An official website of the United States Government 
Here's how you know

Official websites use .gov

.gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock ( lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybercom Cites Priorities Key to First-Year Success

You have accessed part of a historical collection on defense.gov. Some of the information contained within may be outdated and links may not function. Please contact the DOD Webmaster with any questions.

With a year under its belt as a full and independent unified combatant command, U.S. Cyber Command is reflecting on lessons it has learned so far and their effect on the way ahead.

Air Force Maj. Gen. Charles Moore Jr., Cybercom's director of operations, spelled out several areas on which the command has focused:

1
Persistent engagement, which means being fully engaged with adversaries in the cyber domain all the time.
"We recognize and understand the importance of being in constant contact with the enemy in this space, especially below the level of armed conflict, so we can defend ourselves and impose cost," Moore said.
Service members work at a computer.
Advanced Techniques
Tech. Sgt. Noe Kaur uses advanced techniques to launch cyberattacks to the training audience as part of exercise Tacet Venari, Ramstein Air Base, Germany, Mar. 8, 2019.
Credit: Air Force Master Sgt. Renae Pittman
VIRIN: 190308-F-FF603-0008C
2
Readiness
 Moore said the command at one point was focusing on building up cyber teams by manning and equipping them, but that work is now largely over. "We've changed the readiness question from just building the teams to now 'How do you work with the services, who, of course, organize, train and equip our warfighting command ... to standardize what they are presenting in terms of people, in terms of how they are trained, in terms of the equipment they are presented to us with, so that we can sustain the readiness over the long term?'" Moore said.
Service members work at a computer.
Firewall Rules
Air Force Capt. Justin Valentine, Tech. Sgt. Michael Markus, and Airman 1st Class Brian Stahl investigate and configure firewall rules for a training scenario as part of exercise Tacet Venari at Ramstein Air Base, Germany, March 8, 2019.
Credit: Air Force Master Sgt. Renae Pittman
VIRIN: 190308-F-FF603-0019C
3
Partnerships
"There's probably not a greater team sport than cyberspace operations out there," Moore said. "We recognize we can't be successful in executing our mission against any of our adversaries if we are not working very closely with our interagency partners, with our friends and allies around the globe, with industry and academia, etc."
Service members work at a computer.
Tacet Venari
Exercise support staff launch scenario injects as part of exercise Tacet Venari at Ramstein Air Base, Germany, March 8, 2019.
Credit: Air Force Master Sgt. Renae Pittman
VIRIN: 190308-F-FF603-0031C

Related Stories