Becky Beers. The Air Force colonel has been named acting DAF chief information security officer.
Col. Becky Beers has been named acting chief information security officer at the Department of the Air Force.
//

Col. Becky Beers Named Acting Air Force CISO

2 mins read

Col. Becky Beers has been named acting chief information security officer at the Department of the Air Force.

In a LinkedIn post, Beers said she will serve as acting CISO within the Office of the DAF Chief Information Officer.

Col. Becky Beers Named Acting Air Force CISO

Attend the Potomac Officers Club’s 2026 Air and Space Summit on July 30 to hear sessions exploring how advanced technologies can help maintain an edge in the air and space domains and the strategies leaders are developing to address emerging challenges. Sign up now to save your seat.

Who Is Col. Becky Beers?

Beers is a U.S. Air Force officer with experience spanning cyber operations, enterprise IT and command leadership roles.

According to her LinkedIn profile, she most recently served as deputy director of enterprise IT within the Air Force.

She also served as deputy CISO within the Office of the DAF CIO, where she supported cybersecurity governance, risk management and compliance efforts across the enterprise.

Beers has held assignments across multiple Air Force and joint organizations focused on cyber operations and IT initiatives supporting military missions. Her previous roles include commander of the 61st Air Base Group at Los Angeles Air Force Base; chief of the cyberspace operations division within 16th Air Force A3; and commander of the 75th Intelligence Squadron at Joint Base San Antonio in Texas.

The University of Southern California graduate received her commission through the Air Force Reserve Officer Training Corps. She holds a master’s degree in strategic intelligence from the National Intelligence University.

What IT & Cybersecurity Initiatives Has the DAF CIO Office Launched?

The Office of the DAF CIO has introduced several initiatives to strengthen cybersecurity and modernize its IT environment. These include guidance on software-as-a-service procurement and usage; the “Network of the Future” strategy to strengthen network resilience and ensure network security; and the “cyber cake” framework, a layered cybersecurity model that integrates zero trust, supply chain risk management and cyber resilience practices.