereas the tranches are building capabilities that will transition into military applications. When we say operate through, theyve got to operate securely and reliably. As we coined the phrase here, secure and trusted 5G. The multi-edge computing capability of 5G takes software and puts portions of it in the edge. Other portions are in the cloud running other applications. It brings significantly moreFrom the start, security has capability, but its also going to bring orders of magnitude in terms of volumes of datato be paramount in all the and low latency. Instead of securing an IoTprograms, in order to secure [internet of things] device, Ive got to secure an IoT device that can go into operations. the 5G systems as they come Duchak: Under normal conditions, DLA hasinto DOD. about 7,000 external connections with edge devices. With mass telework related to the- Jody LittleCOVID-19 pandemic, those connections dramatically increased to more than 25,000. A major part of our solution is the use of a Virtual Private Network, which minimizes the risk associated with end-point devices as vulnerable vectors for attack. We can ensure the VPN infrastructure is secure, and at the same time continue to make upgrades to our systems to reduce latency and provide the best user experience possible. For devices that need to be connected directly, we continue to harden them per a secure baseline and ensure they are patched, encrypted, and secured with multi-factor authentication.Another avenue for managing and securing our edge devices is to use the Defense Information Systems Agencys solution: a government-owned, secure credentialing process for mobile devices which provides over-the-air derived credentials to more than 100,000 Department of Defense-issued commercial mobile devices. DISAs purebred technology provides us with the technology needed to secure our mobile devices while continuing to access the DLA network.Securing the Nations Network|Page 7'