Two top Army officials join Defense News to talk about how the force can hit the accelerator when it opens a tech advantage on competitors.
Show More Show Less View Video Transcript
0:00
All right, welcome back everyone. I'm Jen Judson, Land Warfare Reporter for Defense News, and I'm joined by Brandon Pugh, Principal Cyber Advisor to the Secretary of the Army and Lieutenant General Jeth Wray, Deputy Chief of Staff G6, U.S. Army
0:14
Gentlemen, thank you so much for joining me today to talk about the Army's tech advantage
0:21
You know, not a lot of people actually know what it is you do, Mr. Pugh
0:26
It's a pretty new job within the Army. So I'd love if you could kind of kick off, you know, what your job is
0:34
maybe a little bit on your background, like how you came into this position
0:39
And for you, General Ray, if you could talk a little bit about what the G6 is and how you kind of tie together and work together
0:45
Awesome. Yeah, no, happy to. Jen, really glad to be here at AUSA. I have to admit, my first AUSA
0:49
I guess I'm embarrassed to say that, but so I've been the principal cyber advisor of the PCA for
0:54
about four months. And if you're not familiar with the PCA, it is a fairly new role. We've only been
0:59
around since 2020. And at its core, we're there to be the principal advisor to the secretary of the
1:04
army, as well as the chief of staff on all things cyber. So the statute is very prescriptive. We have
1:09
seven responsibilities, everything from how we man, train, equip, how are we doing acquisitions
1:14
How are we defending Army networks from a policy and governance perspective
1:18
And then also we have the Budget Certification Authority, which is a unique authority our office has
1:22
essentially reviewing all the money we spend on cyberspace operations. But I'm the first political appointee, so I was really fortunate to be appointed by President Trump with the support of Secretary Driscoll
1:32
We have a phenomenal Army team that's come together, awesome military partners like General Ray
1:37
So really, really glad to be in the Army. General Ray? Yeah, thank you
1:42
Thank you so much, Jen. and I appreciate it. And so this is my first AUSA as the G6 of the Army
1:47
So I'm proud to be your Army G6. And so my role, advisor to the Chief of Staff of the Army
1:54
but also I implement all the policies between the PCA, anything that he would like to see in cyber security environment
2:00
and for the Chief Information Officer, Mr. Garciaga as well. So I also do implementation of all those policies as well
2:08
Okay. I want to ask sort of a broad question here, but the Army often talks about speed of relevance
2:15
So from your vantage points, cyber network modernization, what are some of the biggest bottlenecks that still slow down
2:23
how quickly the Army fields new technology? Is it technical, cultural, bureaucratic
2:30
a nice lovely mix of all those things? Let's just talk at sort of the high level on that, if you can
2:37
I think it's all the above. I think we're in a time right now where it's a cultural shift that we're kind of walking into
2:48
There's some policies that probably need to be identified in order to be changed
2:53
in order for us to use things like AI, machine learning, large language models, those things in our space
2:59
Because those are all new, coming on board. So some policies we'll have to adjust on the way we use it, especially at the edge
3:06
And now we can talk a little deeper about how we want to use AI at the edge a little bit later
3:11
But yeah, I think across the board, it's a cultural shift. And we're getting there one day at a time
3:19
Yeah, I think General Ray's right. This is a unique time for the Army. I don't know how many people had the opportunity to listen to Secretary Driscoll this morning
3:26
But, you know, the Army is really preparing for that future fight, making sure we stay ahead of these threats through what we call continuous transformation
3:33
And that's not just a buzzword or a simple reorganization. It is a holistic view by the secretary and the chief to make sure the army is prepared for that future fight
3:41
And obviously, technology, cyber, AI, drones are all central to that. And it's really making sure we stay ahead of adversaries
3:50
Absolutely. Can you give me an example where a program sort of broke through the friction
3:56
And what lessons you learned from that in recent experience? Yeah. Do you want me to start off
4:02
I can talk about next generation command and control. I know everybody talks about that
4:07
So, you know, we had tons and tons of disparate, you know, C2 systems that were out there, 13 systems to be exact
4:15
You know, AFAT has a couple of different ones. So what we decided to do is look at an ecosystem that could potentially replace that
4:22
And next generation command and control is something that we looked at. Now, that was built off of the predication of everything we did within C2 fix
4:30
organizations were working from 82nd, 101st, and 25th Infantry Division did the C2 fixed portion
4:39
which really leveraged all that we learned there into what we're doing with NextGen C2 with the
4:44
fourth ID, which is our first prototype organization. So again, NextGen C2, a full stack
4:51
What we're doing on the acceleration portion of it is we're looking at the infrastructure and the
4:58
transport portion of it on how we can accelerate that across all 19 divisions in a 30-month sprint
5:04
And I believe if we can put that transport and infrastructure in place, which is the
5:09
highway that we need in order for everything from the data and application layer to lay
5:13
on top of that, we're going to be in a really, really good place. Yeah, I think General Ray is right
5:19
I mean, maybe to kind of touch on something that's near and dear to my heart is AI, but
5:24
specific for our AI relates to cybersecurity. And I know this could be an entire panel in itself, but I think what we're seeing in AI at the business use case at enterprise level is extraordinary
5:34
Our CIO with the G6 are doing great work. I'm really passionate about how do we move AI to operational use cases, specifically cyber
5:42
So, for instance, how can AI be leveraged for cyber defense? And equally as important, how can we leverage it for cyber offense
5:48
And really seeing both sides of that. And in fairness, Army Cyber Command, I would say, is really the leader when it comes to AI and cyber
5:56
There's still significant room we can continue to improve upon their efforts and stay ahead
6:01
But I would say looking out at the services, it's extraordinary to see what our cybers have already done leveraging AI
6:07
Let's pull the thread a little on the NextGen C2 effort that you have going right now
6:13
Obviously, the fourth ID has been very busy working on this. They have kind of different sprints iterations every, I think, once a month that builds on developing this ecosystem and this tech stack, if you will
6:28
25th ID is going to be doing the same, I think a little bit, with two different prototypes, my understanding
6:35
We're working with a lot of different companies. Two separate prototypes between 25th and 4th ID. Yeah
6:39
I mean, this is a super ambitious effort when you talk about a 30-month sprint to get this out to 19 divisions
6:48
talk about what you're learning so far from the 4th ID, for instance
6:54
And are they giving you confidence that you're going to be able to, you know
6:58
hit those goals when it comes to being able to field this to the broader force
7:04
Yeah, I think they are. You know, again, this is a new, we're embarking on something new
7:11
And in the process of that, we're keeping cybersecurity on the forefront of everything
7:16
just like Mr. Puget said. When it comes to cybersecurity, we're going to bake it in early in the process is what
7:23
we did with what happening with 4th ID and their first application that they utilized We saw that there was some risks We mitigated those risks We moved forward from there and we were able to actually get ahead of it
7:36
and still use the application as it was designed. And from there, we believe now we can move on to
7:43
the next set of applications that we would like to bring in, you know, logistics. We're looking at
7:49
Intel apps that we're bringing on to the platform. And then we're going to assess those and we're
7:54
going to move forward from there, and I believe we can then move on to other organizations at the end
8:00
of the sprints that we're doing with Ivy. Ivy Sting. Ivy Sting
8:06
Yes, correct. Thank you. Yes, too. Yeah. All right. Well, in terms of the cybersecurity risk you were talking about, there was a memo that came
8:16
out recently. So I'm hoping that you can address that a little bit further in terms of how you address
8:23
cybersecurity deficiencies and risk. This is obviously a program that's going very quickly
8:30
and you're still at a pretty early phase here, if you will
8:34
but it's moving quick. So how will you continue to address those cybersecurity risks
8:40
and what are you currently concerned about as you move forward? You may have resolved some of the present risks
8:48
but how do you kind of continue to address and keep learning from that? Sure
8:53
I mean, what we did was we burnt down everything that we built in the beginning, and we built a new process and a new environment in order to create better security measures across the board
9:05
That's what we actually did, and that's what we'll continue to do. We have a team that stood up to overwatch all this now
9:12
Now, the Army Data Operations Center is going to be kind of a data team that's going to overlook that for the entire Army across the board
9:20
So we're putting measures in place to mitigate all those potential problems that may come about going forward
9:27
And General Ray actually said something in his first answer I just want to kind of flesh out too
9:31
It's really making sure as we're doing a new capability, making sure security is designed really by default and by design
9:38
So is security started at the very beginning, and how is it being infused throughout
9:42
And it should iterate. I actually think it's a good day if we detect the vulnerability and we remedy it
9:47
That's great. It's important to do it early on and now continue to fine-tune the product
9:51
which is what we've seen really throughout a lot of your efforts. Yeah, I mean, wouldn't you like to find it out earlier rather than us outfitting 19 divisions
9:59
100%. 100%. Exactly. So we're there. We're doing a good job at it
10:03
I'm proud of the team. That's a very, very good point. I'm going to open up the aperture again
10:07
Let's talk about AI because I know that you guys are very excited to do that. I know that AI at the tactical edge, that's going to be a big challenge
10:14
what is real right now when you talk about AI at the tactical edge
10:19
What's being tested or deployed that shows real promise when it comes to contested electromagnetic or denied environment
10:28
You look ready to answer that. I'm happy to. I mean, I come at everything from a fairly narrow lens
10:34
because cyber is what I know. And I think it's important to remind everybody
10:38
I know this audience here is very sophisticated, but AI is not new as a field
10:41
It's been around for a long time. And equally as important, we've seen AI being leveraged for cybersecurity purposes for well over a decade
10:48
What I think is really exciting is the rise of generative AI has continued to put emphasis on how can it help in security context
10:55
And the military has really jumped on that. We're not looking to kind of be behind where historically in other contexts perhaps we have
11:03
General Barrett's team and our cyber has really looked heavily on how can AI be leveraged for defense
11:08
I think just as an example, you know, we have millions and millions of points of data coming in really every single day
11:15
How do we now go through that to identify what is a potential threat, what's a potential risk, and then prioritize a response
11:20
I think that's key. And one of the capabilities we've seen nearly a 90% success rate at detecting an abnormality
11:26
That's something perhaps it would take a human significantly longer if they would catch it at all
11:31
And I'm a true believer that, you know, AI shouldn't replace that defender, at least not now
11:35
but it can be a huge adjunct. At our core, people are still, and our soldiers and our civilians are
11:40
still core. How can AI be leveraged to really fuel their work? And then how can it help with
11:45
the skill gap? You know, obviously, we're trying to work to a scenario where we have, you know
11:50
basic senior and master operators and their civilian counterparts. How can AI help bring
11:54
down those skill sets and maybe bridge that gap between somebody who's perhaps not a master yet
11:58
but is getting there? And, you know, a lot of times people shy away from offensive cyber
12:03
This administration has not. We've seen White House leaders really lean into how we can be leveraging cyber for offense
12:09
I think there's applications for AI to help there too. You know, how can we look for potential exploits or vulnerabilities in a network that's not one of our own
12:18
I mean, I agree with Mr. Pugh on everything there. It's about decision making, how quickly we can make decisions faster on the battlefield
12:24
So even at the right at the edge of the battlefield, I mean, we have unmanned systems that are flying
12:31
Can we identify them early in the process? Are they friendly foe? And what can we do in order to stop those from potentially causing harm to our soldiers that's on the battlefield
12:42
It's about improving operational resilience on the battlefield. That's another point. And then, obviously, we have to maintain the competitive advantage because we know what our adversaries are trying to do right now
12:54
Okay. What are the biggest technical challenges? Is it compute, data, bandwidth, trust
13:02
Talk about some of the challenges that you're facing when you look at this type of capability
13:07
One of the biggest ones for us always is going to be transport, right? And especially at the edge
13:12
You know, when we look at the battlefield, you know, my team and I, we look at it in like three specific areas
13:19
So what's happening on the X, where the action is taking place on the real, real far edge, and what type of bandwidth is required there
13:29
And that's probably where our most limited amount of bandwidth is actually at
13:33
And so how much processing power do we need there? Then we look at the Ys, where divisions sit, and what processing power do they need
13:42
What type of ytics do they need in order to process there? But more importantly, if you look further back on the Z, kind of where the core, the ASCCs are operating from, that's a lot of bandwidth we can utilize there
13:56
So that's how we're trying to frame it out on what type of bandwidth because that's where we can move data at echelon
14:04
And that's what we're trying to do in this data-centric environment. Yeah, I think General Ray lays out some of the technical challenges very well
14:09
Maybe one that's not technical. That's just something maybe all would struggle with is adoption
14:14
is getting people to say we have these extraordinary capabilities to not be fearful of them and lean
14:19
into them. And I would say under both of our leaders, the chief as well as the secretary
14:23
they are not shy to that. We've seen some of these capabilities being fielded in actual units
14:27
Gone are the days where these were just theories and perhaps in the year, years later, they'd go to
14:32
an actual practice. We're looking to put these in actual units. And then more importantly, see
14:36
are they actually working? And if they're not working, how can we continue to fine tune them? that way they can one day be fielded across the army. When you talk about transport and the
14:45
challenges there, what are some of the things you're looking at as possible solutions? What
14:49
have you kind of seen out there in the landscape that might help you solve those things Well I just going to talk from types of bandwidth instead of specific capabilities So you know we looking at obviously Wi 5G on the battlefield We looking at you know Leo And we are still going to look at another area to build out our resilient comms is
15:10
geo as well. We're not going to just negate that at all, just because we have Leo out there
15:16
which is a lot more resilient, but we still need that as a backup in the event that our adversaries
15:21
try to get after that constellation itself. So that's what we're looking at across the board
15:25
and kind of building out these Wi-Fi bubbles on the battlefield. And we're also going to end up looking at, you know
15:32
like the Vice Chief of Staff of the Army spoke this morning at the Cohen breakfast he talks about
15:37
Hey, is there a possibility for us to look on the edge at pucks on a truck kind of reducing the number of radios in our formation
15:44
It's something he wants us to look at, so we're looking at that as well. Okay. Another thing that kind of comes to mind is, you know
15:51
the cloud architecture, you know, cloud can be expensive. So are there alternatives that you're
15:58
looking at? I mean, cloud is actually, you know, a great opportunity as well in terms of transporting
16:04
but is there anything kind of novel or new that's on the horizon that could help get after like the
16:11
cost curve when it comes to the use of cloud architecture? Yeah. Yeah. Maybe at a high level
16:17
I would say, is our partnerships with industry is key. I don't know how many people listened to
16:22
the Secretary's talk this morning, but really one of the many things that I think was really neat
16:25
that he said was we had an AI TTX, or a tabletop exercise at the Pentagon recently, where we brought
16:31
I believe he said, 15 CEOs and C-suites to the Pentagon to help us see how can we be leveraging
16:36
AI across the service. That's extraordinary. To see top-tier talent come to the Pentagon and help
16:41
us solve problems, I think is what we need to be doing and leading into. And I say that because
16:45
Cloud is just one example. A lot of these challenges, industry has largely figured out
16:49
or they have an innovation. Now the question is, how can we lean on them? How can we bring
16:53
their capabilities in? And then equally as important, this isn't just our largest companies
16:57
Yes, do they have a home too? Of course. But we also need these small venture-backed companies
17:02
that may be three or four people that have a novel innovation to get at some of these cost
17:06
challenges, bandwidth challenges, or just technical challenges. Okay. That's a great segue
17:11
to talk a little bit about the Army's new FUSE program, where you are adopting more of a venture capital approach to things
17:20
you know, fast bets, fast failures, scaling the winners. So how do you see that playing out in reality
17:27
I mean, this is just very recently launched. You know, who has the authority, the budget
17:31
What are you going to focus on? If you could elaborate a little on that program. Yeah, FUSE is really exceptional
17:37
And I would say this is only, somebody can fact check me, but I'd say two weeks old at this point, maybe three
17:42
So I mentioned continuous transformation earlier. How is the Army preparing for that future battlefield
17:46
A key part of that is acquisition because everything we're talking about today is going to be challenged or slow
17:52
if we cannot figure out acquisition and get these capabilities in the hands of a warfighter quickly
17:57
We don't have the luxury of time. We can't spend four or five years researching
18:02
perhaps fielding it, and then getting it to a soldier. It has to be quick. And that's what FUSE is looking to do
18:07
is adopting a venture capital mindset and consolidating. Previously, we had four innovation pathways
18:14
putting them under a single umbrella. And this is not just a consolidation. We're looking to have a potential product
18:20
to a funding pipeline within 10 days and a prototype in the hands of a soldier
18:24
within 30 to 45 days. And for anybody that knows the Pentagon, 30 to 45 days of having a prototype
18:30
in the hands of a soldier is extraordinary. And that's what we're looking to do
18:34
And there's four initial priority areas. But it's not to say we're limited as four, and that's power generation, UAS, counter-UAS, electronic warfare
18:44
to really break through what has traditionally been a very bureaucratic process
18:48
Yeah, and also, you know, AI at the edge is going to be one of those initiatives that we're looking at with this team of folks
18:54
that's going to try to get something into the hands of the soldiers within that 30 to 45 days
18:59
So AI at the edge is coming. And I would say one quick follow-up is anybody that's listening, I think the takeaway is like the Army is looking for partners
19:07
And if you're sitting in the audience, you're like, I'm not sure where to begin. I have a unique capability, but I'm not a massive company
19:13
There's a home potentially for you here. And I think Fuse is likely that home
19:18
Well, talk about what you're doing at AUSA. You are actually hearing from venture capital
19:24
So like Shark Tank, right? So we're going to hear from them exactly what they can offer in order to meet our demands that we're asking for
19:33
So we're looking forward to that. Yeah, and I think as a quick follow-up to that, historically, for those that have been in the Army for a while or followed the Army
19:40
look, we've identified a problem, then we've went out and looked for solutions. That is not what we're looking to do
19:45
We're looking for industry to help find problems for us, offer solutions
19:49
We might not even know we have the problem to begin with, but that's exactly what we need. We need to shift that balance
19:53
Yeah, yeah. I wanted to talk a little bit about integrating data networks across the Army and the Joint Force
20:01
Both your offices deal with that. So how close are you truly to, like, a data-centric operations where soldiers and commanders can access and trust data from, you know, multiple sources in real time
20:15
Yeah. So data is a new ammunition. You know that, right? But from a data-centric perspective, there was really three imperatives that came with us getting to a data-centric environment
20:27
One was robust transport. I think we're there. I think we're doing very well at that particular piece of it
20:33
The other was to be cloud-enabled, to have sort of a catch-as-minute of where our data is and resides
20:40
And I think we've made some decisions by this particular AI team coming together and looking
20:46
and we have now an authoritative data source that our chief information officer has put out
20:52
on where all our data will be stored. Can we do that regionally? That'll be great
20:57
If we can do that and we can replicate on those, that'll be great. The last part is how do we get our identity credential and access management
21:05
attribute-based access control, tagging and labeling of data? When we get to that point, and we're very close
21:11
I think now we're going to reach that data-centric environment that we're looking for
21:15
We're getting real close. How is the Army aligning its data network modernization efforts with the joint all-domain command and control effort
21:28
Where are the seams? Sure. Okay, yeah. So Project Convergence is our real seam to get into anything that we do with the all-domain command control
21:40
that's where we really make our bread and butter is when we go to Project Convergence
21:46
because that's where we converge all of the different services together that's where we experiment and we exercise all those pathways to get there
21:54
so that's what we use in order to fuse what we're doing across the board
21:59
from fires to intel to logistics and sustainment so we use it all in that environment
22:05
What are you hoping to learn from the upcoming Project Convergence? I know that's still months and months away, but what's on your list for things that you
22:15
would really like to assess during the next round? I mean, obviously Project Convergence is a year-round effort
22:22
You doing smaller things as you lead up to the capstone but what are some of the focus areas in your perch that you leading up to This next round is going to be all about next generation command and control as we bring it on board from what 4th ID has learned over IV Sting and other operations
22:38
That's where we're going to lead right into that. So everything there and how that actually converges with things like Maven Smart Systems that you use at the COCOM level and then everything that JADC2 brings to the table as well
22:51
Another question on AI. As it proliferates, how is the Army balancing innovation with cybersecurity and responsible AI principles
23:03
and what governance mechanisms are in place to prevent what's called AI sprawl, if you will
23:10
No, Jen, I think you tee it up. I think the balance is key. The way I look at it is, look, I'm an AI optimist for anybody that knows me
23:16
I truly believe in the technology. That doesn't mean there's not risk with it. And look, we see adversaries already looking and experimenting in ways they can exploit AI in two ways
23:24
I think adversaries have an interest in going after the infrastructure of AI
23:28
but they also have an interest in seeing how they can leverage AI for cybersecurity attacks and incidents
23:33
We see that playing out. I think that's incumbent on the Army then to stay ahead of that
23:37
How are we, what are our efforts to prevent that? And how are we leveraging AI to defend and perhaps even go after adversaries
23:44
I think that balance is key. I will say a word of caution. some people rush into aggressive regulation and limitations of AI
23:52
Our adversaries are not going to respect whatever guardrails we put in place. That's not saying we don't have any
23:56
I do realize we live in a unique country. We should have guardrails. But China or any other adversary is not going to respect that
24:03
So we don't want to inadvertently limit our uses of AI for potential defense and offense at the same time
24:08
So really going back to that balance, I think, is key. I think to a large extent, the Department of War has done a good job of striking that balance
24:14
and really in line of what the White House has done in their recent AI impact strategy coming from the White House
24:20
It's really clear. We're going to lean on AI, really maximize its uses, but not ignore some of the risks that are present
24:28
And, Jen, what we're trying to do and make sure we do stay secure in that area is to air gap our systems from the larger Internet itself
24:38
so that we're not giving away our secrets either. So we're doing that air gap to make sure in between Mr. Pugh and Mr. Garciaga
24:47
They're making sure that we stay safe in that area as well. Okay. What are lessons from Ukraine about resilience and cyber defense that are informing how the Army designs networks and defends the tactical edge
25:00
It's all about signal, cyber, EW. So we're looking in those spaces to ensure that, one, we build a resilient network
25:11
Two, that we defended from a cybersecurity perspective and from an EW, we know that that's the area that our adversaries are going to come after
25:19
Now, I wrote a paper a couple months back to talk about the battlefield
25:23
Most believe the battlefield is over there, but it's over here 24-7. The reason why I really stressed EW in that particular paper that I wrote was because most people believe that the frequencies that we use forward is the only thing that you need to be thinking about
25:39
But I want people to think more about that our traffic lights, our grocery store scanners, our banks
25:48
all those things still work on frequencies and can be interrupted by our adversaries
25:53
So we have to protect those and bake in cybersecurity in those areas as well
25:57
Because if we're going to get from the fort to the port to the fight
26:01
all those environments have to be protected across the board. I just don't want to think that the fight is only over there
26:07
It's over here at 24 by 7. And I'm sure you can add a little bit to that
26:11
I think General Ray is right. And let me say, his paper is great. The first time I actually learned about his paper was at another conference
26:17
And I walked in, there was like a, I don't know, a 10-foot by 10-foot banner of his face
26:21
I'm like, well, I have to get a photo. And it was advertising his new article. No, but General Ray is right
26:25
Two things kind of stand out to me is too often times for too long
26:29
we've really just seen cyber as an isolated capability, something that just rests at Gordon or Fort Meade
26:36
And while a lot of operations happen there, this is a blurring domain. How can we leverage cyber at the edge
26:42
How are we blurring cyber capabilities with electronic warfare? These are not discrete domains
26:47
There's an increased emphasis on seeing how they can complement each other. Ukraine has showed that
26:51
It really has. I'd say, secondly, it's also important to say this isn't just a Department of War issue
26:56
General A was spot on. Our adversaries are intent on leveraging cyber against us on a daily basis
27:02
Some we don't see, some we do see. And there's a large risk there to the American way of life
27:07
perhaps going after a critical infrastructure. But in a military context, how could it impact our ability to mobilize troops and equipment in a time of conflict
27:15
That's what I'm really concerned with, and that just can't happen. And for anybody that's interested in that, the Army Cyber Institute for many years has been doing studies on this
27:23
They picked two major cities each year to say, well, if there was a cybersecurity incident across all these two cities, what would be the impact
27:31
And the results were startling. It showed there could be actual implications to our ability to move tanks to a theater environment
27:38
Yeah, that's actually really terrifying. What is the Army doing to contribute to, you know, this hardening, if you will, you know, on the fort side
27:46
We often talk about the tactical edge, you know, that's where we're focused. But, you know, can you talk a little bit more about what the Army is doing to help contribute to protecting us here
27:58
Sure. I would just say, you know, we the good and bad about the Army is we're really geographically spread out
28:03
We have bases all over the country and we rely on private critical infrastructure operators to a large extent
28:09
So think for those that may not that might not resonate with you. You know, think our water, our gas, electricity in an overwhelming majority of cases
28:17
Those are private operators. So if there's a disruption to one of those private operators, how is that impacting one of our bases
28:22
And I think that that puts a lot of pressure on us. One of the things is that we need to have a close relationship with the interagency, realizing this is not just a Department of War issue
28:31
How are we working with CISA and the Department of Homeland Security? How are we working with energy, even with state on the diplomatic side
28:37
This is a holistic issue that requires a holistic response. I think that's one
28:42
It's also incumbent on us is what forces do we have at our disposal? So obviously, I didn't say this in my opening, but I'm still an Army reservist, so I'm very passionate about the Army Reserves and Guard
28:52
But I say that because those folks are awfully living in their community, are cyber experts
28:56
How can we leverage their expertise to help respond to potential incidents against our critical infrastructure
29:01
and get at some of the legal authorities that might be challenging to active duty Title X forces
29:06
I think there's extraordinary potential there, and we have some strong successes we can point to
29:11
but seeing how that becomes common practice, not just a handful of states
29:15
And, Jen, to add to that a little bit is that operational technology now falls under the G6
29:21
But Army Cyber, under General Barrett and her team, are the ones that do the execution of operational technology
29:28
So we are looking at critical infrastructure. We're also working at G357 as well because they do a portion of that
29:35
So we're looking across the board on all things critical infrastructure. Okay
29:40
What's working and not working when it comes to attracting and retaining top talent to get after some of these areas
29:47
both uniformed and civilian? I'm happy to, yeah. I promise we did not coordinate in advance
29:54
but if you had to get to my top four priorities, we'd probably have gotten to all of them
29:59
sincerely because people and structures are key. You know, the secretary was spot on today
30:05
Of course, he's my boss. But that aside, really at our core, we are a people business. And that
30:09
is our uniform members as well as our civilian members. And we take that to heart when it comes
30:13
to cyber. We realize we're going up against cyber companies and tech companies that can offer higher
30:17
paychecks. The mission that we offer is unparalleled. But we've also done, you know, some concrete steps
30:23
to also combat that. You know, for those that aren't familiar, we have something called the CES
30:26
or the cyber expected service program to offer special recruiting incentives, specific pathways to enter into government service
30:35
I think that's key. It's also how are we retaining the soldiers we have and the civilians we have
30:40
What is their upward progression? So they're not thinking, well, let me get out of my uniform or my civilian role
30:44
to go to a critical or a private sector operator. I think that's key for us
30:48
And it's also, I think, a third part of that is how are we increasing their expertise
30:53
when they're in the role? What does a pipeline look like to go between basic, senior, and master
30:58
That way an operator continues to progress in their career field. Yeah, I think what's changing daily is people are now getting a chance to do their actual job
31:06
and I think that's going to be the key to keeping them around longer
31:11
is that they actually have the hands on keyboard, and that's a great thing. And I would say that's a unique thing
31:16
We were kind of, Sergeant Major and I were talking about this earlier. That's a unique thing about the signal in CyberCore
31:21
Obviously, we need our, you know, no matter what your branch is in the Army, this is a, you know, everybody is in the same fight
31:27
But Signal and Cyber, you are on the fight and you're on a keyboard on a daily basis
31:31
You don't have to leave the United States to be doing super solid things for this country
31:36
And I think that's something we need in the Signal and Cyber Corps, people to know that, you know, day one, you're going to be going against a potential adversary or a potential threat actor
31:45
Just relatedly, we were talking about this a little offline ahead of this panel
31:52
but what are some of the tools you're starting to see, whether it's an AI that help train those professionals, be better at their jobs
32:01
say a cyber defender, if you will, or somebody working in cyber offense, for instance
32:06
How are you potentially seeing opportunities for AI to either help train or help them do their jobs better
32:14
or any other tools that you're eyeing? Yeah, go ahead. That's your arena. No, yeah, I think there's maybe three concrete examples
32:20
but for the sake of time, maybe I'll touch on maybe one of them. I think we've seen simulated training environments
32:25
that mimic a real-world environment, and we can have AI be iterative
32:29
So as a defender takes a prescribed action, we can see an AI agent take a different action
32:34
they might not be expecting in real time, going into an adversary that might hopefully
32:39
be even more sophisticated than a real-world adversary, and getting that hands-on keyboard experience
32:43
before it's an actual adversary they're going against. I think that's key. I think also how do we complement a human operator with AI agents
32:51
And I'd say that's really the future of where I'm personally passionate about is, you know, not saying an AI agent should be the only part of it
32:57
but they can be complementing, you know, a human. Take prescribed courses of action, either in a defense or an offensive environment
33:04
perhaps before we have a human on keyboard, realizing that, you know, we up against adversaries that have tons of individuals on keyboard How do we close that gap between our what I would say best trained soldiers with technology and really blending those two
33:20
Yeah, the other thing I would tell you is in requirements, you know, in requirements
33:25
we had hundreds and thousands of requirement documents, and we used AI to help us kind
33:29
of look across all those documents and see where some duplicate efforts were
33:33
and we were able to reduce the number of requirements documents that we had across the board
33:37
So that's a big one that I think has really helped us push forward
33:42
And I would say the takeaway for me is, look, AI, I always like to say, is not the silver
33:46
bullet for everything. I think there's this temptation is throw a little AI at it or just add AI to your marketing activity
33:52
You have to be relevant. You know, I'm a firm believer AI can help in a lot of cases
33:56
It may not be the 100% solution for everything. It is taking that balanced approach to say, where do we have deficiencies or how can it
34:02
further enable a human? I think that's where we need to take that calculus and inventory
34:06
Yeah, I mean, especially with all that data flowing in on the battlefield, like that's just, I mean, how else are you going to do it
34:12
There's no shortage of data. That's for sure. AI, aggregation of information
34:16
That's how I look at it. I like it. I'm stealing that. What is one technology area that's still underrated but could sort of redefine how the Army might operate and what in some ways in the next five years
34:29
What are you eyeing as very emerging? Wow. Yeah. Go. Yeah, I mean, the risk of not having a fully thought out answer, I can say something I'm very passionate about
34:40
If you're not tracking the 11th Cyber Battalion at Fort Gordon, you should be
34:44
I think it's one of the neatest units for many reasons. But one that stands out is their work at really combining cyber and EW, really getting at what we like to think is tactical cyber
34:54
How do we bring cyber to the front line versus just sitting back in Fort Gordon or me
35:00
And I'm not saying that to diminish those functions. We knew those functions, but it shouldn't be seen as cyber is a last resort
35:06
How can this be an option that's on the battlefield in an embedded team at perhaps a core or division level
35:12
That's really interesting. And we see many of our private sector partners that are thinking through how their products can enable such an action
35:20
So I know I'll be personally excited to see how that will play out in the next year, perhaps two years
35:26
Mine would be, you know, it's all about data management. We don't have a data problem
35:30
We have a data management problem, and I want help from industry and everyone else to help us figure out how to ensure we can manage our data going forward
35:39
Because it's only going to get larger and larger, more and more petabytes of data across the boards
35:43
It's all about data. All right. Well, with that, you've talked about dedicated data formations
35:50
Yes. So what are the pros and cons of creating those? What are some of your ideas for this type of concept
35:58
I mean, as next generation command and control comes on board, as we look across how we're going to move data through that type of new ecosystem that we're creating
36:08
we have to have someone that can and will be able to oversee and manage that data is the reason why we've been thinking very heavily on creating these, you know
36:19
Army data operation center or commands that we can go ahead and look at that across the board And we believe that that will be not only in one theater but it will be across all of our theaters so we can manage data in all those aspects because we be linking in not only with Army data
36:34
joint data, coalition data, and COCOM data because at the end of the day
36:39
we're fighting in the COCOM environment. We must link into them. So you have to go from your Army environment
36:45
to your joint environment, to your coalition, and then to your COCOM environment
36:49
So that's how we're going to be looking at data across the board. Well, if you stood up such formation, can you talk a little bit more about what kind of chain of command or authority would reside
37:03
If you have a centralized data core, for instance, is it distributed function embedded within existing units
37:09
How are you looking at that chain of command? Yeah, so all that is going to be flushed out here in the next couple of weeks
37:15
We're going to put the teams together to kind of flush that out. So I'm not going to really speculate on what the team will come out with after they take a look at it
37:22
You want to break any news? I don't want to break any news right now, but it's coming. All right, excellent
37:28
In terms of one policy, like if you could change one policy tomorrow that would accelerate innovation, what would it be
37:38
What is like the biggest thorn in your side? I'll give you the hard question this time
37:45
You get to go first in this one. I get to go on hard. So, you know, the one thing I would like to see, and if you think back, if we're going to achieve data centricity, it was all really about how do we move data across all of our enclaves, NIPR, SIPR, JWICs
38:03
How do we move data from one end to the other? If we can find a way within that environment to actually use identity, credential access management, attribute-based access control to really look at the security of the data, that's the policy that I would like to change is to secure at the data layer, reduce at the transport layer
38:25
Yeah, I would say maybe starting at a very high level is, you know, what is the relationship between Army Cyber and U.S. Cyber Command
38:33
and I think that's key, is really looking at how do the services support U.S. Cyber Command
38:38
from the man-trained-equipped function, making sure that Cyber Command has the right individuals
38:43
who have the right training and the right expertise. And it's easy to talk about it just in the context of the Army, but we need to remember
38:49
you know, we have the Navy feeding up, the Air Force feeding up, and there's a lot that go into it
38:53
Man-trained-equipped is only one aspect of it. You know, we have the budget considerations of how does funding work between Cyber Command and the services
38:59
We have the acquisition components, and I'd say there's continued interest in making sure that relationship and that dynamic is fully fleshed out
39:07
Similar to what we saw with the special operations model. It took a long time to get to that point and to mature
39:13
I would say cyber is where we are now. I think it's essential to get it right to make sure structures are not our barrier to staying ahead in cyber
39:21
I wanted to ask a little bit more about, you know, we've had some big changes when it comes to, you know
39:29
deactivating Army Futures Command and setting up, you know, T2COM, the new transformation and training command
39:36
There a lot of work that Army Futures Command was doing in the realm of next C2 as well as a lot of the things that we been talking about today
39:47
How do you see the new command structure sort of enabling what you want to accomplish
39:52
I think it will continue to enable. I think the organization, by putting those two organizations together
39:58
only enhances what we're going to do across the board. and by having the training and now the transformation portion together
40:06
we can start at the lowest echelon and actually move that training and transformation
40:11
all the way to all our formations, our 19 divisions that are out there
40:15
So I see nothing more than us creating a better environment in order to do all the things we were already doing
40:23
Yeah, I would say General Ray is closer to this than me, but I would say just being four months in the job
40:28
It's been really refreshing to see how close T2COM is and their leadership with, like, our acquisition community
40:33
And I think that's really essential to have. There should be, you know, one of the same and constant dialogue
40:40
And I think we see that, actually, in Fuling, especially as a new command has stood up. All right
40:45
I want to give you an opportunity to go into some final thoughts
40:50
anything that I haven't asked about that you want to make sure that you highlight
40:53
So, General Ray, I'm going to start with you. No, I just want to say thanks, Jen, for this
40:57
And thanks, everybody, for listening today. We are on a trajectory. We will continue to transform the Army across the board
41:07
General George and the Secretary has given us our marching orders on going there
41:12
We're going to need industry to really partner with us on this endeavor
41:16
And AI and machine learning, large language models, cloud, all those things are going to play a big role in everything that we do going forward
41:23
So thank you so much, and hope to see you all throughout the AUSA. Jen, I would echo what General Roy has said. We're at a unique window here in the Army
41:33
Continuous transformation is a once-in-a-generation opportunity to make sure we're prepared for that future fight
41:38
And that is really at the core of what we're doing. Everything from what General Roy talked about in terms of some of his reconfigurations, the data structures
41:47
that is all going back to continuous transformation, making sure we're as prepared as possible
41:51
Really as evidence of that is the secretary and the chief's leadership, they've identified $40 billion of savings over the course of five years
41:58
And that, you know, sometimes hard decisions to cease procurement in certain areas, but then reinvesting that into what we need for that future fight
42:05
That is really where we are. And I'd say it's a really exciting time to be in the Army, why I'm so excited to be on the Army team
42:11
But I would say for anybody listening, the soldiers, the civilians and the industry partners in the audience, we need them
42:17
It's easy for General Ray and I to be up here and just be leaders at the Pentagon. Ultimately, we're representing and working with everybody here
42:24
And this is really a team effort. Well, thank you so much for taking the time to join me here at AUSA
42:30
And I hope you enjoy the rest of your show and thank everyone for being here as well
42:35
I'd like to also thank Booz Allen Hamilton for supporting this important conversation
42:39
here at the AUSA annual meeting. And for continued coverage of Army modernization and emerging technology
42:45
visit defensenews.com for full reporting of AUSA. Thank you for joining us
42:50
Thanks, Jen. Thanks, Jen. Appreciate it. Yeah, it was great. Thank you
#news


