WEBVTT

00:01.340 --> 00:03.570
Hello everyone . I'm Dave Frederick ,

00:03.580 --> 00:05.802
the executive director of U . S . Cyber

00:05.802 --> 00:07.747
command . We recently launched the

00:07.747 --> 00:09.858
commands academic engagement strategy

00:09.858 --> 00:12.080
in order to deepen our partnership with

00:12.080 --> 00:14.420
academia whole of nation . Teamwork is

00:14.420 --> 00:16.420
critical to defending the nation in

00:16.420 --> 00:18.587
cyberspace and closing the gaps in our

00:18.587 --> 00:20.970
cyber workforce . We need cyber talent

00:20.970 --> 00:23.137
and multiple disciplines including the

00:23.137 --> 00:25.359
law . So I want to share more about our

00:25.359 --> 00:28.540
approach . In january cyber command

00:28.540 --> 00:30.540
established the academic engagement

00:30.540 --> 00:32.651
network which is a team effort across

00:32.651 --> 00:34.873
the D . O . D . Cyber Mission force and

00:34.873 --> 00:37.096
with academia , our cyber force members

00:37.096 --> 00:39.262
include the command headquarters , the

00:39.262 --> 00:41.207
cyber National Mission Force , Our

00:41.207 --> 00:43.429
Joint Force headquarters focused on dod

00:43.429 --> 00:45.730
networks and the service cyber commands

00:45.730 --> 00:48.480
within the Army , Navy , Air Force

00:48.680 --> 00:51.830
Marines and Coast Guard . We invited

00:51.830 --> 00:54.060
both military schools such as the war

00:54.060 --> 00:56.570
colleges and non federal institutions

00:56.570 --> 00:59.690
to join like our partnerships with the

00:59.690 --> 01:02.360
interagency industry and foreign allies .

01:02.840 --> 01:04.951
Cyber com needed a structured program

01:04.951 --> 01:06.951
to align efforts with our strategic

01:06.951 --> 01:08.950
goals and broaden our reach the

01:08.950 --> 01:11.061
academic engagement network . Is that

01:11.061 --> 01:13.760
program known as a n for short ,

01:15.540 --> 01:17.762
Given our warfighting mission , one may

01:17.762 --> 01:19.484
ask why we considered academic

01:19.484 --> 01:21.640
partnerships so important First to

01:21.640 --> 01:23.862
succeed in today's increasingly complex

01:23.862 --> 01:26.029
cyber threat environment . We need the

01:26.029 --> 01:28.180
diverse thinking and innovation that

01:28.180 --> 01:30.069
comes from collaborative academic

01:30.069 --> 01:32.730
partnerships . Secondly , our combat

01:32.730 --> 01:34.730
power in cyberspace is our talented

01:34.730 --> 01:37.830
workforce , not our technology in the

01:37.830 --> 01:39.941
competition for talent . We wanted to

01:39.941 --> 01:42.108
make sure that students from a diverse

01:42.108 --> 01:44.052
group of schools across the United

01:44.052 --> 01:46.219
States knew about unique opportunities

01:46.219 --> 01:48.441
to serve the nation as a military cyber

01:48.441 --> 01:50.497
warrior or a Department of Defense ,

01:50.497 --> 01:52.330
civilian . The response from our

01:52.330 --> 01:54.441
nation's educational institutions was

01:54.441 --> 01:56.608
amazing . In just a few short months ,

01:56.608 --> 01:58.497
the A.N . has grown to include 92

01:58.497 --> 02:00.163
institutions and we have more

02:00.163 --> 02:02.052
applications in process . Current

02:02.052 --> 02:04.163
member schools are from 40 states and

02:04.163 --> 02:06.108
the District of Columbia . A . N .

02:06.108 --> 02:07.774
Members include eight federal

02:07.774 --> 02:09.830
institutions , including the service

02:09.830 --> 02:11.941
war colleges , the naval postgraduate

02:11.941 --> 02:14.108
school and the service academies . The

02:14.108 --> 02:16.052
82 non federal institution members

02:16.052 --> 02:17.608
include 10 minority serving

02:17.608 --> 02:19.663
institutions . In terms of the legal

02:19.663 --> 02:21.719
field , University of Maryland Carey

02:21.719 --> 02:24.170
School of Law and NY , which runs an

02:24.180 --> 02:26.236
interdisciplinary program focused on

02:26.236 --> 02:28.347
law , policy and cybersecurity . Join

02:28.347 --> 02:30.402
the network . Cyber Command has four

02:30.402 --> 02:32.513
strategic goals for the network . Our

02:32.513 --> 02:34.513
first goal is to engage and inspire

02:34.513 --> 02:36.736
students , encouraging them to consider

02:36.736 --> 02:39.430
Dods cyber careers . We want to broaden

02:39.430 --> 02:41.263
awareness of internships and job

02:41.263 --> 02:43.319
opportunities , both in the military

02:43.319 --> 02:46.050
and civilian ranks . Our 2nd goal

02:46.060 --> 02:48.171
focuses on Applied Cyber Research and

02:48.171 --> 02:50.650
Innovation . Cyber Command runs an

02:50.650 --> 02:52.483
innovation process for the cyber

02:52.483 --> 02:54.317
mission force and we publish our

02:54.317 --> 02:56.428
hardest innovation challenge problems

02:56.428 --> 02:58.706
which you can check out on our website .

02:58.706 --> 03:00.817
We will be mentoring student capstone

03:00.817 --> 03:02.706
projects focused on our challenge

03:02.706 --> 03:04.928
problems and also sponsoring events and

03:04.928 --> 03:07.150
workshops to highlight faculty research

03:07.150 --> 03:09.261
on these topics . Our third goal aims

03:09.261 --> 03:11.150
to tap into the deep expertise of

03:11.150 --> 03:13.261
academia , on understanding adversary

03:13.261 --> 03:16.160
cyber strategies and organizations in

03:16.160 --> 03:18.610
today's world . Open source analysis of

03:18.610 --> 03:20.470
cyber strategies , tactics and

03:20.470 --> 03:22.930
organizations is incredibly insightful .

03:23.190 --> 03:25.246
A and faculty and students will have

03:25.246 --> 03:27.468
access to our intelligence analysts and

03:27.468 --> 03:29.468
at the same time we will learn from

03:29.468 --> 03:31.579
their unclassified analytic results .

03:31.640 --> 03:33.751
As one example , we will host a panel

03:33.751 --> 03:35.900
of academic experts on foreign social

03:35.900 --> 03:38.610
media disinformation To inform us cyber

03:38.610 --> 03:40.499
command analysts as we prepare to

03:40.499 --> 03:42.610
support election security efforts for

03:42.610 --> 03:46.340
the 2022 cycle . Finally , we want to

03:46.340 --> 03:48.507
engage a diverse group of academics on

03:48.507 --> 03:50.729
military cyber strategy and the role of

03:50.729 --> 03:52.396
the military and cyberspace .

03:52.840 --> 03:55.007
Cyberspace continues to evolve rapidly

03:55.240 --> 03:57.810
today . No other domain faces the same

03:57.810 --> 04:00.032
complexity in terms of the roles of the

04:00.032 --> 04:01.866
government and private sector in

04:01.866 --> 04:04.270
collective defense . We will seek

04:04.270 --> 04:06.492
opportunities to critically examine and

04:06.492 --> 04:08.520
to help shape military strategy and

04:08.520 --> 04:11.460
doctrine . This is where you come in

04:12.040 --> 04:14.380
the legal field . Your field can help

04:14.380 --> 04:17.080
in the following ways . Unlike areas of

04:17.080 --> 04:19.660
law like contracts , property and torts ,

04:20.040 --> 04:21.984
which are informed by centuries of

04:21.984 --> 04:24.390
legal . President cyberspace is new and

04:24.390 --> 04:26.446
it will be relatively new for a long

04:26.446 --> 04:29.270
time . Academic scholarship in areas

04:29.270 --> 04:31.400
like cyberspace operations is read

04:31.400 --> 04:33.511
widely and discussed by our attorneys

04:33.840 --> 04:35.784
and this work often influences our

04:35.784 --> 04:38.007
views on the issues that matter most to

04:38.007 --> 04:40.370
our operations . It is this kind of

04:40.380 --> 04:42.350
outside observation that is key in

04:42.350 --> 04:44.572
shaping our views of what we do and how

04:44.572 --> 04:47.650
we do it to that end . Our attorneys

04:47.660 --> 04:49.271
often speak at undergraduate

04:49.271 --> 04:51.493
institutions and law schools , not only

04:51.493 --> 04:53.660
to share information about our mission

04:53.660 --> 04:55.438
but also to engage the academic

04:55.438 --> 04:57.660
community and to hear their thoughts on

04:57.660 --> 04:59.882
our operations and broader cyber policy

04:59.882 --> 05:02.104
matters . These dialogues are essential

05:02.104 --> 05:05.040
to creating a 360° view and outside

05:05.040 --> 05:07.040
sets of eyes are invaluable when we

05:07.040 --> 05:08.818
reflect on the execution of our

05:08.818 --> 05:10.707
missions . This helps guide us in

05:10.707 --> 05:12.762
future endeavors and helps shape our

05:12.762 --> 05:15.040
thinking about operations and doctrine .

05:15.540 --> 05:17.790
Right now , our staff judge advocates

05:17.790 --> 05:19.790
are working with the cadets at West

05:19.790 --> 05:21.901
Point on research that will influence

05:21.901 --> 05:24.123
legal reviews of cyber com operations .

05:24.123 --> 05:25.790
This is a mutually beneficial

05:25.790 --> 05:27.790
partnership that is already bearing

05:27.790 --> 05:29.846
fruit as we analyze current events .

05:29.846 --> 05:31.790
Some of our most complex questions

05:31.790 --> 05:33.957
about cyberspace operations are in the

05:33.957 --> 05:35.846
legal and policy realms and as we

05:35.846 --> 05:38.012
expand our academic partnerships , the

05:38.012 --> 05:40.012
legal profession is a key aspect to

05:40.012 --> 05:42.068
this maturing relationship that will

05:42.068 --> 05:44.290
allow us to place intellectual rigor on

05:44.290 --> 05:46.512
our thinking as we advance the nation's

05:46.512 --> 05:48.623
cyberwarfare capabilities to find out

05:48.623 --> 05:50.846
more , check out the A . N at cyber com

05:50.846 --> 05:50.860
dot mil

