"Cyber threat-based mission assurance” as a service
TOPIC SPONSOR: ACC/A6O
End-to-end cyber surety from penetration testing, fixing discovered vulnerabilities, and optimizing defensive cyber operations as one integrated entity and unit of action. What authorities, responsibilities, and resources would need to be realigned and where would that realignment best be suited?