CYBERCOM Elevated To Full Combatant Command Status

US Defense Secretary Ash Carter is considering turning US Cyber Command into a full combatant command, an acknowledgment that cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

Pentagon leaders long have said that cyber has joined land, sea, air, and space as a new warfare domain. Especially in cyberspace, Carter said at the Center for Strategic and International Studies in Washington, “our reliance on technology has given us great strengths and great opportunities, but also led to vulnerabilities that adversaries are eager to exploit,”  

It is time, Carter said, to “consider changes to Cyber’s role in DOD’s Unified Command Plan.”

The military is currently organized into nine COCOMs: six geographic commands (Pacific, Europe, Africa, Middle East, etc.) and three that field specialized capabilities: special operations, nuclear (strategic) forces, and transportation. US Cyber Command, or CYBERCOM, is currently a sub-unified command under U.S. Strategic Command.

“I have given Cyber Command in the ISIL fight its first wartime assignment,” Carter said recently, referring to the historic role that network experts are playing in the Mosul offensive, described primarily as disrupting the group’s communications, command, and control capabilities.

“Increasingly, I’ve brought Strategic Command and Cyber Command into these operations as well to leverage their unique capabilities in space and cyber to contribute to the defeat of ISIL. Beyond terrorism,” Carter said. “A couple of years ago, that would never have occurred to a secretary of defense.”

The calculation has changed largely as a result of ISIS’s own behavior and what the Defense Department perceives as the need to fight ISIS on the group’s own turf, inside online communications networks. He described the thinking as: “Hey, these guys are using this tool. We need to take it away.”

Adm. Michael Rogers, commander of Cyber Command, told the Senate his unit was ready for the upgrade. Appearing before the Senate Armed Services Committee, he discussed the future of the fledgling Cyber Mission Force and defending networks and as part of the so-called Third Offset, the Defense Department’s bid to develop technologies to secure technological advantage. “USCYBERCOM stands ready to help develop and deploy the new cyber capabilities entailed in the Third Offset, particularly hardened command and control networks and autonomous countermeasures to cyber attack,” he said.

Becoming a Combatant Command “would allow us to be faster, which would generate better mission outcomes,” he said.

DefenseOne

« Convoy Of Self Driving Trucks Completes European Cross-Border Trip
#PanamaPapers: The Biggest Leak In History »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BIA

BIA

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

Bowhead Cybersecurity Solutions and Services (BCSS)

Bowhead Cybersecurity Solutions and Services (BCSS)

Bowhead Cybersecurity Solutions and Services provides high-end technical and professional services with an emphasis on providing Cyber Solutions.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.