Skip to Main Content Subscribe

AI Will Drive Cyber Efforts at CYBERCOM Amid Zero Trust

Share

CYBERCOM Executive Director Dave Frederick discussed his priorities and cyber concerns as the command gets more budgetary control.

5m read
Written by:
image of U.S. Navy teams with a civilian emergency response partner to tackle a cyber-attack scenario during exercise Cyber Impact 22 in Buffalo, New York, Mar. 9, 2022.
U.S. Navy teams with a civilian emergency response partner to tackle a cyber-attack scenario during exercise Cyber Impact 22 in Buffalo, New York, Mar. 9, 2022. Photo Credit: Capt. Joe Legros/DVIDs

United States Cyber Command plans to rely on artificial intelligence (AI) and machine learning to improve cyber defensive operations as the cyber landscape grows increasingly hostile, according to CYBERCOM Executive Director Dave Frederick speaking at the Defense One Tech Summit Tuesday.

CYBERCOMโ€™s innovation unit, DreamPort, is working closely with the Defense Departmentโ€™s new Chief Digital and AI Office (CDAO), the Defense Innovation Unit (DIU) and the Defense Advanced Research Projects Agency (DARPA) to expand AI and machine learning โ€œfor a whole range of missions.โ€ CYBERCOM also just began an internal survey of its machine-learning requirements to support use cases.

One upcoming use case involves AI-powered synthetic users on a test network to help train and prepare cyber operators and analysts for real-time cyber threats.

โ€œJust setting up a static network isnโ€™t sufficient in terms of realism because, in a real network, youโ€™ve got administrators and users,โ€ Frederick said at the event. โ€œSomeone may notice something is off and tip off our security operations center. To elevate our game in training and mission rehearsal, we want to see if we can develop in partnership with industry, simulate the actual presence of people on the network and the uncertainty that can be introduced.โ€

This use case aligns with CYBERCOMโ€™s three mission goals: defend DOD information networks, defend the nation and critical infrastructure against cyberattacks, and support joint force commanders.

Building on that mission set, training cyber operators and preparing for joint force readiness are major priorities, Frederick said.

โ€œHow do we look at our cyber mission teams and make sure our operators and analysts are the best qualified, lethal in the world?โ€ he said. โ€œWe have a major focus on workforce, how do we recruit and train civilian operators? And our joint warfighting architecture โ€” we have a series of systems we use for cyber missions, and weโ€™re looking at trying to improve the cybersecurity of those systems.โ€

The 2022 National Defense Authorization Act (NDAA) gave CYBERCOM more budgetary control over investments at the joint force and military service levels, which allowed CYBERCOM to pivot and adjust funding and priorities as needed to address the onslaught of cyberattacks and cyber threats over the past few years. CYBERCOM is โ€œgetting readyโ€ for more budgetary control in 2024, Frederick said.

Rapid development of new cyber capabilities in a DevSecOps environment will be key to success.

โ€œThe cyber environment is changing every day, we have to have a really agile system,โ€ Frederick said. โ€œItโ€™s not a system where weโ€™re building aircraft carriers. Itโ€™s about data and software, and we need to integrate those capabilities very rapidly. Budget control will help us move dollars around more effectively.โ€

Zero trust is also critical to CYBERCOMโ€™s mission and priorities, with the Defense Information Systems Agencyโ€™s (DISA) Thunderdome zero trust prototype being โ€œan important step forward.โ€ Zero trust as a concept is โ€œreally importantโ€ for all of DOD, Frederick said.

โ€œAir Force has a zero trust prototype underway, as does Navy,โ€ he said. โ€œWe had a zero trust testbed in place for the last few years [at DreamPort] to test and let our computer scientists work with NSA and DISA and the industry to test out some basic ideas. From those experiments, now weโ€™ve got these prototypes emerging at the DISA level and services.โ€

CYBERCOM sees synergy between its zero trust and AI efforts.

โ€œA key part of zero trust is to spot processes on your network that seem suspicious โ€” we see a place for [machine learning],โ€ Frederick said. โ€œA deeper look at where thatโ€™s going to go, I canโ€™t comment much more. Weโ€™re still in learning mode with zero trust and the prototypes that are kicking off.โ€

To further support its cyber and AI research and development and cultivate a cyber talent pipeline, CYBERCOM launched an academic engagement network in January. The network already boasts nearly 100 member universities.

โ€œWeโ€™ve had two professors speak to our workforce about election security threats [such as] social media disinformation and the technical side,โ€ Frederick said. โ€œOn the flip side, weโ€™ve had a zero trust session. One of our senior leaders held a tech talk with professors and students to talk about where weโ€™re going with that. Weโ€™re going to do some follow-up tech talks in the fall.โ€

Woman typing at computer

Stay in the know

Subscribe now to receive our curated newsletters

Subscribe
Related Content
Woman typing at computer

Stay in the Know

Subscribe now to receive our newsletters.

Subscribe