TechNet Augusta 2015: Sandra Jontz reports from TechNet Augusta held August 25-27. Visit and bookmark the SIGNAL event coverage page for real-time coverage and the Show Daily.
Gary Wang, deputy chief information officer/G-6 in the U.S. Army, says the U.S. government needs to identify the next generation of cyberwarriors when you are children. Photo by Mike Carpenter Best Places to Find Cyberwarriors? Elementary Schools

Some of today’s 9-year-olds code in Java during their summer vacations, making them the optimal candidates the U.S. government and military should school to be the next generation of cyberwarriors.

Attendees listen to keynote addresses during the third annual AFCEA International TechNet Augusta conference, which wraps up Thursday. Photo by Mike Carptenter Cyber Capabilities to Protect the DODIN Could Entice Interesting Work Force

Uncle Sam wants you—especially unicorns, leprechauns or something in between. As the U.S. Defense Department revamps the way it protects its critical infrastructures and networks from emerging cyberthreats, military leaders want to reshape their work force and attract to their ranks highly specialized experts, including coveted data scientists.

Maj. Gen. Stephen Fogarty, USA, commanding general of U.S. Army Cyber Center of Excellence at Fort Gordon, Georgia, takes to the white board to illustrate dysfunctional stovepipes that keep military disciplines from sharing information and missions. Photo by Mike Carpenter Cyberwarriors Wrestle to Define 'Convergence'

Convergence was the buzzword du jour as leaders outlined major changes to sweep the U.S. Army in efforts to shore up cyber weaknesses following a year of high-profile breaches and hacks that stunned the Defense Department. It is part of a cultural change that will have several military disciplines working together and removing the divides that have kept the intelligence community from working closely with signal commands, electronic warfare, cyber and information operations.

Gary Martin (c), program executive officer for command, control and communications-tactical (PEO C3T), discusses convergence at AFCEA's TechNet Augusta 2015 conference. Army Leaders Must Move Fast to Keep Cybersecurity Momentum

The U.S. Army must move quicker toward a massive cultural change to streamline cybersecurity processes—from training to all-out operations—if leaders hope to maintain the momentum toward innovation. 

Marines conduct civil-military operations and collect, process, analyze and share information using software from a smartphone. DISA Offers Mobile Solution for Secret Network; NGA Now 'Has an App for That'

The Defense Department’s much-anticipated capability solution to access classified voice and email up to the secret level from mobile devices finally migrated from the pilot stage and now is operational; while at the NGA, they've got an app store up and running that serves as a clearing house for geospatial-related mobile applications. 

Mitigating OPM Breach's Damage to National Security: The Potential of Big Data

The cyber breach at OPM pilfered the personal information of millions of U.S. federal workers, putting them at risk and highlighting a number of security shortcomings within the federal government. But the true magnitude of the attack has yet to be realized, much less revealed.