Leader Blog

Author: CIO/G-6 Created: 12/22/2010 3:02 PM
CIO/G6 Leader Blog
By CIO/G-6   on 10/28/2015 9:12 AM

by COL Greg Conti
Director, Army Cyber Institute

One of the challenges created by the ubiquity of Internet connected devices we use every day is the manner in which we interact with our devices as different user roles. If you are at work, on the Department of Defense Information Network (DoDIN), chances are you are a general user, with very little ability to alter your system other than through ordinary use. Even as an information security specialist and cyber officer, my current workstation restricts me to the rights and privileges afforded to any other general user. At home, on our laptop, tablet, or phone, however, we mostly operate as privileged users, often with complete control of security, updates, software, and use. On our personal devices we assume personal responsibility for the way we use our devices, the software we install, and the security of our data. As users we must be able to resolve the differences in our user roles and act with diligence across domains and devices.

By CIO/G-6   on 10/15/2015 2:03 PM

by LTG Edward C. Cardon
Commanding General, U.S. Army Cyber Command

Today our Army’s successful execution of Unified Land Operations relies heavily upon cyberspace to deliver combat power to the tactical edge. Cyberspace facilitates unprecedented connectivity and flow of information required for mission command, intelligence, maneuver, fires, protection, and sustainment that helps enable our ground combat units to achieve overmatch against our adversaries. At the same time, reliance on cyberspace has made our Army vulnerable to a wide range of cyber threats.

By CIO/G-6   on 10/5/2015 9:08 AM

by Lt. Gen. Robert S. Ferrell, Chief Information Officer, G-6

October is Army Cybersecurity Awareness Month – our annual campaign to improve the Army’s security posture by increasing awareness of organizational cybersecurity practices and training. It is an opportunity to build a culture of cybersecurity awareness throughout our entire workforce. This year's theme is “Stay Protected While Connected” which appropriately emphasizes individual and leader responsibilities for protecting the Army against cybersecurity threats that endanger personnel, compromise operations, and consume resources.

By CIO/G-6   on 8/31/2015 10:34 AM

by Lt. Gen. Robert S. Ferrell, Chief Information Officer, G-6

In addition to the joint force, the Army operates alongside a wide array of mission partners. These partners include allied and coalition members, international agencies and non-governmental organizations. As a result, the Mission Partner Environment (MPE) creates complex interoperability and communication challenges. I just returned from Gaborone, Botswana where I had the opportunity to observe elements of AFRICA ENDEAVOR (AE).

AE is U.S. Africa Command's (USAFRICOM) J6 Capstone engagement and annual, five-day Senior Leader Communications Symposium, focused on strategic level Command, Control, Communications and Computers (C4) Techniques, Tactics, and Procedures (TTPs) to encourage communications interoperability and information sharing among our African partners. To date, through Africa Endeavor our partners have trained more than 1,800 communications specialists and military planners in C4 techniques, tactics and procedures. This year AE had participants from 40 African nations, six non-African partner nations, six international organizations, and all USAFRICOM components.

AKO Facebook Twitter Flickr Youtube Vimeo
Contact Us Accessibility Privacy & Security FOIA