CAF Cyber Operations and Security: Defending Networks
The cyber support provided to CJOC/CAF operations and the clear objective of defending networks against attacks are highlighted in this briefing. It explains the distinction between security and defense in network protection strategies, emphasizing the proactive nature of security and the reactive nature of defense. The role of JCOT in the CAF cyber operations framework is outlined, detailing its relationships and operational responsibilities. Additionally, the involvement of JCOT in cyber planning to enhance CAF cyber capabilities and address capability gaps is discussed.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Cyber Support to CJOC / CAF Operations Brief to AFCEA 3 March 2015 LCol Nick Torrington-Smith Team Lead Joint Cyber Operations Team
CAF Cyber Operations Cyber Operations: The application of coordinated cyber capabilities to achieve an objective A clear objective: Defending our networks!
Security vs Defence Security is primarily concerned with protection from attacks that may occur proactive and sets conditions for Defence practices, policies, and guidelines that describe ideal operating conditions for a network may additionally prescribe technical controls to enforce these conditions Defence is the deliberate response to an attack that has occurred or is ongoing exists to address a Security condition that has been overcome aim is to return to the operating condition prescribed by Security Defence takes over where Security has been overcome!
JCOT C2 Relationships CJOC COS Ops BGen Brennan CFIOG Col Moritsugu D Cyber FD Col Sabourin OPCON Operationally responsive To Comd CJOC JCOT work informs FD efforts Administrative support Positions belong to DG Cyber Champion for CFIOG mission set within CJOC Works across all functional areas (CJOC Cyber Champion) JCOT Team Lead LCol Torrington-Smith JCOT Operations Capt Amberley JCOT Deputy Team Lead Maj Caron JCOT Plans Maj Deschenes CSD CJOC SIGINT Analysts Team JCOT Int PO1 Spenst
Cyber Planning In coordination with key functional staffs, participate in various planning groups to provide cyber inputs into the Operational Planning Process within the CJOC Ensure CAF cyber capabilities are represented in the mission planning process Assist in identifying current and future cyber capability gaps in support of CAF operations Provide situational awareness on EW, SIGINT and CNO developments and impacts on CAF operations and CJOC priorities
OP LADON Mission DND/CAF will develop a comprehensive operational framework for the conduct of DCO to maintain DND/CAF freedom of manoeuvre in the cyber domain. CDS Intent. My intent is to maintain freedom of manoeuvre across all domains including the cyber domain. This will be achieved by operationalizing the conduct of DCO to defend , on a continuous basis, DND/CAF CIS, data, and associated infrastructure critical to the deployment, conduct and sustainment of DND/CAF missions, and to the command and control of military forces at home and abroad.
OP LADON MA brief to Comd CJOC: 9 Mar 2015 COA development: Feb Apr 2015. Decision brief to Comd CJOC early May 2015 BB to CDS NLT end May 2015 (implies prior socialization with other L1 stakeholders by this date) Plan development Jun Jul 2015. Approval of plan by Comd CJOC NLT Sept 2015 Execution order signed by CDS NLT Nov 2015. In Greek mythology, LADON was the serpent-like dragon that twined and twisted around the tree in the Garden of the Hesperides and guarded the golden apples.
Cyber Operations Maintain awareness of developments in current CAF operations that have a cyber nexus or which could be better supported by existing cyber capabilities, and inform and advise appropriate CJOC staff and external agencies as appropriate Provide cyber situational awareness to Comd CJOC and key staff Evaluate lessons learned from CAF operations which have a cyber relevance to ensure capability development efforts are initiated as appropriate
Cyber Intelligence Link into CFINTCOM intelligence capability supporting cyber operations from strategic to tactical Provide SA on adversarial cyber activities Coordinate cyber related CCIRs Propose cyber intelligence collection tasks to satisfy CJOC operational requirements (cyber IPB) Advise on potential cyber threat / risks for CAF operations
Intelligence Assessments Complete In progress Contribution to other products
Summary - Current Activities Operations CJOC CUB Situational Awareness Products OP CHAMPION (Improved defensive posture) Support to Allies / Collaborative efforts Intelligence Threat Assessments Support to planning Planning OP LADON Deliberate planning effort for DCO Cyber inputs to CONPLANS / OPLANS / SOODOs Other support Cyber play in exercises and joint training events Other CJOC committees and boards