Military cyber advocacy group taps first president to harness growing ‘hive mind’

Jason Macuray
A nonprofit made up of thousands of former and current military cyber professionals has named its first president, as the group looks to tap the country’s growing reservoir of digital security leaders and to weigh in more frequently on pressing cyber issues.

A nonprofit made up of thousands of former and current military cyber professionals has named its first president, as the group looks to tap the country’s growing reservoir of digital security leaders and to weigh in more frequently on pressing cyber issues.

The Military Cyber Professionals Association (MCPA) announced on Monday that Chris Cleary, who recently left federal service after three years as the Department of the Navy’s first principal cyber adviser, has been appointed the organization’s inaugural national president.

“The thing that’s interesting about cyber right now is, if you take any of the other warfighting domains there’s collective knowledge that you learn through osmosis because the community has been around for decades, or in some instances, centuries,” Cleary told Recorded Future News. “We just haven’t built that hive mind; generations of us have not made it through this, where there’s some collective memory that’s been established.”

“You have graybeards that are now ‘out there’ and pitch their wares as cyber. Whatever,” he added. Instead, the focus should be on “how do we begin to harness some of that knowledge and then feed it back into the community so it’s not lost?”

The appointment is an acknowledgement that, as the military’s cyber mission has grown and matured, the number of uniformed and civilian operators has swelled tremendously.

The MCPA, which Cleary has been involved with for over a decade, boasts more than 4,000 members nationwide. The organization’s board of advisors is a veritable who’s who of past military cyber leaders, including former heads of U.S. Cyber Command and the National Security Agency, leaders of various armed service digital warfighting entities and senior intelligence veterans.

Earlier this year the group sent a memo to both congressional Armed Services committees that urged lawmakers to establish a U.S. Cyber Force in this year’s National Defense Authorization Act. The Senate draft of the massive policy blueprint included a provision that called for an independent assessment of creating a seventh military service. It’s unclear if the language will make it into the bill’s final, compromise version.

Actions like sending the memo to Capitol Hill are “exactly the kind of thing the MCPA will be moving to,” according to Cleary. “There’s an NDAA proposal. ‘Hey, board, what do we think about that? Do we have an opinion?’”

Cleary, who will serve alongside the rest of MCPA’s leadership in an uncompensated capacity, said he would spend his first “six months to a year” ahead of the association’s annual HammerCon event reaching out to the group’s existing network to “bring the community together” and gauge what topics members are interested in or want to see MCPA more involved.

“For the people who are part of the MCPA, how do we create knowledge that can then be retained through the community and ensure that it doesn’t wind up gone forever?” he said.

LeadershipPeople
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Martin Matishak is a senior cybersecurity reporter for The Record. He spent the last five years at Politico, where he covered Congress, the Pentagon and the U.S. intelligence community and was a driving force behind the publication’s cybersecurity newsletter.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Kremlin-backed hackers attacking unpatched Outlook systems, Microsoft says

Next Post

Accounting software provider Tipalti investigating alleged ransomware attack

Related Posts

Check Point Warns of Zero-Day Attacks on its VPN Gateway Products

Check Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in the wild. Tracked as CVE-2024-24919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances. "The vulnerability potentially allows an attacker to read certain information on
Avatar
Read More