Well bring our next panelists here. Thank you again for keeping your conversations a little bit more quiet on the outside by the booths so we can listen to our panelists. So this next panel is very interesting called new models of public, private cyber collaboration. The moderator is mr. Will ash. He is a senior director of Security Sales used Public Sector global Security Sales for cisco. Joining him on the panel is Major General ed wilson, United States air force retired, secretary of defense, assistant secretary of defense for cyber policy in the office of the undersecretary of defense. Also joining us is claire caroma from the Defense Digital Service. Also Lieutenant General stephen fogarty, commanding general, United States army Cyber Command. Also ms. Tonya ugoretz, a Deputy Assistant director cyber readiness, outreach and Intelligence Branch for the fbi. And last, miss Jennifer Walsmith, sector Vice President and general manager cyber and Intelligence Solutions division, Northro
Now more from the Cybersecurity Conference hosted by billington cybersecurity in washington, d. C. This Panel Discusses the importance of public and private collaboration as well as enhassing cloud security. This is an hour and 45 minutes. Okay, good afternoon, everybody, again. Welcome to the second part of our program. Id like to invite you back and well bring our next panelist here. Thank you again for keeping your conversations a little bit more quiet on the outside by the booths so we can listen to our panelists. So this next panel is very interesting called new models of public, private cyber collaboration. The moderator is mr. Will ash. He is a senior director of Security Sales used Public Sector global Security Sales for cisco. Joining him on the panel is Major General ed wilson, United States air force retired, secretary of defense, assistant secretary of defense for cyber policy in the office of the undersecretary of defense. Also joining us is claire caroma from the Defense
Interfacing to bring technologies and give abilities to our war fighters, men and women in uniform. There are a couple that are important. The first is relationships and expense. We brought together 18 that has spent a lot of time in places where innovation and Venture Capital money is being spent. We have folks that have come, spent a lot of time in the labs, that have seen and understood how y so we are able to interface with them. That is key. The second big lesson is we are focused on capability gaps. What are transformational transformational ways we can use to apply to our program. The final key piece is having agility is one of the most important things. We are able to bring that with the funding and the oversight we have for the pentagon, thats when we see something that could add value for war fighters, we are able to execute quickly. Aaron matta we hear a lot from people similar in a duty to yours, that it moves slower than the commercial side. How do you manage to get a dod
Committee will come to order. I would like to welcome our Witnesses Today as the Committee Examines military Cyber Operations. I note that just about exactly two months ago, president obama confirmed for the first time that the u. S. Is conducting Cyber Operations against isis. And as the leadership of the department of defense was discussing this, they said it was the first time that Cyber Command has been given the guidance to go after isis. Just like we have an air campaign, we want to have a cyber campaign. And some of the press went on to discuss that secretary carter was pushing for u. S. Cyber command to have greater freedom to launch attacks and to address tactical Cyber Threats against isi isis. The Department Defense capabilities to fight and win the countrys wars and be prepared and ready to execute those missions remain on solid footing regardless of which domain we are talking about, including the cyber domain. The department has been developing organizations capabilities
Document. When secretary signed the document, he directed the department to focus its efforts on three primary missions in cyber space. One, defend the department of information, department of Defense Information Networks to assure our dod missions. Two, defend the United States against Cyber Attacks of significant consequence and, three, provide full spectrum cyber options to support contingency plans and military operations. Another key part of our strategy is deterrence. Dod is supporting a comprehensive Cyber Strategy to deter attacks on the u. S. And our interests. This strategy depends on the totality of u. S. Actions, to include declaratory policy, overall defensive posture, Effective Response procedures, indications and warning capabilities and the resiliency of u. S. Networks and systems. I am proud to say that the department has made important strides in implementing dod strategy since it was signed in 2015. My colleagues and i look forward to going into greater detail on our