CYBERCOM Takes Offensive Stance on Cyber Readiness with Hunt Forward Operations
Hunt Forward Operations are allowing CYBERCOM to better operate and secure DOD’s information networks.

U.S. Cyber Command is broadening its scope of the international cyber threat landscape through its Hunt Forward Operations (HFOs) — an effort to collaborate with foreign allies by sending cyber teams that will search for adversaries operating on partner networks.
CYBERCOM has been taking greater strides to improve training techniques, as well as cyber mission team development to strengthen the homeland from significant malware attacks. While the command leverages both defensive and offensive authorities to meet these goals, HFOs allow the Defense Department to lean into offensive tactics more heavily, HFO Executive Director Dave Frederick said during a Billington Cybersecurity fireside chat Monday.
“The goal is to understand what our adversaries are doing in foreign cyber space,” Frederick said. “It enables the partner nations to strengthen the defenses of their networks, and we gain unique insights into adversary malware which we bring home and inform DOD and the private sector.”
Frederick also noted some of the various forms of insight that HFOs have provided for DOD and its partners so far.
“We’re able to share the indicators of compromise, new samples of malware that we discovered from Hunt Forward with the broader cybersecurity community, and then they’re able to build can build signatures to detect that malware and disrupt adversary operations targeting the U.S.,” he explained.
While CYBERCOM is leaning into international allies through HFOs, which initiated in 2018, Frederick noted that interagency partnerships, such as the ones between his agency at the National Security Agency, also play a significant role in advancing DOD’s overall cyber defense.
“NSA is responsible for developing the encryption capabilities and cybersecurity standards for all of the U.S. government’s national security systems and standards for the unclassified networks at DOD,” Frederick said. “They’re leading the way in technology side of it, especially with their deep expertise in cryptography and cybersecurity.”
Frederick also highlighted the role of industry partners in aiding DOD. While HFOs enable DOD to share threat intelligence with key private-sector entities, he said these partners also provide critical technologies and mission capabilities that enhance the military’s ability to continue strengthening its cyber posture.
“A group of programs that provide us with our big data platform capability, offensive weapons, defensive tools and sensors and our training environment — industry support and collaboration in all those areas is really important for us,” Frederick said. “An area that we’re looking at this year is doing everything we can in terms of applying AI and machine learning to our mission capabilities. That’s an area you will see greater emphasis on in the future.”
Along the lines of partnership and collective defense, Frederick added that information-sharing is critical. He said the command has room for improvement regarding its issuance of early warnings about potential threats.
“If we have companies who are being exploited by a malicious cyber actor and we can get tips, it will help us prepare and understand what we may need to do and how to respond from a DOD point of view,” Frederick said. “We want to encourage industry to reach out to their partners if they have indicators that they feel comfortable sharing with us so that we can look out in foreign space, figure out what’s going on and see what we can do to fix the problem.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
The Next AI Wave Requires Stronger Cyber Defenses, Data Management
IT officials warn of new vulnerabilities posed by AI as agencies continue to leverage the tech to boost operational efficiency.
5m read -
Federal CIOs Push for ROI-Focused Modernization to Advance Mission Goals
CIOs focus on return on investment, data governance and application modernization to drive mission outcomes as agencies adopt new tech tools.
4m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read