CYBERCOM Elevated To Full Combatant Command Status

US Defense Secretary Ash Carter is considering turning US Cyber Command into a full combatant command, an acknowledgment that cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

Pentagon leaders long have said that cyber has joined land, sea, air, and space as a new warfare domain. Especially in cyberspace, Carter said at the Center for Strategic and International Studies in Washington, “our reliance on technology has given us great strengths and great opportunities, but also led to vulnerabilities that adversaries are eager to exploit,”  

It is time, Carter said, to “consider changes to Cyber’s role in DOD’s Unified Command Plan.”

The military is currently organized into nine COCOMs: six geographic commands (Pacific, Europe, Africa, Middle East, etc.) and three that field specialized capabilities: special operations, nuclear (strategic) forces, and transportation. US Cyber Command, or CYBERCOM, is currently a sub-unified command under U.S. Strategic Command.

“I have given Cyber Command in the ISIL fight its first wartime assignment,” Carter said recently, referring to the historic role that network experts are playing in the Mosul offensive, described primarily as disrupting the group’s communications, command, and control capabilities.

“Increasingly, I’ve brought Strategic Command and Cyber Command into these operations as well to leverage their unique capabilities in space and cyber to contribute to the defeat of ISIL. Beyond terrorism,” Carter said. “A couple of years ago, that would never have occurred to a secretary of defense.”

The calculation has changed largely as a result of ISIS’s own behavior and what the Defense Department perceives as the need to fight ISIS on the group’s own turf, inside online communications networks. He described the thinking as: “Hey, these guys are using this tool. We need to take it away.”

Adm. Michael Rogers, commander of Cyber Command, told the Senate his unit was ready for the upgrade. Appearing before the Senate Armed Services Committee, he discussed the future of the fledgling Cyber Mission Force and defending networks and as part of the so-called Third Offset, the Defense Department’s bid to develop technologies to secure technological advantage. “USCYBERCOM stands ready to help develop and deploy the new cyber capabilities entailed in the Third Offset, particularly hardened command and control networks and autonomous countermeasures to cyber attack,” he said.

Becoming a Combatant Command “would allow us to be faster, which would generate better mission outcomes,” he said.

DefenseOne

« Convoy Of Self Driving Trucks Completes European Cross-Border Trip
#PanamaPapers: The Biggest Leak In History »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.