1 / 11

“Transforming Cyber While at War… We Can’t Afford not to”

“Transforming Cyber While at War… We Can’t Afford not to”. Agenda… Sitrep. Mission Organization What We’re Doing Assessment—Strategic Plan. Cyber is a Game Changer. Mission.

loc
Download Presentation

“Transforming Cyber While at War… We Can’t Afford not to”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “Transforming Cyber While at War… We Can’t Afford not to”

  2. Agenda…Sitrep • Mission • Organization • What We’re Doing • Assessment—Strategic Plan Cyber is a Game Changer

  3. Mission ARCYBER/2nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries Cyberspace Operations = Build + Operate + Defend + Exploit + Attack • Serve as Cyber Proponent • Coordinate IO UNCLASSIFIED

  4. Command & Control…Evolving STRATCOM CYBERCOM Army ARCYBER/ 2nd Army PROPONENT ACOIC NETCOM/ 9th SC INSCOM 1st IO CMD (L) ARNG USAR TIOG TIOG VA DPU TIOG TIOG ARIOC CYBER BDE OPCON ADCON OPCON ASSIGNED TRO UNCLASSIFIED/FOUO

  5. Current Focus • Current Operations • Operational Planning Efforts • POM and TAA…Cyber Requirements • Cyber Assessment—Strategic Plan • Increase Capacity and Capability Getting to the Future--Full Spectrum

  6. Assessment Conclusions . . Baker’s Dozen • The Threat is Real, Active & Expanding • Cyberspace Domain is a Paradigm Shift…& Inherently Joint • Defense not Defendable & Lacks Full Spectrum (Cyber Pilot) • The Enterprise--Necessary but Not Sufficient (Enterprise Email, Id Management, Active Directory, Data Centers…) • Assess Operational Impact and Risk • Authorities: Can Operate, but change required • Global C2 Framework Required

  7. Assessment Conclusions . . Baker’s Dozen • Cyber Doctrine and Concepts are insufficient • Cyber with ISR Integration must touch the Tactical Edge • Integrate with related cyber capabilities (IO, EW, EMSO, Space) • The Cyber Force Requires a holistic review • Drive & Leverage R&D, Define Requirements, & Adjust Procurement • Requirements to Resources Mismatch—Synch with Priorities

  8. TOTAL FORCE INTEGRATION Strategy Map PEOPLE AND THE FUTURE FORCE VISION: Professional team of elite trusted , disciplined warriors defending Army networks, providing dominant full-spectrum cyber, enabling Mission Command and ensuring a decisive global advantage… SECOND TO NONE! INTEGRATING FUNCTIONS LOE 1: Operationalize Cyber MAIN EFFORT LOE 2: Proponency and the Future Force STRATEGIC COMMS LOE 3: Build a Fully Functional Command TIMELINE

  9. Cyber Warrior Force Enable Mission Command We need a Trained and Ready Full Spectrum (Build – Operate – Defend – Exploit – Attack) Cyber Force • A force capable of: • Achieving effects synchronized with other domain operations • Developing the Cyber Situation: Intelligence (I&W, IPB, Targeting) and Friendly • Maintaining Freedom to Operate--Enable, Disable, Modify, Model, Build, Extend, Manage Networks Full- Spectrum

  10. Getting to the Future Keys to Success— “The Network is Central to Everything...” • Operationalize CYBER • CYBER Warfighting Domain—Integrate, Impact, Risk • Know Ourselves, Enemy, Cyber Terrain…Situational Awareness • Execute Full Spectrum Cyber • Dynamic and Proactive Defense • If Required, Defeat Attacks • Responsive, Streamlined Command and Control • Agile, Responsive Cyber Proponency • Develop and Create the 21st Century Cyber Warrior Nest and Complement 5 Pillars of DOD Cyber Defense Strategy

  11. Who We Are…Cyber Warriors Cyber Warriors • Professional Team • Trusted • Disciplined • Precise • Confident • Fit • Courageous • Values Based • Warrior Ethos Cyber Leaders • Professional and Trusted • Caring and Tough • Build Teams • Instill Confidence • Make Tough Decisions • Inspire Courage • Serve Soldiers & Families CYBER WARRIORS LIVE THEIR MOTTO

More Related