Original Broadcast December 3, 2024
Presented by Carahsoft
Innovation in Government, live from the DoDIIS Worldwide Conference, focuses on modernizing defense strategies by integrating DevSecOps practices, AI-driven cybersecurity, and open data initiatives to enhance operational efficiency and resilience. Key topics include accelerating secure software development for the Department of Defense (DoD), addressing sophisticated cyber threats from both state and non-state actors, and leveraging AI for proactive defense. The program also touches on fostering partnerships between government and industry, improving data accessibility while ensuring security, and enabling real-time insights through technological innovation. These efforts aim to equip defense agencies with the tools, strategies, and collaboration needed to navigate evolving threats and maintain mission readiness.
Transforming Diplomacy Through IT Modernization and Cloud Innovation
Jimmy Hall Jr., DOS Intelligence CIO at the U.S. Department of State, unveils his ambitious plans to modernize IT infrastructure to support the department's far-reaching diplomatic mission. At the core of his strategy is a hybrid cloud approach, designed to enhance workflow accessibility, bolster global coverage, and deliver secure, efficient solutions for diplomats in 270 locations across 190 countries. Hall’s military background influences his disciplined, phased approach to modernization, which incorporates iterative improvements and is guided by rigorous metrics. He emphasizes the pivotal role of automation and AI in boosting cybersecurity and streamlining intelligence operations, all while preserving critical human oversight. Strategic industry partnerships and alignment with the department’s broader modernization goals are key pillars of his efforts. Hall’s vision is to create a resilient, innovative IT environment that empowers policymakers, intelligence analysts, and diplomats to navigate an increasingly complex global landscape with confidence and efficiency.
Modernizing Defense Through DevSecOps & AI Integration
Katie Bowen, General Manager of Public Sector and Defense at Synack, emphasizes how DevSecOps practices are driving modernization within the Department of Defense (DoD) by harmonizing speed with security. Bowen highlights the importance of metrics like cycle time and mean time to recovery (MTTR), which help organizations gauge and improve software quality, especially in high-stakes defense environments where software directly impacts warfighters. Bowen points to the success of DoD software factories, which adopt these metrics and foster innovation by challenging traditional methods, ultimately making quality software delivery faster and more secure. Additionally, Bowen addresses the complexities of AI integration, advocating for a cautious approach with strong guardrails to manage potential risks like security vulnerabilities and biases in AI models. Rather than focusing solely on AI capabilities, Bowen notes, defense organizations should prioritize secure, ethical implementation that aligns with mission goals.
Key Takeaways:
- Successful modernization efforts hinge on tracking core metrics like cycle time and MTTR to ensure alignment with mission goals, software quality, and operational efficiency.
- DoD’s software factories are reshaping organizational culture by promoting collaboration and pushing innovation beyond traditional boundaries, creating a more agile approach to software development.
- Effective AI integration requires careful planning to address security issues in peripheral applications and mitigate biases, ensuring that implementations are secure, ethical, and scalable.
Addressing the Growing Cyber Threat Landscape: Evolving DoD Defense Strategies
Dean Hullings, Global Defense Solutions Strategist at Forescout Technologies, discusses the increasing threats to national security, which extend beyond state actors to include hacktivists and other non-state actors. These threats are becoming more sophisticated and are increasingly targeting critical infrastructure such as hospitals, power grids, and operational technology. Hullings highlights the need for the DoD to evolve its defense posture to not only address state-sponsored cyberattacks but also combat the rise of hacktivists. This shift requires the DoD to expand its focus from traditional IT systems to the broader operational technology landscape, working to safeguard essential public services and private sector operations. He emphasizes the importance of collaboration between government entities and private organizations, including local and state-level responses, to enhance national cybersecurity resilience.
Key Takeaways:
- Hacktivists, who may be backed by state actors or act independently, are increasingly sophisticated and pose a significant threat to national security, particularly to critical infrastructure.
- The DoD must adjust its cybersecurity strategies to address both nation-state actors and the growing risk posed by non-state, ad hoc cybercriminals, including hacktivists.
- The DoD is expanding its focus from information technology systems to operational technology, aiming for a more holistic defense strategy that protects not only government systems but also critical infrastructure serving the public.
Strategic Data Leadership in the Intelligence Community
Lori Wade, Chief Data Officer (CDO) at the Office of the Director of National Intelligence, highlights the critical role of CDOs in treating data as a strategic asset within the intelligence community. She emphasized that CDOs should focus on both technical and non-technical aspects of data management, including security, lifecycle governance, compliance, and maximizing data value. Wade argued that CDOs should not be placed under CIOs, as their role extends beyond IT functions to ensure informed decision-making throughout the data lifecycle. This is particularly important in avoiding costly mistakes, such as collecting data that cannot be effectively accessed or utilized. Wade also noted that emerging technologies like AI and quantum computing rely on robust data strategies, underscoring the need for CDOs to be part of the organization’s digital leadership team. She emphasized the importance of strong partnerships with CIOs, CISOs, and mission leaders to align data practices with broader organizational goals, including zero-trust architectures and mission outcomes. Through these collaborations, CDOs help create a cohesive and secure data ecosystem that supports technological and mission success across the intelligence community.
Key Takeaways
- CDOs are essential for strategic data management, they provide the expertise necessary to oversee the entire data lifecycle, ensuring that data is secure, accessible, and structured to maximize its usefulness across the organization.
- Building strong partnerships with CIOs, CISOs, and AI professionals helps create interconnected data frameworks that enable emerging technologies and align with organizational strategies.
- Just as financial resources are tracked and managed throughout their lifecycle, data requires specialized management to ensure compliance, maximize value, and support organizational goals.
AI's Role in Accelerating Cyber Defense for Federal Agencies
Joel Krooswyk, Federal CTO at GitLab, discusses the evolving cybersecurity landscape and the increasing urgency for federal agencies to respond to attacks faster than ever. The rapid development of malicious AI has significantly reduced the time between vulnerability discovery and exploitation, making traditional 30-day patch cycles inadequate. Krooswyk points to the promise of AI-driven, autonomous security systems that can proactively detect and mitigate threats in real time. These advancements are expected to shift the security posture of agencies such as the Department of Defense (DoD) from reactive to predictive, enabling them to anticipate threats and respond with speed and precision. Krooswyk anticipates that, over the next year, breakthroughs in AI and machine learning will bridge critical gaps in proactive defense, ushering in a new era in cybersecurity.
Key Takeaways
-
AI is accelerating the speed of cyber attacks, requiring faster vulnerability management and response times for federal agencies.
-
Emerging AI tools will soon allow real-time, autonomous threat detection and response, reducing human intervention and enabling proactive defense.
-
The next generation of AI in cybersecurity aims to transition from reactive to predictive capabilities, allowing for anticipatory defenses in federal and defense sectors.
Building an Open Data Culture for Defense Flexibility and Resilience
Jon Veal, GVP of Defense & Intel at Cloudera, discusses the growing commitment among defense agencies to create an open data culture that enhances mission readiness and supports the warfighter. This approach is focused on enabling internal data sharing within agencies to ensure that data is usable and accessible for various purposes while maintaining stringent security and governance. Veal emphasizes that over the past few years, agencies have increasingly prioritized making data open and reusable, allowing them to derive more value from existing information. At the same time, this open data culture must be carefully managed to ensure that sensitive information is protected. He highlights the importance of flexibility in modern data strategies, noting that agencies must be able to operate across a range of environments, from on-premises to edge computing and cloud platforms. This flexibility ensures that agencies are prepared to respond to dynamic, unforeseen operational needs, whether in traditional environments or in the field.
Key Takeaways
-
Agencies are developing an open data culture, making data accessible internally to meet mission needs, while ensuring robust security and governance.
-
The ability to deploy data resources anywhere—from on-premises to edge computing and across multiple cloud environments—gives agencies the flexibility to adapt to unexpected challenges.
-
Sharing resilient and secure data with coalition partners, such as through initiatives like CJADC2, strengthens collective capabilities and decision-making on the battlefield.
Strengthening Deterrence Through Enhanced Visibility and Strategic Tech Partnerships
Maria Banks, Director of Federal Sales at Atlassian, highlights the critical role of operational confidence and strategic tech partnerships in strengthening U.S. defense capabilities. She argues that true deterrence requires not only having the power to respond but also deep knowledge of those capabilities through consolidated visibility across technology platforms. Banks emphasizes that while the Department of Defense (DoD) has made extensive technology investments, its leaders often miss opportunities to engage vendors like Atlassian and its partners in unified data-sharing initiatives. By directly engaging with tech CEOs to discuss data integration across software environments, the DoD could gain real-time, actionable insights, fostering greater resilience and readiness. Banks also stresses the need for a cultural shift, where tech companies are valued as essential defense partners alongside traditional contractors. She points to initiatives such as Atlassian’s tech boot camp for Australia’s Congress as examples of how educating government leaders on tech can strengthen partnerships and improve decision-making.
Key Takeaways
-
Consolidating information across platforms would empower the DoD with real-time insights on its capabilities, strengthening deterrence and readiness.
-
Direct communication between DoD leaders and tech CEOs could foster collaboration, helping DoD tap into rich data and streamline operations across software environments.
-
Recognizing tech companies as strategic defense partners, similar to traditional defense contractors, would ensure alignment on shared goals and amplify the impact of digital transformation in defense.
Navigating IT Modernization and Zero Trust Implementation at the NGA
Mark Chatelain, CIO of the National Geospatial-Intelligence Agency (NGA), outlines the agency’s dual focus on upgrading its IT infrastructure to accommodate Windows 11 and implementing a robust Zero Trust security framework by October 2025. These initiatives are critical for maintaining operational security, compliance, and efficiency. The move to Windows 11 stems from the necessity to keep up with vendor security updates as Windows 10 approaches obsolescence. However, the new operating system’s higher computing requirements demand comprehensive hardware replacements across data centers and analyst workstations, necessitating careful budgeting and planning. Zero Trust, a critical component of the agency’s future cybersecurity posture, requires adopting a multi-faceted approach to protect systems, verify users, and assume potential breaches. Chatelain emphasizes that transitioning to Zero Trust is not about deploying a single application but building a comprehensive security architecture around seven core pillars.
Key Takeaways:
-
Upgrading to Windows 11 requires significant hardware replacements due to increased computing demands, with careful budget planning to mitigate gaps in refresh cycles.
-
A seven-pillar framework underpins the Zero Trust approach, focusing on assuming network compromise, verifying users, and implementing advanced monitoring and threat detection systems.
-
Coordinating the Windows 11 upgrade with Zero Trust adoption maximizes efficiency, ensuring infrastructure and security enhancements are interconnected for long-term resilience and data protection.
Accelerating Defense Modernization Through Collaboration and Efficiency
John Beglan, Director of Federal Sales at Tungsten Automation, discusses the critical role of collaboration and strategic thinking in modernizing data management systems within defense agencies. He emphasizes that defense organizations are now placing higher priority on the velocity and efficiency of data consumption to stay competitive and responsive to mission needs. Beglan highlights how, despite the increased focus on technology, the true value lies in supporting personnel with the right tools to enhance their decision-making capabilities and operational effectiveness. This approach, he argues, allows workers to be more productive and informed, whether at headquarters or in the field. He also discusses the challenges of modernizing legacy systems and the importance of industry partnerships to overcome budget limitations, secure necessary approvals, and navigate complex processes. Working with partners allows defense agencies to tap into specialized expertise and engineering support, making it easier to manage the transition from outdated systems to modern, efficient platforms.
Key Takeaways:
- Successful modernization efforts in defense rely on strong partnerships with industry, providing agencies with the expertise and support needed to implement change effectively.
- Efficiency is about equipping workers with the right tools to perform tasks faster, while proficiency is about improving the accuracy and effectiveness of those tasks, directly impacting mission success.
- Agencies often prioritize modernization based on mission directives and available resources, starting with the low-hanging fruit and working toward more complex upgrades.
Advancing Cyber Defense: Integrating Automation and Threat Detection for National Security
Jean Schaffer, Federal CTO at Corelight, highlights the critical need for government agencies and high-value industries to evolve beyond traditional cybersecurity tools to effectively counter increasingly sophisticated cyber threats. She points out that while foundational strategies like zero trust provide a strong basis for secure infrastructure, they are not enough on their own. Agencies must now adopt a fully integrated approach, combining advanced threat detection and rapid-response tools with automation. With the rise of both state-sponsored threats, such as Volt Typhoon, and highly organized independent actors, cyber attackers are constantly finding vulnerabilities across networks. This means that organizations require an interconnected suite of tools—spanning AI-enhanced firewalls, SOAR platforms, and network detection—to identify potential weak points and automatically respond in real-time. Schaffer shares the need for comprehensive visibility across all endpoints and networks, as threats can emerge from any corner of an organization’s infrastructure.
Key Takeaways:
- Modern threat detection and response require a suite of advanced tools, tightly integrated to support real-time monitoring and immediate response.
- Automated responses, through SOAR and AI-enhanced firewalls, allow for faster reactions to threats than humans can achieve alone, countering the speed of sophisticated attacks.
- Comprehensive visibility across all endpoints and network layers is crucial, especially as adversaries target critical infrastructure and high-value sectors.