An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News : Article View
NEWS | Oct. 21, 2024

National Guard Bureau Hosts 3rd Annual Cybersecurity Awareness Panel

By Sgt. 1st Class Jon Soucy, National Guard Bureau

ARLINGTON, Va. – Everybody plays a role in cybersecurity, National Guard and Department of Defense officials emphasized during a panel discussion on cybersecurity Oct. 16 at the Herbert R. Temple Army National Guard Readiness Center.

“Everyone out here is a cybersecurity warrior,” said Kenneth McNeill, the chief information officer with the National Guard Bureau and a panel member. “It is not just a small group that looks at this mission space. Every day, when you are at work, at home, even on your personal computer, you’re a cybersecurity warrior.” 

Stressing the impact individual actions can have on cybersecurity was one focus of the panel, held as part of Cybersecurity Awareness Month to help defend against cyber attacks and hacking.  

“October is that one month that we can focus on it, that we can reiterate how important it is for everyone to do their part,” said Ashley Jones, a panel member and cybersecurity adviser with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. “If you don’t do your part, it’s not an if situation, but when it’s going to happen. So, we want to make sure that everyone understands why cybersecurity is so important.”  

For those who work outside the cyber field, maintaining awareness of cyber attacks and some of their hallmarks can help maintain robust cybersecurity. 
 
“Cyber may not be your wheelhouse, you may not do anything with cyber on your daily job, but when you see these incidents and events pop up, Google to see what happened, what it was, what were the indicators of compromise,” said Jones. “That’s how you can be a cyber warrior.”

Awareness of those attacks and their hallmarks and making any needed adjustments go in tandem with maintaining strong passwords and only using approved devices on DOD and government networks to maintain strong cybersecurity.

“The end user is always going to play a part in that, and that’s why we’re here to talk about some of these things,” said U.S. Air Force Brig. Gen. Terrence Adams, a panel member and the deputy principal cyber adviser to the secretary of defense.

That includes being vigilant at home or while using personal internet-connected devices. 

 “You could get compromised at home and then come into the office and transfer that risk to your office because the network is so connective across the spectrum,” said Adams. 

Cybersecurity’s scope often extends beyond traditional desktop computers to encompass everyday devices such as smart watches, cars, and even appliances included in the “Internet of Things.” 

“We don’t think about that daily,” said Jones. “You just get up, do your day.”

However, the connective ubiquity of such devices can make it easy for adversaries to collect information or initiate cyber attacks.
 
“That is the right fertile ground for our adversaries to collect all kinds of information and take all kinds of action, as well as just your run-of-the-mill folks that want to stir up a little trouble,” said Leslie Beavers, a panel member and the DOD’s acting chief information officer.

As technology changes, so do the devices. Keeping an up-to-date policy on those items is another key. 

“Technology is constantly changing, and you have to get ahead of the game,” said McNeill. “We’re going to always put the policy in place. But, really, it’s all about leaning forward and knowing what new technology is out there, and then that drives the policy.”

It’s also important to include cybersecurity measures in the development stage of new components and devices, especially those designed to work specifically on DOD and government networks.  

“As we work to try to bring new things on the network, I think we should have the mindset to say no more new bad in the domain,” said Adams. “It should be designed to be cybersecure from the beginning. It should be thought about when we’re in the engineering phase, you know, not after it gets on the network.”

McNeill added that the DOD “has a very good process that you go through when we bring in new technologies and look at what we’re trying to use, whether it’s software, whether it’s hardware.” 

Overall, said panel members, education is key. 

“I think the important thing is to educate the members who are here in this room and everybody else that every connection is an opportunity,” said Adams. “Every connection is an opportunity for you to be more productive. Every connection is an opportunity for the adversary.”

Others agreed. 

“I need you to think about your cyber behavior and how you secure your information and your work information as if it were your bank account and as if your personal cybersecurity were involved,” said Beavers. “Cybersecurity month is great, but it really needs to be a 365 effort. That’s how important cybersecurity is to me personally, and I think needs to be to all of us.”
 

 

 

Related Articles
U.S. Air Force and Qatari Armed Forces service members solve a framework issue during the cybersecurity training Exercise Eagle Resolve 2025 in the U.S. Central Command area of responsibility Jan. 13, 2025. The training improved interoperability between U.S. and Gulf nation forces by enhancing communication, aligning operational strategies, and fostering joint responses to shared security challenges.
West Virginia Guard Joins Cyber Defense Training in Qatar
By Erica Bodker, | March 25, 2025
CHARLESTON, W. Va. - The West Virginia National Guard Cyber Protection Team - Mission Element joined over 30 cyber operators from six nations in the multinational exercise Eagle Resolve 2025 in Doha, Qatar. For two weeks,...

Maj. Joerge Baack, center, the 168th Cyberspace Operations Squadron director of operations, monitors his team during the International Cyber Defense Competition Feb. 22, 2025, at Iowa State University in Ames, Iowa. Cyber teams from the armed forces of Kosovo, Albania and Northern Macedonia participated with university teams from Iowa State, Kansas, DePaul, Northern Iowa, Drake and several Iowa high schools.
Iowa Wing Joins International Cyber Defense Competition
By Master Sgt. Michael Kelly, | Feb. 26, 2025
AMES, Iowa - Airmen of the 168th Cyberspace Operations Squadron assigned to the 132d Wing, Iowa Air National Guard, participated in the International Cyber Defense Competition Feb. 22 at Iowa State University. Cyber teams...

Members of the New Jersey Air National Guard and National Guard of the Republic of Cyprus pose for a group photo during training on Nov. 21, 2024, at Camp Panteli Katelari, Cyprus. The Republic of Cyprus National Guard and the NJNG collaborated on NCO best practices.
New Jersey National Guard, Cyprus Strengthen Partnership
By Capt. Tyshawn Jenkins, | Feb. 4, 2025
CAMP PANTELI KATELARI, Cyprus - The New Jersey National Guard and the Republic of Cyprus National Guard’s 50th Communication Information Squadron exchanged best practices in cybersecurity and leadership development as part of...