DISA J-6 Cyber Awareness Forum spotlights user vigilance in securing the Pentagon's network


By Lex Barlowe, DISA J-6 Command, Control, Communications and Computers (C4) Enterprise Directorate

November 12, 2024

 
Brig. Gen. Cornell is on stage in the middle of the image while facing an audience. Eight members of the audience, in the foreground, have their backs to the camera. On a screen behind Cornell is a slide of the DISA NEXT Strategy.
DISA J-6 Vice Director Air Force Brig. Gen. Michael L. Cornell speaks about the DISA NEXT Strategy during the DISA J-6 Cyber Awareness Forum, held at the Pentagon Oct. 24, 2024. (DISA photo by JoAnne Sorrentino)
 
In a digital landscape where adversaries constantly evolve, the Defense Information Systems Agency J-6 Command, Control, Communications and Computers (C4) Enterprise Directorate isn’t just defending boundaries — it’s reshaping them.

At the recent DISA J-6 Cyber Awareness Forum, hosted at the Pentagon, the agency showcased the latest in cyber defense tactics, innovative technologies and workforce strategies to strengthen the Department of Defense’s digital shield.

The biannual forum featured presentations from both private sector and federal experts, technology exhibits and a career fair designed to foster government cyber talent.

DISA J-6 Vice Director Air Force Brig. Gen. Michael L. Cornell opened the forum with a call to action, underscoring the critical role of end users in fortifying cyberspace.

“Our adversaries are growing more sophisticated,” said Cornell. “We can put all the tools out there that we want to detect threats and mitigate them, but users are our last line of defense.”
His words echoed the forum’s theme, Secure Cyberspace: Unleash Your Digital Armor!, highlighting proactive strategies for safeguarding data, protecting infrastructure and applying tactical intelligence to counter cyber threats.

Cornell emphasized DISA’s commitment to advancing network security.

“We are investing a lot of money in modernizing, flattening and hardening the network,” he explained. “When Joint Service Provider was formed in 2017, the networks were merged to form what is today the Pentagon Network. We are shifting our network mindset from a boundary mindset to Zero Trust. Before we can get to Zero Trust, we have a lot to do so we can more effectively manage the network and get after problems when they arise.”

In his address, Cornell also warned of increasingly sophisticated phishing tactics used by both nation-state and criminal actors. He described how they are getting better at masking their activities and creating links that look more legitimate.

“It’s incumbent on our users to recognize that this is happening during these events. The most important role is you,” he said, stressing the importance of user vigilance.

The general noted that the Pentagon remains one of the world’s most targeted networks, with nearly 700 million security events occurring daily. The network’s inner and outer boundary defenses intercept hundreds of incoming threats every hour.

“It’s not just about the tech; it’s about the people and the workforce who make the effort to protect the network,” Cornell stated. “At the end of the day, our users play an enormous role in helping to protect against these events.”
The forum’s message was clear: while advanced technology and strategic defenses are critical, the efforts of individuals — whether through reporting suspicious links or practicing secure habits — are the cornerstone of cybersecurity.