Panel: Delivering Solutions for Enhanced Command and Control

  • Room: Hall E
Wednesday, May 16, 2018: 2:45 PM - 4:00 PM

Speaker(s)

Moderator
George Duchak, Ph.D. PE
Director Information Operations, J6; Chief Information Officer
Defense Logistics Agency
Panelist
Dr. Misty Blowers
Director of Research, Development, and Strategy
Peraton,Inc.
Panelist
Terry L. Carpenter, Jr.
Director & Program Executive Officer, Services Development Directorate
Defense Information Systems Agency
Panelist
COL Paul Craft, USA
Director of Operations, J3
Joint Force Headquarters – Department of Defense Information Network (JFHQ-DODIN)
Panelist
Daniel B. Prieto
Strategic Executive
Google Cloud, Public Sector

Description

Command and control (C2) in any domain is enabled by situational awareness (SA) and the capability to direct forces to enable effects.  C2 for Defensive Cyberspace Operations (DCO) is no exception.  Commanders need situational awareness, which consists of network awareness, mission awareness, force and threat awareness.  The complexity and dynamic nature of the cyber domain and the rapid timescale of cyberspace actions (often in machine time) present important challenges to sensemaking, timely decision making, and responsive and effective action.  Work is underway in DoD to develop and field C2 capabilities for cyberspace operations to enable success in these conditions.  Key enabling capabilities include technologies to improve network and mission awareness, machine learning and automation to augment the sensemaking capabilities of defenders and better align the timescales of defense with those of offensive actors, and trained personnel and teams to generate awareness and respond to threats.  This panel will discuss perspectives on the needs and key challenges for C2 in the context of DCO, capabilities that are being developed to address these challenges, and how DoD and industry are transforming to deliver these capabilities in ever more agile and rapid ways to meet the evolving needs of enabling the Department to operate in a cyber-contested environment.

Tracks: