In this post, our guest blogger, COL Greg Conti, Director of the Army Cyber
Institute discusses the evolving role of the user in cybersecurity. One of
the challenges created by the ubiquity of Internet connected devices we use
every day is the manner in which we interact with our devices as different
user roles. If you are at work, on the Department of Defense Information
Network (DoDIN), chances are you are a general user, with very little
ability to alter your system other than through ordinary use. Even as an
information security specialist and cyber officer, my current workstation
restricts me to the rights and privileges afforded to any other general
user.