ARCYBER’s Stephen Fogarty on Key Factors to Command-Centric Network Ops

ARCYBER’s Stephen Fogarty on Key Factors to Command-Centric Network Ops
Lt. Gen. Stephen Fogarty US Army Cyber Command

Lt. Gen. Stephen Fogarty, commander of the U.S. Army Cyber Command (ARCYBER), has said that data security and effective management are key contributors to the efficiency of a command-centric network, AFCEA reported Tuesday.

Fogarty said in a prerecorded address for an AFCEA event that successful operations against peer and near-peer adversaries largely depend on leaders’ “timely access to reliable data that can be shared whenever and wherever needed.”

He added that emerging concepts such as machine learning and artificial intelligence will help quicken the pace of decision-making while hybrid cloud-based systems can support missions by optimizing the storage and security of actionable data.

“In a very real sense, in all-domain operations, the network is another weapon the commander’s arsenal, and data will be the ammunition for the commander,” said Fogarty. “Our commanders must be able to see the adversary and see themselves in real-time in cyberspace with the same level of confidence that they have in the land domain."

According to Fogarty, effective network infrastructure requires a balance between the need for usable data and risk mitigation through zero-trust security concepts.

Speaking on the Army’s efforts to establish command-centric network capabilities, Fogarty said the service’s Enterprise Information Technology as a Service (EITaaS) pilot program benefits from the “unique opportunity” of working with companies such as Microsoft, AT&T and Verizon.

You may also be interested in...

David McKeown

David McKeown: DOD Eyes Creation of Zero-Trust-Focused Portfolio Office

David McKeown, the Department of Defense's (DOD) equivalent of a chief information security officer, said DOD is looking to establish a portfolio management office that specializes in zero-trust cybersecurity. The office's creation would help DOD centralize and manage efforts to implement a zero-trust architecture, which strictly imposes requirements before one is able to access the defense network.