1 00:00:00,000 --> 00:00:00,000 2 00:00:07,940 --> 00:00:11,940 Yeah , for me . Yeah . 3 00:00:15,240 --> 00:00:19,160 Okay . Good morning 4 00:00:19,160 --> 00:00:22,640 sir . It's great to see you again and 5 00:00:22,640 --> 00:00:25,010 congratulations on both your promotion 6 00:00:25,020 --> 00:00:28,240 and being named the commander here the 7 00:00:28,250 --> 00:00:31,100 dot in as well as the director of lisa . 8 00:00:31,490 --> 00:00:34,210 Always good to see you too . And I know 9 00:00:34,220 --> 00:00:36,276 I know sir , you come into this with 10 00:00:36,280 --> 00:00:39,250 extensive cyber experience . So before 11 00:00:39,250 --> 00:00:41,417 we get started with questions , I just 12 00:00:41,417 --> 00:00:43,472 wanted to ask if you had any opening 13 00:00:43,472 --> 00:00:45,528 remarks , I just uh you know , first 14 00:00:45,528 --> 00:00:47,639 off thanks for for Billington to kind 15 00:00:47,639 --> 00:00:49,694 of get us together . You know , it's 16 00:00:49,694 --> 00:00:51,980 unfortunate sometimes that we have to 17 00:00:51,980 --> 00:00:54,320 have these type of events to uh to to 18 00:00:54,320 --> 00:00:56,431 rekindle old acquaintances , but it's 19 00:00:56,431 --> 00:00:58,950 always good to see you too . And uh 20 00:00:58,960 --> 00:01:00,904 look forward to the conversation . 21 00:01:00,904 --> 00:01:02,904 Great , great well thanks again . I 22 00:01:02,904 --> 00:01:05,071 know you're very busy guys , so thanks 23 00:01:05,071 --> 00:01:07,360 for taking the time . So as both the 24 00:01:07,360 --> 00:01:10,180 director of Disa and I'm gonna try and 25 00:01:10,180 --> 00:01:12,270 go for this . The Commander of Joint 26 00:01:12,270 --> 00:01:14,910 Force Headquarters , Department of 27 00:01:14,910 --> 00:01:17,380 Defense Information Network , that's a 28 00:01:17,380 --> 00:01:19,220 pretty broad spectrum of 29 00:01:19,220 --> 00:01:22,360 responsibilities . You have to make 30 00:01:22,360 --> 00:01:24,527 sure those networks are up and running 31 00:01:24,527 --> 00:01:26,880 constantly . You're doing cybersecurity 32 00:01:26,890 --> 00:01:30,340 and you're doing defensive operations . 33 00:01:30,350 --> 00:01:33,890 So how do you prioritize amongst all 34 00:01:33,890 --> 00:01:36,630 the different demands on your time ? On 35 00:01:36,630 --> 00:01:39,530 a daily basis ? Some would probably say 36 00:01:39,540 --> 00:01:43,070 not too well . Um but it's really an 37 00:01:43,070 --> 00:01:45,580 honor to come back to the organization . 38 00:01:45,590 --> 00:01:47,890 Um You know when when when we last 39 00:01:47,890 --> 00:01:50,100 probably last saw each other as uh the 40 00:01:50,110 --> 00:01:52,110 Deputy Commander of the Joint Force 41 00:01:52,110 --> 00:01:54,221 Headquarters Dodon . Um And I was the 42 00:01:54,221 --> 00:01:56,332 Chief of staff and I'll tell you it's 43 00:01:56,332 --> 00:01:58,554 it's amazing coming back and seeing the 44 00:01:58,554 --> 00:02:00,930 maturity level of the organizations and 45 00:02:00,930 --> 00:02:03,097 how far they've come since we since we 46 00:02:03,097 --> 00:02:05,263 stood up about six years ago . Um I'll 47 00:02:05,263 --> 00:02:07,930 tell you that the number one thing that 48 00:02:07,930 --> 00:02:10,880 we kind of continue to work on is the 49 00:02:10,890 --> 00:02:13,001 department's priorities , right ? You 50 00:02:13,001 --> 00:02:15,110 know , working with the Secretary of 51 00:02:15,110 --> 00:02:17,110 Defense's priorities , working with 52 00:02:17,110 --> 00:02:19,110 johnny Carson's priorities and then 53 00:02:19,110 --> 00:02:21,166 just as important , working with the 54 00:02:21,166 --> 00:02:23,388 combatant commanders and what are their 55 00:02:23,388 --> 00:02:25,388 priorities and kind of aligning all 56 00:02:25,388 --> 00:02:27,554 those so that we have um those kind of 57 00:02:27,554 --> 00:02:29,610 lined out and then we just apply our 58 00:02:29,610 --> 00:02:31,777 resources and our time towards those . 59 00:02:31,777 --> 00:02:33,666 Um and you know that uh this is a 60 00:02:33,666 --> 00:02:35,666 little bit different than joint for 61 00:02:35,666 --> 00:02:37,721 centuries . Darden one is a one of a 62 00:02:37,721 --> 00:02:39,721 operation level command and control 63 00:02:39,721 --> 00:02:41,721 headquarters while the other one is 64 00:02:41,721 --> 00:02:43,832 kind of the implementation arm uh and 65 00:02:43,832 --> 00:02:46,054 whether that's um having our internet , 66 00:02:46,054 --> 00:02:48,166 internet access points , whether it's 67 00:02:48,166 --> 00:02:50,332 defending those internet access points 68 00:02:50,332 --> 00:02:52,554 and providing services and capabilities 69 00:02:52,554 --> 00:02:54,777 or john Kasich chris , Darden is really 70 00:02:54,777 --> 00:02:56,499 focused on how do we bring the 71 00:02:56,499 --> 00:03:00,050 department force and force posture 72 00:03:00,520 --> 00:03:02,600 to a much better level and that's 73 00:03:02,600 --> 00:03:05,640 really focused on organizations and 74 00:03:05,940 --> 00:03:08,260 the leadership of those organizations 75 00:03:08,740 --> 00:03:10,573 and that just the team is really 76 00:03:10,573 --> 00:03:13,380 focused on executing implementing and 77 00:03:13,380 --> 00:03:15,602 providing services and capabilities for 78 00:03:15,602 --> 00:03:17,324 the department . That's that's 79 00:03:17,324 --> 00:03:20,670 impressive . So I know you come into 80 00:03:20,670 --> 00:03:22,892 this position at a unique time . You've 81 00:03:22,892 --> 00:03:24,781 got to have seen this velocity of 82 00:03:24,781 --> 00:03:26,948 change within the networks , who could 83 00:03:26,948 --> 00:03:29,114 have predicted ? We would have been in 84 00:03:29,114 --> 00:03:31,620 this pandemic and have so many remote 85 00:03:31,630 --> 00:03:34,210 workers , what are your initial 86 00:03:34,220 --> 00:03:37,140 impressions ? And what how has that 87 00:03:37,140 --> 00:03:40,640 shaped your vision going forward ? A 88 00:03:40,650 --> 00:03:42,706 great , great question . Uh you know 89 00:03:42,706 --> 00:03:45,520 one of our mantras and um is velocity 90 00:03:45,520 --> 00:03:48,450 of action to win . I know General Brown 91 00:03:48,450 --> 00:03:51,020 chief staff Air Force has in store 92 00:03:51,020 --> 00:03:53,980 change or lose . Um and we both are 93 00:03:53,980 --> 00:03:56,250 coming from the pacific theater and we 94 00:03:56,250 --> 00:03:59,260 saw each and every day the chinese and 95 00:03:59,260 --> 00:04:01,510 what they are doing um and how fast 96 00:04:01,510 --> 00:04:03,454 they are moving , how fast they're 97 00:04:03,454 --> 00:04:05,454 trying to modernize and if we don't 98 00:04:05,454 --> 00:04:08,570 keep up um from a pacing standpoint , 99 00:04:08,580 --> 00:04:10,913 especially in the strategic competition . 100 00:04:10,913 --> 00:04:14,270 Um the future won't be as good as it is 101 00:04:14,270 --> 00:04:16,320 today when we talk about the 102 00:04:16,330 --> 00:04:18,552 international rules based order because 103 00:04:18,552 --> 00:04:20,608 they want to change that . As as you 104 00:04:20,608 --> 00:04:22,719 think about all the things that we're 105 00:04:22,719 --> 00:04:24,608 trying to do and then you throw a 106 00:04:24,608 --> 00:04:26,830 pandemic and as as you mentioned and we 107 00:04:26,830 --> 00:04:28,941 have to have the right and the reason 108 00:04:28,941 --> 00:04:31,108 we use the velocity of action is we've 109 00:04:31,108 --> 00:04:32,886 got to have the right speed and 110 00:04:32,886 --> 00:04:34,830 direction which gets to your first 111 00:04:34,830 --> 00:04:36,997 question on priorities . So kind of as 112 00:04:36,997 --> 00:04:39,052 as we look at what we've done , I'll 113 00:04:39,052 --> 00:04:41,720 tell you one of the first things is a 114 00:04:41,720 --> 00:04:44,630 mobile force um just as you're seeing 115 00:04:44,630 --> 00:04:47,300 in the commercial world with commercial 116 00:04:47,300 --> 00:04:49,189 industry or seeing the same thing 117 00:04:49,189 --> 00:04:51,370 within the department , I'd say two 118 00:04:51,370 --> 00:04:53,560 years ago we weren't a very mobile 119 00:04:53,560 --> 00:04:56,630 force , we could do mobile actions and 120 00:04:56,630 --> 00:04:59,030 activities . Um but as you think about 121 00:04:59,040 --> 00:05:01,430 the classified mobility and you think 122 00:05:01,430 --> 00:05:04,470 about the ability to at any point in 123 00:05:04,470 --> 00:05:08,420 time do your job from any location . We 124 00:05:08,420 --> 00:05:10,309 just weren't there . We have done 125 00:05:10,309 --> 00:05:12,610 significant improvements in our ability 126 00:05:12,610 --> 00:05:15,090 as a department because right now , you 127 00:05:15,090 --> 00:05:18,210 know , some organizations are 10% in 128 00:05:18,210 --> 00:05:20,340 the office at any one time , some are 129 00:05:20,340 --> 00:05:23,100 20% , you know the pentagon just went 130 00:05:23,100 --> 00:05:26,210 to H . Pecan Charlie I think a couple 131 00:05:26,210 --> 00:05:28,432 weeks ago , which is no more than 40% . 132 00:05:28,540 --> 00:05:30,670 Um in order to do that , you have to 133 00:05:30,670 --> 00:05:32,781 write infrastructure in place and you 134 00:05:32,781 --> 00:05:34,781 have to write have the right mobile 135 00:05:34,781 --> 00:05:37,170 capabilities to make that happen . So 136 00:05:37,170 --> 00:05:40,180 that that's been a big push is how do 137 00:05:40,180 --> 00:05:42,280 we become more mobile in this 138 00:05:42,280 --> 00:05:44,440 environment ? Also realizing as you 139 00:05:44,440 --> 00:05:46,620 know that the more mobile yard than 140 00:05:46,620 --> 00:05:49,790 your attack surface increases . And so 141 00:05:49,790 --> 00:05:51,957 how do you make sure that you are from 142 00:05:51,957 --> 00:05:54,260 a cybersecurity standpoint , uh have 143 00:05:54,260 --> 00:05:57,400 the right processes in place , not just 144 00:05:57,410 --> 00:06:00,350 the ability to mitigate vulnerabilities , 145 00:06:00,840 --> 00:06:04,450 but what happens if a adversary or a 146 00:06:04,450 --> 00:06:06,283 malicious cyber actors or even a 147 00:06:06,283 --> 00:06:08,950 criminal um gets in in your networks , 148 00:06:09,340 --> 00:06:11,451 you have to be resilient . And so the 149 00:06:11,451 --> 00:06:14,160 ability to make sure that a an incident 150 00:06:14,160 --> 00:06:15,938 doesn't turn into a significant 151 00:06:15,938 --> 00:06:18,104 incident is the second piece of that . 152 00:06:18,104 --> 00:06:20,104 And so that's that's kind of from a 153 00:06:20,104 --> 00:06:22,271 focus standpoint is how do we make the 154 00:06:22,271 --> 00:06:24,493 fourth more mobile and then how we also 155 00:06:24,493 --> 00:06:26,716 make it secure which is actually one of 156 00:06:26,716 --> 00:06:28,882 our line of efforts I'll say strategic 157 00:06:28,882 --> 00:06:30,660 focus areas which is how do you 158 00:06:30,660 --> 00:06:33,790 harmonize cybersecurity and the user 159 00:06:33,790 --> 00:06:35,960 experience ? Yeah which is very 160 00:06:35,970 --> 00:06:37,637 difficult because if the user 161 00:06:37,637 --> 00:06:39,910 experience is bad then either they're 162 00:06:39,910 --> 00:06:42,132 not going to use the capability , we're 163 00:06:42,132 --> 00:06:44,243 gonna find a way around it and as you 164 00:06:44,243 --> 00:06:46,354 know uh they tried if they find a way 165 00:06:46,354 --> 00:06:48,466 around it then you're definitely less 166 00:06:48,466 --> 00:06:50,577 secure than so how do you balance the 167 00:06:50,577 --> 00:06:52,910 security peace with the user experience ? 168 00:06:52,910 --> 00:06:54,688 Yeah that's great . I love that 169 00:06:54,688 --> 00:06:56,799 velocity of action to win . Did I get 170 00:06:56,799 --> 00:06:58,940 that right ? That is that is we ought 171 00:06:58,940 --> 00:07:01,760 to put that on our walls . It's a great 172 00:07:01,760 --> 00:07:03,982 bumper sticker . So you talked a little 173 00:07:03,982 --> 00:07:05,920 bit about the chinese having just 174 00:07:05,920 --> 00:07:07,976 experienced that pretty pretty close 175 00:07:07,976 --> 00:07:11,130 hand being out of pay com can we talk a 176 00:07:11,130 --> 00:07:14,100 little bit more about the threats ? You 177 00:07:14,100 --> 00:07:16,650 know , both D . O . D . Networks and of 178 00:07:16,650 --> 00:07:18,317 course in the dib the defense 179 00:07:18,317 --> 00:07:20,317 industrial base we're getting cyber 180 00:07:20,317 --> 00:07:22,770 attacks every day . So how do we think 181 00:07:22,770 --> 00:07:24,770 about these threats and what do you 182 00:07:24,770 --> 00:07:26,937 recommend is the best course of action 183 00:07:26,937 --> 00:07:29,048 to protect ourselves ? That's great . 184 00:07:29,048 --> 00:07:32,660 I'm I would offer , I'm not certain 185 00:07:32,660 --> 00:07:36,500 there is Really any more attacks and 186 00:07:36,500 --> 00:07:39,000 threats today than there were the last 187 00:07:39,000 --> 00:07:42,400 five years um since I think 2009 . Yes 188 00:07:42,410 --> 00:07:45,780 the the number of of events and attacks 189 00:07:45,780 --> 00:07:47,970 have have increased . Um I think a lot 190 00:07:47,970 --> 00:07:50,192 of that is is because we're starting to 191 00:07:50,192 --> 00:07:52,470 see more of it . Um we have a greater 192 00:07:52,470 --> 00:07:54,692 posture today that than we had before . 193 00:07:54,940 --> 00:07:56,996 Uh , now when you look at the ransom 194 00:07:56,996 --> 00:07:58,996 where and and some things that have 195 00:07:58,996 --> 00:08:01,390 happened within the even the the United 196 00:08:01,390 --> 00:08:04,230 States . Um some incidents are you get 197 00:08:04,230 --> 00:08:06,286 a lot more visibility because of the 198 00:08:06,286 --> 00:08:09,720 impact of it . Um , but I'm not certain 199 00:08:09,720 --> 00:08:12,520 that we've had that much more activity . 200 00:08:12,520 --> 00:08:14,576 It's just we're seeing it a lot more 201 00:08:14,576 --> 00:08:16,409 and there's more effect with the 202 00:08:16,409 --> 00:08:18,631 activity that is actually occurring . I 203 00:08:18,631 --> 00:08:20,853 think the number one thing continues to 204 00:08:20,853 --> 00:08:23,250 be the basic blocking and tackling . Um 205 00:08:23,260 --> 00:08:26,590 If we can continue to improve the 206 00:08:26,590 --> 00:08:28,201 blocking and tackling of the 207 00:08:28,201 --> 00:08:31,880 capabilities . So baking in the cyber 208 00:08:31,880 --> 00:08:34,047 security from the start and all of our 209 00:08:34,047 --> 00:08:36,158 services , all our offerings , all of 210 00:08:36,158 --> 00:08:38,158 our platforms , weapons systems , I 211 00:08:38,158 --> 00:08:40,047 think that's important . And then 212 00:08:40,047 --> 00:08:42,840 making sure that we , from a culture 213 00:08:42,990 --> 00:08:46,210 standpoint , um that individuals are 214 00:08:46,210 --> 00:08:48,590 better educated , better trained and 215 00:08:48,590 --> 00:08:51,620 better understanding the risks that the 216 00:08:51,620 --> 00:08:54,240 department incurs if they're not taking 217 00:08:54,240 --> 00:08:57,410 basic cyber hygiene into account . Um 218 00:08:57,420 --> 00:09:00,870 uh and I think uh S a today still puts 219 00:09:00,870 --> 00:09:03,600 out kind of a top 10 , if you are on 220 00:09:03,600 --> 00:09:05,711 your home computer , here are the top 221 00:09:05,711 --> 00:09:09,070 10 things that you can do to help 222 00:09:09,080 --> 00:09:11,024 improve your cybersecurity posture 223 00:09:11,024 --> 00:09:13,710 won't be perfect , but it really gives 224 00:09:13,710 --> 00:09:15,710 you in a better position . And so I 225 00:09:15,710 --> 00:09:17,766 think working on the culture is also 226 00:09:17,766 --> 00:09:19,932 important and then to get to a point I 227 00:09:19,932 --> 00:09:22,099 mentioned earlier is the resiliency of 228 00:09:22,099 --> 00:09:25,910 your systems Has to be improved so that 229 00:09:25,910 --> 00:09:27,743 if something does happen because 230 00:09:27,750 --> 00:09:30,740 nothing is 100% secure because 100% 231 00:09:30,740 --> 00:09:34,030 secure , it's unusable . How do you 232 00:09:34,030 --> 00:09:36,030 make sure that you have a resilient 233 00:09:36,030 --> 00:09:38,252 infrastructure in place and a resilient 234 00:09:38,252 --> 00:09:41,800 network so that you can um withstand a 235 00:09:41,800 --> 00:09:44,150 potential breach um and you can limit 236 00:09:44,160 --> 00:09:46,438 the amount of of impact of that breach . 237 00:09:46,438 --> 00:09:49,240 So I know you were here before , is the 238 00:09:49,250 --> 00:09:52,500 chief staff I believe . Uh and you 239 00:09:52,500 --> 00:09:54,611 mentioned that you think we're seeing 240 00:09:54,611 --> 00:09:56,722 the threats more . That sounds like a 241 00:09:56,722 --> 00:09:59,610 good thing . That sounds like are we 242 00:09:59,610 --> 00:10:01,980 getting better , what's your What's 243 00:10:01,980 --> 00:10:04,091 your thoughts ? I think we're getting 244 00:10:04,091 --> 00:10:06,258 much better . Again , as I mentioned , 245 00:10:06,258 --> 00:10:08,850 nothing is perfect , nothing 100% . Um 246 00:10:08,860 --> 00:10:10,971 and and as you know it uh in order to 247 00:10:10,971 --> 00:10:13,138 understand the problem you have to see 248 00:10:13,138 --> 00:10:15,590 the problem . Um uh being able to see 249 00:10:15,590 --> 00:10:17,890 that , I think we are far ahead of 250 00:10:17,900 --> 00:10:20,540 where we were five years ago , 10 years 251 00:10:20,540 --> 00:10:23,620 ago . Um I do think the next phase of 252 00:10:23,620 --> 00:10:26,060 this is how do we have a better 253 00:10:26,060 --> 00:10:28,770 understanding of the cyber domain 254 00:10:28,780 --> 00:10:30,613 that's integrated with the other 255 00:10:30,613 --> 00:10:33,330 domains so that you have a common 256 00:10:33,330 --> 00:10:35,330 situational understanding , I don't 257 00:10:35,330 --> 00:10:37,386 wanna say common operational picture 258 00:10:37,386 --> 00:10:39,600 because whenever you use a cop uh it 259 00:10:39,600 --> 00:10:41,767 can mean different things to different 260 00:10:41,767 --> 00:10:43,880 people but it's that improved common 261 00:10:43,880 --> 00:10:46,470 situational understanding to then be 262 00:10:46,470 --> 00:10:48,637 able to do something about it . Yeah . 263 00:10:48,637 --> 00:10:51,430 Yeah that's great . So that sounds very 264 00:10:51,440 --> 00:10:53,980 um uh I love your optimism there . 265 00:10:53,980 --> 00:10:56,147 That's that's encouraging . So talk to 266 00:10:56,147 --> 00:10:58,369 us a little bit about your strategy and 267 00:10:58,369 --> 00:11:01,210 your vision . Yes uh starts with the 268 00:11:01,220 --> 00:11:04,070 velocity of action uh to win um the 269 00:11:04,070 --> 00:11:06,237 other piece that underpins it and then 270 00:11:06,237 --> 00:11:08,070 I'll kind of talk about the five 271 00:11:08,070 --> 00:11:10,590 strategic focus areas . The other 272 00:11:10,600 --> 00:11:13,950 aspect is transparency of understanding , 273 00:11:14,440 --> 00:11:16,384 this gets kind of to the situation 274 00:11:16,384 --> 00:11:18,480 understanding um and whether this is 275 00:11:18,490 --> 00:11:22,260 resourcing uh money and or uh manning 276 00:11:22,740 --> 00:11:26,680 whether it is the um services that 277 00:11:26,680 --> 00:11:28,902 we offer and services that are provided 278 00:11:28,910 --> 00:11:32,010 but having the context around why 279 00:11:32,010 --> 00:11:34,066 things are done . Having the context 280 00:11:34,066 --> 00:11:36,940 around how we how we as an agency or 281 00:11:36,940 --> 00:11:39,051 how we as a department have have come 282 00:11:39,051 --> 00:11:41,130 up with pricing models , having that 283 00:11:41,140 --> 00:11:43,510 transparency of understanding really 284 00:11:43,510 --> 00:11:45,860 helps the conversations and more 285 00:11:45,860 --> 00:11:47,860 importantly helps the understanding 286 00:11:47,860 --> 00:11:49,749 from a mission partner standpoint 287 00:11:49,749 --> 00:11:51,971 because I'll tell you that we cannot do 288 00:11:51,971 --> 00:11:54,280 our jobs . Uh and and this it would not 289 00:11:54,280 --> 00:11:56,447 be as successful as it is nor with the 290 00:11:56,447 --> 00:11:58,669 Joint for Secretary Dodon . Without the 291 00:11:58,669 --> 00:12:00,836 partnerships that we have um Before we 292 00:12:00,836 --> 00:12:02,780 went on camera we kind of talked a 293 00:12:02,780 --> 00:12:04,836 little bit about um the partnerships 294 00:12:04,836 --> 00:12:06,836 between N . S . A . Cyber command . 295 00:12:06,836 --> 00:12:09,230 This joint for Cyclers dough and uh the 296 00:12:09,230 --> 00:12:11,510 service cyber components and D . C . I . 297 00:12:11,510 --> 00:12:13,677 O . I offer is the best that it's ever 298 00:12:13,677 --> 00:12:16,980 been . Um all you can see the 299 00:12:16,990 --> 00:12:18,830 enthusiasm and the excitement as 300 00:12:18,840 --> 00:12:20,784 individuals are getting together , 301 00:12:20,940 --> 00:12:23,107 partnering , teaming and getting after 302 00:12:23,107 --> 00:12:25,329 the problem sets that we have before us 303 00:12:25,740 --> 00:12:28,240 as we look at our priorities and our 304 00:12:28,240 --> 00:12:32,000 strategic focus areas . one thing that 305 00:12:32,010 --> 00:12:35,170 I would offer is a no fail mission from 306 00:12:35,170 --> 00:12:38,710 an agency standpoint is command and 307 00:12:38,710 --> 00:12:41,840 control . And how do we modernize 308 00:12:41,840 --> 00:12:44,990 command and control ? A lot of your 309 00:12:44,990 --> 00:12:47,090 listeners may or may not know and 310 00:12:47,090 --> 00:12:48,979 understand . The President United 311 00:12:48,979 --> 00:12:50,590 States uh the White House 312 00:12:50,590 --> 00:12:52,423 Communications Agency , which is 313 00:12:52,423 --> 00:12:54,870 administratively line to lisa is the 314 00:12:54,870 --> 00:12:58,160 voice of the president . So how do we 315 00:12:58,160 --> 00:13:00,860 make sure that at any point in time 316 00:13:01,240 --> 00:13:04,160 that the President United States can 317 00:13:04,280 --> 00:13:07,260 talk to and or provide direction to the 318 00:13:07,260 --> 00:13:09,038 fielded forces to the combatant 319 00:13:09,038 --> 00:13:11,660 commanders or even have a discussion 320 00:13:11,660 --> 00:13:13,438 with the head of state . Pretty 321 00:13:13,438 --> 00:13:15,604 important . Yes . Combatant commanders 322 00:13:16,340 --> 00:13:18,562 have to have the ability to communicate 323 00:13:18,562 --> 00:13:20,562 and provide command and control and 324 00:13:20,562 --> 00:13:22,690 direction to their forces and it goes 325 00:13:22,700 --> 00:13:24,740 back upstream to write our fielded 326 00:13:24,740 --> 00:13:26,962 forces have to be able to communicate , 327 00:13:26,962 --> 00:13:30,070 you know , connect and protect and 328 00:13:30,080 --> 00:13:32,700 secure . Being able to make it to 329 00:13:32,700 --> 00:13:34,800 modernize our commanding control and 330 00:13:34,800 --> 00:13:36,633 make sure that whether strategic 331 00:13:36,633 --> 00:13:38,744 competition which we are in today and 332 00:13:38,744 --> 00:13:40,950 each and every day or the bad day , 333 00:13:41,340 --> 00:13:43,118 right where there's a potential 334 00:13:43,118 --> 00:13:45,340 conflict in the future , we've gotta be 335 00:13:45,340 --> 00:13:47,173 able that that whole spectrum of 336 00:13:47,173 --> 00:13:49,430 operations . So I'll say I won't say 337 00:13:49,430 --> 00:13:51,550 are necessary number one priority but 338 00:13:51,550 --> 00:13:53,717 the no fail mission priority is how do 339 00:13:53,717 --> 00:13:55,690 we modernize command control ? The 340 00:13:55,690 --> 00:13:57,523 other thing I'll offer to to the 341 00:13:57,523 --> 00:14:01,290 listeners is how do we improve 342 00:14:01,290 --> 00:14:03,640 readiness and our force posture through 343 00:14:03,640 --> 00:14:07,280 innovation ? Um I don't throw around 344 00:14:07,280 --> 00:14:10,860 the innovation does work a lot . Um but 345 00:14:10,860 --> 00:14:13,500 we have a lot of self defense calls 346 00:14:13,510 --> 00:14:16,010 vulnerable systems . Right . The old 347 00:14:16,010 --> 00:14:18,121 legacy systems , vulnerable systems . 348 00:14:18,440 --> 00:14:20,662 How do we make sure that they are ready 349 00:14:20,662 --> 00:14:23,920 to go at a moment's notice as necessary 350 00:14:23,930 --> 00:14:26,460 in this competition to through crisis 351 00:14:26,460 --> 00:14:29,700 to conflict while also leaping forward 352 00:14:30,140 --> 00:14:33,120 with innovation to modernize and to 353 00:14:33,120 --> 00:14:35,176 improve the services , offerings and 354 00:14:35,176 --> 00:14:37,120 capabilities . How do we take full 355 00:14:37,120 --> 00:14:38,898 advantage of robotics , process 356 00:14:38,898 --> 00:14:40,953 automation as an example ? How do we 357 00:14:40,953 --> 00:14:42,564 take advantage of artificial 358 00:14:42,564 --> 00:14:44,509 intelligence , machine learning to 359 00:14:44,509 --> 00:14:46,620 really get after the capabilities and 360 00:14:46,620 --> 00:14:48,676 services that we're providing ? I'll 361 00:14:48,676 --> 00:14:50,509 see the third area is how do you 362 00:14:50,509 --> 00:14:52,960 leverage data as a center of gravity 363 00:14:53,840 --> 00:14:56,560 coming from from when we met ? Right 364 00:14:56,570 --> 00:14:59,340 and and and what you did for um signals 365 00:14:59,340 --> 00:15:01,451 intelligence and what you did for the 366 00:15:01,451 --> 00:15:03,673 friend ? I say you were at the heart of 367 00:15:03,673 --> 00:15:05,673 leveraging data as a senator grab . 368 00:15:05,673 --> 00:15:07,729 Absolutely . I would offer offer the 369 00:15:07,729 --> 00:15:09,896 Department of Defense is still working 370 00:15:09,896 --> 00:15:12,007 through this and and still learning a 371 00:15:12,007 --> 00:15:14,007 lot . Uh We have a joint artificial 372 00:15:14,007 --> 00:15:16,007 intelligence center now that that's 373 00:15:16,007 --> 00:15:15,910 been set up for for a few years . Who's 374 00:15:15,910 --> 00:15:17,743 really taking hold of artificial 375 00:15:17,743 --> 00:15:19,743 intelligence and machine learning . 376 00:15:19,743 --> 00:15:21,799 That's what we want to do within the 377 00:15:21,799 --> 00:15:23,410 agency to is there's so much 378 00:15:23,410 --> 00:15:25,632 information out there . There's so much 379 00:15:25,632 --> 00:15:27,799 sensor , there's so much data . How do 380 00:15:27,799 --> 00:15:29,966 you bring all that together to be more 381 00:15:29,966 --> 00:15:32,020 proactive and as an example , um 382 00:15:32,030 --> 00:15:35,140 instead of having users be canaries 383 00:15:35,150 --> 00:15:37,372 that hey , we have a problem within the 384 00:15:37,372 --> 00:15:39,710 network or within the system that the 385 00:15:39,710 --> 00:15:43,060 system already has symptoms 386 00:15:43,540 --> 00:15:45,762 that we just , we don't see because the 387 00:15:45,762 --> 00:15:47,984 data is not being leveraged . If we can 388 00:15:47,984 --> 00:15:49,929 leverage that information in those 389 00:15:49,929 --> 00:15:51,762 sensors , then maybe we can know 390 00:15:51,762 --> 00:15:54,260 beforehand . That problem is coming and 391 00:15:54,270 --> 00:15:56,326 we can take advantage of it . I know 392 00:15:56,326 --> 00:15:58,437 industry is doing that already . Uh , 393 00:15:58,437 --> 00:16:00,659 but that's what , that's something that 394 00:16:00,659 --> 00:16:00,490 we're trying to do . I'll say that the 395 00:16:00,490 --> 00:16:02,212 fourth area which gets back to 396 00:16:02,212 --> 00:16:04,434 something we talked a little earlier on 397 00:16:04,434 --> 00:16:06,300 is this cybersecurity and user 398 00:16:06,300 --> 00:16:09,800 experience and how do you harmonize 399 00:16:09,810 --> 00:16:13,180 those two together so that you can use 400 00:16:13,180 --> 00:16:15,810 the example with our team . Uh when I 401 00:16:15,810 --> 00:16:18,560 was at Air forces cyber and , and we 402 00:16:18,560 --> 00:16:20,782 were in charge of the air Force network 403 00:16:20,840 --> 00:16:24,090 and we were having a bad day . Uh , 404 00:16:24,100 --> 00:16:26,320 individuals couldn't get on for for a 405 00:16:26,330 --> 00:16:28,441 variety of reasons . And my four star 406 00:16:28,441 --> 00:16:31,670 boss called me and basically asked or 407 00:16:31,670 --> 00:16:33,892 told me he was bob just so , you know , 408 00:16:33,892 --> 00:16:36,390 it took me three songs to get onto the 409 00:16:36,390 --> 00:16:38,830 network this morning and he had a 410 00:16:38,830 --> 00:16:42,510 direct connection and and um , 411 00:16:42,520 --> 00:16:46,070 depending on what songs you like songs 412 00:16:46,070 --> 00:16:48,237 usually last 34 or five minutes , some 413 00:16:48,237 --> 00:16:50,292 last nine minutes for the other ones 414 00:16:50,292 --> 00:16:52,348 that , that's a very long time to be 415 00:16:52,348 --> 00:16:54,780 able to log in And a lot of it was the 416 00:16:54,780 --> 00:16:56,836 cybersecurity and the configurations 417 00:16:56,836 --> 00:16:59,058 that were put in place , um didn't make 418 00:16:59,058 --> 00:17:01,224 it usable . And so a lot of great work 419 00:17:01,224 --> 00:17:03,169 over the last few years to kind of 420 00:17:03,169 --> 00:17:05,280 continue to to improve that . But how 421 00:17:05,280 --> 00:17:07,502 do we harmonize that ? Um , and whether 422 00:17:07,502 --> 00:17:09,613 it's just logging into the network or 423 00:17:09,613 --> 00:17:11,502 whether it's a weapon system that 424 00:17:11,502 --> 00:17:13,613 you're trying to um make sure is it's 425 00:17:13,613 --> 00:17:15,502 good to go that that's what we're 426 00:17:15,502 --> 00:17:17,558 working . And then the final piece , 427 00:17:17,558 --> 00:17:16,970 I'll tell you which , which I think is 428 00:17:16,980 --> 00:17:19,202 continues to be the number one priority 429 00:17:19,202 --> 00:17:21,369 across the board is how do you empower 430 00:17:21,369 --> 00:17:24,670 the workforce ? We have so much talent 431 00:17:24,680 --> 00:17:27,190 uh , as you know , where you worked , 432 00:17:27,200 --> 00:17:29,460 we have so much talent within the 433 00:17:29,460 --> 00:17:32,370 department within the organizations and 434 00:17:32,380 --> 00:17:35,820 being able to unleash that talent . Get 435 00:17:35,820 --> 00:17:39,190 rid of the , the bureaucracy , get rid 436 00:17:39,190 --> 00:17:41,412 of the artificial barriers that we have 437 00:17:41,412 --> 00:17:43,523 out there . And uh term that I picked 438 00:17:43,523 --> 00:17:45,468 up from a good friend of mine many 439 00:17:45,468 --> 00:17:47,780 years ago is every organization has 440 00:17:47,790 --> 00:17:49,734 these things we call institutional 441 00:17:49,734 --> 00:17:52,130 silliness . Uh those things that are , 442 00:17:52,140 --> 00:17:54,360 it's just , it inhibits individual's 443 00:17:54,360 --> 00:17:57,060 ability to be the best of themselves . 444 00:17:57,440 --> 00:17:59,700 Uh So how do you have an environment 445 00:17:59,710 --> 00:18:01,321 and a culture that's free of 446 00:18:01,321 --> 00:18:03,432 discrimination , free of harassment , 447 00:18:03,432 --> 00:18:07,360 but also minimize bureaucracy as 448 00:18:07,360 --> 00:18:09,527 much as possible so that they can just 449 00:18:09,840 --> 00:18:12,330 show their talents and whether that's 450 00:18:12,330 --> 00:18:14,552 at the mid level senior level of junior 451 00:18:14,552 --> 00:18:16,719 level , it doesn't matter . And so how 452 00:18:16,719 --> 00:18:18,830 do you have the organizational design 453 00:18:19,040 --> 00:18:21,151 that's set up to enable that ? That's 454 00:18:21,151 --> 00:18:24,580 so powerful that you unleash that power 455 00:18:24,580 --> 00:18:26,780 you're going to be , you just have to 456 00:18:26,780 --> 00:18:29,270 stand back and watch . Exactly . Yes . 457 00:18:30,010 --> 00:18:31,954 That's our job as senior leaders , 458 00:18:31,954 --> 00:18:33,621 right ? Is how do we set that 459 00:18:33,621 --> 00:18:36,420 environment up and then just stand back , 460 00:18:36,420 --> 00:18:38,760 sit back and just smile and watch as 461 00:18:38,760 --> 00:18:40,950 they just go tackle the toughest 462 00:18:40,950 --> 00:18:43,172 challenges . Yeah , that's great . Well 463 00:18:43,172 --> 00:18:45,394 listen , I know there's a lot of people 464 00:18:45,394 --> 00:18:47,394 in this audience , including myself 465 00:18:47,394 --> 00:18:49,510 that want to see you succeed and help 466 00:18:49,520 --> 00:18:51,780 as much as we can . So what kind of 467 00:18:51,780 --> 00:18:54,680 capabilities are you looking to invest 468 00:18:54,680 --> 00:18:56,847 in that you need that you don't have ? 469 00:18:57,240 --> 00:18:59,220 How do you want to leverage the 470 00:18:59,220 --> 00:19:01,610 industrial base ? Yes , I will tell you 471 00:19:01,610 --> 00:19:03,777 the biggest thing from industrial base 472 00:19:03,777 --> 00:19:05,950 standpoint is how do we leverage the 473 00:19:05,950 --> 00:19:08,070 research and development that the 474 00:19:08,070 --> 00:19:10,292 industrial base has across a variety of 475 00:19:10,292 --> 00:19:13,060 areas ? Perfect example is identity 476 00:19:13,060 --> 00:19:16,160 management . Yeah . I I don't think I 477 00:19:16,160 --> 00:19:18,890 have my cat card on me . Um It's over 478 00:19:18,890 --> 00:19:22,540 there . Um I have this this notion of 479 00:19:22,550 --> 00:19:25,410 this little mantra of I want to kill 480 00:19:25,410 --> 00:19:29,270 the CAC um as a as the primary 481 00:19:29,270 --> 00:19:31,270 authentication mechanism for the 482 00:19:31,270 --> 00:19:33,920 department . Oh now we have to have 483 00:19:33,920 --> 00:19:36,880 something that's better industry has 484 00:19:36,880 --> 00:19:39,500 been been , I'll say using other 485 00:19:39,500 --> 00:19:41,470 authentication mechanisms , other 486 00:19:41,470 --> 00:19:43,280 things for leveraging identity 487 00:19:43,280 --> 00:19:46,540 management access control . Um I want 488 00:19:46,540 --> 00:19:48,920 to leverage that we want to leverage 489 00:19:48,920 --> 00:19:51,690 that technology to be able to provide 490 00:19:51,700 --> 00:19:53,867 greater options . So it's not just two 491 00:19:53,867 --> 00:19:55,922 factor authentication but it's truly 492 00:19:55,922 --> 00:19:57,990 multi factor and it's with the 493 00:19:57,990 --> 00:19:59,990 individual , it's with the device , 494 00:19:59,990 --> 00:20:02,420 it's so identity management and I can 495 00:20:02,420 --> 00:20:05,190 to me is the foundation for everything 496 00:20:05,190 --> 00:20:07,134 else that we want to do within the 497 00:20:07,134 --> 00:20:09,190 within the department to improve the 498 00:20:09,190 --> 00:20:11,412 security so that we understand and know 499 00:20:11,440 --> 00:20:14,220 that an individual uh is who they say 500 00:20:14,220 --> 00:20:17,420 they are um is coming from a place that 501 00:20:17,420 --> 00:20:21,050 is secure and has the right 502 00:20:21,060 --> 00:20:24,640 um I'll say privileges and 503 00:20:24,640 --> 00:20:27,050 access is to the to the right data 504 00:20:27,740 --> 00:20:29,740 that's what I want to get to have a 505 00:20:29,740 --> 00:20:31,629 data centric environment versus a 506 00:20:31,629 --> 00:20:34,830 network centric environment . How we 507 00:20:34,830 --> 00:20:37,070 can leverage what industry is doing to 508 00:20:37,070 --> 00:20:39,292 kind of change the culture , change the 509 00:20:39,292 --> 00:20:42,120 mindset and also change the department 510 00:20:42,120 --> 00:20:43,953 to really get at the data center 511 00:20:43,953 --> 00:20:46,470 environment less concerned about the 512 00:20:46,480 --> 00:20:48,440 infrastructure per se and more 513 00:20:48,440 --> 00:20:50,440 concerned about how do we make sure 514 00:20:50,440 --> 00:20:52,750 that the data is protected and and that 515 00:20:52,760 --> 00:20:56,360 uh that the data is is secure , 516 00:20:57,140 --> 00:20:59,620 We're really looking at the future of 517 00:20:59,620 --> 00:21:02,970 the super net and secure environment 518 00:21:02,980 --> 00:21:05,830 and how we take advantage of technology 519 00:21:05,830 --> 00:21:07,663 today , how we take care of what 520 00:21:07,663 --> 00:21:09,960 industry is able to do to really 521 00:21:09,960 --> 00:21:12,490 transform , not just modernize but how 522 00:21:12,490 --> 00:21:14,710 do we transform so that we can truly 523 00:21:14,710 --> 00:21:17,120 have the multifactor , multi level 524 00:21:17,120 --> 00:21:20,470 security , multi level environment uh 525 00:21:20,480 --> 00:21:22,670 so that it doesn't matter where you're 526 00:21:22,670 --> 00:21:25,290 trying to go that you can get access to 527 00:21:25,290 --> 00:21:27,457 it from each other , right ? The right 528 00:21:27,457 --> 00:21:30,010 privileges and access is you have to 529 00:21:30,010 --> 00:21:33,330 provide that worldwide forces 530 00:21:33,340 --> 00:21:36,140 worldwide , globally and well as well 531 00:21:36,140 --> 00:21:38,260 as our mission partners and our 532 00:21:38,260 --> 00:21:40,427 coalition partners . Right . So how do 533 00:21:40,427 --> 00:21:43,570 we as a department working with um uh 534 00:21:43,580 --> 00:21:45,636 you know , the other thing we talked 535 00:21:45,636 --> 00:21:47,747 about from a partnership standpoint , 536 00:21:47,747 --> 00:21:49,691 um as I've been back For about six 537 00:21:49,691 --> 00:21:51,636 months , I think the service cyber 538 00:21:51,636 --> 00:21:53,910 components within the department , the 539 00:21:53,920 --> 00:21:56,360 service CeoS Chief Information Officers 540 00:21:56,740 --> 00:21:59,660 And the service 6es , best 541 00:21:59,660 --> 00:22:02,090 relationships that I've seen since I've 542 00:22:02,090 --> 00:22:05,330 been in in the department , everyone 543 00:22:05,330 --> 00:22:07,552 wants , everyone is growing in the , in 544 00:22:07,552 --> 00:22:09,719 the same direction , everyone wants to 545 00:22:09,719 --> 00:22:11,497 get after this , to improve the 546 00:22:11,497 --> 00:22:13,608 experiences , improve the security um 547 00:22:13,608 --> 00:22:15,441 and improve the overall capacity 548 00:22:15,441 --> 00:22:17,552 capability of the department . Yeah , 549 00:22:17,552 --> 00:22:19,663 that's great . That's , that's really 550 00:22:19,663 --> 00:22:21,886 great to hear . So you mentioned you've 551 00:22:21,886 --> 00:22:24,052 been back about six months , what is , 552 00:22:24,052 --> 00:22:26,274 I'm just curious what has surprised you 553 00:22:26,274 --> 00:22:29,360 the most any big surprises that 554 00:22:30,040 --> 00:22:32,990 in your , in your role now , I'll say 555 00:22:33,000 --> 00:22:36,060 it wasn't really a surprise . It is 556 00:22:36,540 --> 00:22:40,240 uh yeah , I mean it is how much the 557 00:22:40,240 --> 00:22:42,860 organizations have matured . Yeah , 558 00:22:42,870 --> 00:22:46,010 that's great . It's good when ST john 559 00:22:46,010 --> 00:22:48,910 for suckers for example , um when 560 00:22:48,910 --> 00:22:51,021 you're in the fight , standing up the 561 00:22:51,021 --> 00:22:53,250 organization , um you're spending a lot 562 00:22:53,250 --> 00:22:55,690 of time just building the foundation 563 00:22:55,700 --> 00:22:59,260 and working the the resourcing 564 00:22:59,260 --> 00:23:01,990 piece . Um and and sometimes you lose 565 00:23:01,990 --> 00:23:04,130 sight of kind of how , how fast you 566 00:23:04,130 --> 00:23:06,186 grow and then when you go away for a 567 00:23:06,186 --> 00:23:08,340 little bit and then you come back and 568 00:23:08,340 --> 00:23:12,010 you see , wow , um these 569 00:23:12,010 --> 00:23:14,530 individuals , these great professionals 570 00:23:14,540 --> 00:23:17,970 have just skyrocketed and improve the 571 00:23:17,970 --> 00:23:21,190 maturation . Um it used to be when jhk 572 00:23:21,190 --> 00:23:23,301 dot would put out an order , it would 573 00:23:23,301 --> 00:23:27,170 be like um very hard to get people to 574 00:23:27,170 --> 00:23:29,340 respond very hard to get people to 575 00:23:29,340 --> 00:23:31,430 follow the direction . We don't have 576 00:23:31,430 --> 00:23:34,340 any more . That's great . We have 44 577 00:23:34,350 --> 00:23:36,406 area of operations which continually 578 00:23:36,406 --> 00:23:38,572 changes , can continue to change based 579 00:23:38,572 --> 00:23:41,620 on the environment . And there's not a 580 00:23:41,620 --> 00:23:45,090 discussion of whether you can direct 581 00:23:45,090 --> 00:23:47,390 that or not . The discussion is really 582 00:23:47,390 --> 00:23:49,660 about what , you know , help us 583 00:23:49,660 --> 00:23:51,827 understand the threat , Here's what we 584 00:23:51,827 --> 00:23:53,827 need to get after the problem ? And 585 00:23:53,827 --> 00:23:55,938 here's a , here's how long it's gonna 586 00:23:55,938 --> 00:23:58,160 take ? So that really gets at the um 587 00:23:58,170 --> 00:24:00,114 the aspect of , we're not worrying 588 00:24:00,114 --> 00:24:02,281 about a lot of other things we used to 589 00:24:02,281 --> 00:24:04,503 and we can really drive a proactive and 590 00:24:04,503 --> 00:24:07,650 active defensive posture for the 591 00:24:07,650 --> 00:24:10,570 department . Yeah , that's great . Well , 592 00:24:10,570 --> 00:24:12,792 listen sir , I really want to say thank 593 00:24:12,792 --> 00:24:14,848 you , thank you both for your time , 594 00:24:14,848 --> 00:24:16,681 thank you to you and your entire 595 00:24:16,681 --> 00:24:18,848 organization here . That works so hard 596 00:24:18,848 --> 00:24:20,848 every day to protect all of us were 597 00:24:20,848 --> 00:24:23,014 really appreciative of that and before 598 00:24:23,014 --> 00:24:25,610 we close , is there anything that I 599 00:24:25,610 --> 00:24:27,554 didn't ask you that we didn't talk 600 00:24:27,554 --> 00:24:29,777 about that you'd like to share with the 601 00:24:29,777 --> 00:24:31,930 audience , uh I would just share with 602 00:24:31,930 --> 00:24:33,986 the audience , um we talked a little 603 00:24:33,986 --> 00:24:36,510 bit about the velocity of action um to 604 00:24:36,510 --> 00:24:40,400 win , to win , the 605 00:24:40,410 --> 00:24:42,900 threat is real . Um and and we see it 606 00:24:42,900 --> 00:24:45,980 every day . Um all you have to do is is 607 00:24:45,980 --> 00:24:48,390 look at the newspapers and or online , 608 00:24:48,400 --> 00:24:50,289 you know , either either physical 609 00:24:50,289 --> 00:24:52,430 newspaper or online to realize that 610 00:24:52,430 --> 00:24:54,780 cyber security is very important . Um 611 00:24:54,780 --> 00:24:57,450 and the ability of a department to 612 00:24:57,460 --> 00:24:59,790 really get after that piece of it to 613 00:24:59,790 --> 00:25:01,957 make sure that at the timing and tempo 614 00:25:01,957 --> 00:25:05,220 of of the mission that it's going to be 615 00:25:05,220 --> 00:25:09,020 available um is very important . And 616 00:25:09,030 --> 00:25:11,730 we and you have a mission partner in 617 00:25:11,730 --> 00:25:13,897 the Defense Information Systems Agency 618 00:25:13,897 --> 00:25:15,952 and the Joint Force Headquarters dot 619 00:25:15,952 --> 00:25:18,008 and and I think the partnership with 620 00:25:18,008 --> 00:25:20,174 industry is very strong and we want to 621 00:25:20,174 --> 00:25:22,341 continue that partnership and continue 622 00:25:22,341 --> 00:25:24,550 um improving that , that partnership 623 00:25:24,550 --> 00:25:26,328 and leveraging the technology , 624 00:25:26,328 --> 00:25:28,550 leveraging the research and development 625 00:25:28,550 --> 00:25:30,606 to really get after the problems and 626 00:25:30,606 --> 00:25:32,772 the challenges that we have it because 627 00:25:32,772 --> 00:25:34,883 because there's a lot of challenges , 628 00:25:34,883 --> 00:25:34,410 but through every challenge is the 629 00:25:34,410 --> 00:25:36,632 opportunity . That's absolutely , thank 630 00:25:36,632 --> 00:25:37,970 you . Thank you . Whoa .