October 17, 2024
Presented by Hypori & Carahsoft
DIA's Tech Modernization and Strategic Priorities for a Secure Future
Doug Cossa, CIO at the Defense Intelligence Agency (DIA), provides insights into DIA’s ongoing technology modernization, including the successful upgrade of the Joint Worldwide Intelligence Communications System (JWICS). Cossa highlights how DIA is advancing the resilience and autonomy of its network infrastructure, especially for operations in denied and remote areas. By focusing on modular architecture and seamless international collaboration through initiatives like the Torch system, DIA aims to facilitate secure, interoperable communications with global partners. Cossa also discusses his commitment to the DIA workforce, emphasizing skill development, neurodiverse hiring, and accessibility as integral to achieving a versatile and technically proficient team. Looking to the future, he intends to deepen efforts in areas like zero trust and data security, laying the groundwork for robust cybersecurity in the face of evolving threats.
Key Takeaways:
- DIA has completed much of the JWICS refresh, enhancing its network to be more autonomous and adaptable, especially for environments with limited infrastructure.
- Through the Torch system, DIA enables secure, shared communication with international partners, advancing interoperability and simplifying access to shared information.
- Cossa prioritizes upskilling, neurodiverse hiring, and STEM education, supporting a skilled, inclusive workforce critical for ongoing innovation and cybersecurity excellence at DIA.
The Rapidly Evolving Threat Landscape and the Role of AI in Cyber Defense
Jared Shepard, President and CEO of Hypori, highlights the increasingly complex threat landscape, where emerging threats from new actors and existing challenges from countries like China and Russia add to the cyber and intelligence community's burden. AI stands as both an opportunity and a risk: while it can aid in defensive measures, such as monitoring insider threats, it also enables adversaries to easily launch more sophisticated attacks, democratizing the capacity for cyber offense. Shepard warns that the "attack surface" has expanded, making data security and information control critical priorities, especially in the face of tactics like AI poisoning and influence campaigns. He stresses that industry and government must collaborate, particularly in safeguarding intellectual property, to maintain a technological edge against multifaceted and evolving cyber threats.
Key Takeaways:
- AI enables both advanced threat actors and less skilled ones to launch effective attacks, increasing the volume and complexity of threats.
- The proliferation of digital threats from diverse actors, combined with influence campaigns and AI misuse, requires a focused approach on reducing the attack surface and securing data.
- Government and industry must work together to protect intellectual property, with initiatives like CMMC playing a key role in bolstering national security by addressing vulnerabilities within the defense industrial base.
Intelligence Integration as a Core Strategy for Cyber Defense
Brig. Gen. Melissa Stone, Director of Intelligence (J-2) at U.S. Cyber Command, discusses the importance of embedding intelligence directly into U.S. Cyber Command’s daily operations as a foundational strategy in defending against cyber threats. Stone shares that intelligence integration goes beyond routine updates—it actively informs operational planning and decision-making across the entire military. Given the rapidly evolving threat landscape, where adversaries range from sophisticated nation-states to independent cybercriminals and hacktivist groups, maintaining an “analytic overmatch” is crucial for anticipating and countering diverse cyber tactics. Stone points to China as the primary cyber threat, given its large and well-resourced cyberspace force. However, partnerships with industry and allies provide Cyber Command with additional expertise and resources, fostering a unique advantage. These collaborations extend beyond data sharing to include trust-building and stringent cybersecurity measures, ensuring that information exchange strengthens mutual security.
Key Takeaways:
- Cyber Command embeds intelligence into all operations, adapting its strategies to an increasingly diverse set of cyber threats.
- Collaboration with industry, academia, and international allies provides essential support and strengthens intelligence and defense capabilities.
- Cyber Command seeks skilled individuals who bring fresh perspectives and critical thinking to navigate the demanding, dynamic domain of cyber operations.
Please fill out the requested information below