Cybercom Establishes Strategic Concepts to Mitigate Cyber Threats to Natl Security

The U.S. Cyber Command has developed an operational approach to defensive cyber operations and strategic concepts which aim to help address a number of cyber threats to national security.

According to a Department of the Navy report published Wednesday Cybercom also helped establish the Proactive – Defensive Cyberspace Operations Board which works to align the resources of multiple organizations and create focused and prioritized proactive cyber protection team operations designed to strengthen the Department of Defense Information Networks.

The P-DCO Board used an intelligence and threat-based strategy to engage the total force which included cyber forces under services and combatant commanders.

The total force approach led to more than a 100 percent rise in the deployment of Cyber National Mission Force cyber protection team operations that worked to protect DoDIN from malicious threats and adversaries.

Cybercom added it developed the “Operational Guidance 3-2: Defensive Cyberspace Operations” and “Operational Guidance for Sensing” documents which respectively help plan and execute defensive cyberspace operations as well as support situational awareness.

The Cybercom team also launched Operation Gladiator Hunter which synchronizes previous efforts and sets initial benchmarks for strategic prioritization of DCO missions throughout the Defense Department.

You may also be interested in...

David McKeown

David McKeown: DOD Eyes Creation of Zero-Trust-Focused Portfolio Office

David McKeown, the Department of Defense's (DOD) equivalent of a chief information security officer, said DOD is looking to establish a portfolio management office that specializes in zero-trust cybersecurity. The office's creation would help DOD centralize and manage efforts to implement a zero-trust architecture, which strictly imposes requirements before one is able to access the defense network.

Leave a Reply

Your email address will not be published. Required fields are marked *