Page 174 - Cyber Defense eMagazine September 2025
P. 174

The  elements  of  that  taxonomy  are  Cyberspace  IT,  Cybersecurity,  Cyberspace  Effects,  Intelligence
            (Cyberspace), Cyberspace Enablers, Software Engineering, Data/AI.

            Both CJADC2 and 8140 have a “total” concept – the former expands and unifies full-spectrum operations
            while the latter expands and unifies the expertise that makes that possible. This is a significant step in
            formalizing a broader and more dynamic view of the cyber workforce that extends beyond information
            assurance and cybersecurity.

            It’s instructive to look at some key examples of how cyber workforce elements mesh with each other to
            enable CJADC2 functions:



               •  Cyber  as  a  warfighting  function:  The  inclusion  of  the  Cyberspace  Effects  element  in  the
                   framework is the explicit acknowledgement of cyber as a defensive and offensive weapon, where
                   operators not only protect and preserve communication networks, information systems, and digital
                   enclaves, but also execute force projection activities as directed. The Intelligence (Cyberspace)
                   element is a DCO/OCO enabler, as planners and analysts rely on the integration of sensing and
                   cyber, especially at the tactical edge and in highly contested environments.
               •  The resourcing matrix: Integration of command and control does not only mean integration of
                   systems and networks, where Cyberspace IT plays a foundational engineering implementation
                   and sustainment role, but also stakeholder integration at the executive leadership level, where
                   Cyber Enablers (capability sponsors, portfolio managers, legal advisors), align acquisition and
                   development  strategies  and  adopt  novel  approaches  to  tackle  the  hard  problems  posed  by
                   disjointed  data  architectures  and  perceived  policy  barriers,  leveraging  the  best  that  agile
                   commercial innovation and open standard models (MOSA/SOSA) have to offer.
               •  Purposeful  data  curation  for  information  advantage  resides  at  the  center  of  the  Data/AI
                   interplay to prevent Garbage In/Garbage Out effect, fine tune LLMs to mission sets, and enable
                   reuse  and  interoperability  and  making  disparate  data  flows  “make  sense”  to  the  Intelligence
                   (Cyberspace)  elements  (both  producers  and  consumers)  across  all  domains  via  AI-enabled
                   processes, which are in turn built upon Cyberspace IT and Software Engineering layers.
               •  Data  accessibility:  Software  Engineering  acts  as  the  force  multiplier  that  threads  together
                   modules and segments across the E2E data logistic chains (as software-defined functions support
                   dynamic configurability in near real time); unleashes data fabric interoperability (e.g., APIs); and
                   enables  bespoke  data  visualization  (e.g.,  UI/UX).  Embedded  in  Software  Engineering  is  the
                   DevSecOps practice and its ability to quickly deliver mission relevant code to the warfighter fast
                   and frequently.
               •  Cybersecurity for the Data Logistics Chain: Since CJADC2 is founded on the concept of a
                   multi-network, multi-lateral, multi-contingent ecosystem, the Cybersecurity element will drive a
                   Zero Trust (ZT) design that intelligently reduces the threat footprint for critical systems and grants
                   network segment data access to only those entities identified as needing said access utilizing
                   policy enforcement points across the chain. That also requires not just the presence of a ZT-
                   trained Cybersecurity workforce but also significant active stakeholder involvement (going back
                   to our executive Cyber Enablers) in the development and prioritization of ZT-focused solutions
                   that do not create new stovepipes. Also critical for CJADC2, as a multi-classification architecture,





            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          174
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   169   170   171   172   173   174   175   176   177   178   179