The character of conflict is evolving, and cyber isn’t an isolated technical discipline. At its core, it is a command and control problem. Too often, we treat cybersecurity as a checklist or compliance exercise instead of a force-shaping enabler of operational decision advantage. That shift in mindset is fundamental to how we posture the Department of the Air Force Information Network (DAFIN) and the broader aerospace and cyber enterprise.
This insight is critical as decision-makers evaluate our posture across key areas:
- Security Operations and Big Data: Modern defense requires more than perimeter controls. It requires analytics that surface risks before adversary impact, the fusion of telemetry into actionable insights, and the ability to pivot rapidly in dynamic threat environments.
- Battlespace Domain Awareness: The cyber domain is a connective tissue across domains. Leaders must invest in integrated sensing and shared situational awareness that informs decision cycles, not just incident response.
- Converged Cybersecurity: IT, OT, IoT, IIoT, platforms, and weapons systems are increasingly networked with enterprise services. Cyber risk cannot be siloed; it must be assessed in system design, deployment, and sustainment. This requires collaboration across C5ISR disciplines.
When we talk about organizational agility, it’s not a buzzword. My experience points to deliberate organizational design where human expertise and automation are balanced. Automation, whether in detection, response, or analytics, must expedite processes without sacrificing critical human judgment. Today’s cyber defense must ask:
- What functions must remain human-in-the-loop?
- What can be on-the-loop?
- When can autonomy responsibly operate without immediate human intervention?
One of the persistent challenges is talent and mission readiness. The Sixteenth Air Force and its cyber wings, the 688th CW and 67th CW, are expanding mission sets and must innovate to recruit, retain, and prepare operators capable of navigating complex cyber terrain in support of all-domain operations. Recent discussions in defense communities make clear that scaling capability is as much about people and culture as it is about tools.
Industry partners like SAIC bring deep mission, cultural, and technical expertise in C5ISR, bridging operational requirements with rapidly evolving tech capabilities. These partnerships inform toolsets and the strategies and structures that deliver resilient cyber outcomes across warfighting domains.
Cybersecurity is adjacent to C5ISR, not peripheral. It is an enabler of command decision cycles and operational coherence. As we refine doctrine, posture, and workforce strategy, we must internalize that cyber is a C2 problem deeply intertwined with mission execution. Human-machine teaming, deliberate culture, and an integrated approach to analytics and domain awareness will position the Air Force to maintain decision advantage in competition and conflict.
Cyber posture is dynamic and must evolve with mission demands, adversary capabilities, and the cognitive load of decision-makers. Leaders who embrace that complexity and invest in intentional culture and integrated capability will set the conditions for success.
Achieve Mission Assurance Through Command and Control Expertise Applied to Cyberspace Operations
Operational technology systems are critical to mission success. Their defense is essential to sustaining operations and reducing vulnerabilities. I, and the cyber experts at SAIC, invest time and innovation to identify the blind spots in cyber postures that allow adversaries to exploit, disrupt, and degrade your mission. Thanks to our hard-won experience, we deliver solutions to sense, make sense, and deliver decision-quality information directly to warfighters and decision-makers. With our integrated approach to non-kinetic and kinetic effects, we ensure the joint force can achieve survivability, lethality, and mission success, anytime, anywhere.
We are excited to discuss your mission challenges and how we can align cybersecurity as part of your operational command and control strategy. Reach out to us to discuss combating the cyber threats posed to our nation.
