b'able to build working capabilities with transition paths. That forces you to address issues that you might not have seen in a typical R&E initiative. Theres a number of good experiments going on, focusing on different areas like spectrum and augmented reality, but were all concerned about the security of those devices.Duchak: Some of the greatest security threats are cyberattacks, malicious actors, phishing attempts and exploited vulnerabilities. For the Defense Logistics Agency, we are continuously looking for ways to fortify our information networks and business systems by reducing vulnerable points where an adversary could gain access and move across and within our networks. Some examples include using hardened devices, managing Some of the greatest securitysoftware patches and reducing our threats are cyberattacks,attack surface.We remain vigilant in our security malicious actors, phishingfocus through a comprehensive attempts and exploitedCybersecurity Operations Division, which not only includes a 24x7 vulnerabilities.Computer Emergency Response Team, cybersecurity vulnerability managers and embedded - Dr. George Duchak counterintelligence capabilities, but also now includes an Assured Logistics Cyber Center. This center will help us stay ahead of threats to the logistics supply chain by aligning DLAs critical business functions with cyberspace operations to proactively identify strategies and techniques to address risks and plan for mitigations. We recognize the importance of integrating cybersecurity into daily business operations, including our software, hardware and supply chains. DLA is adopting this model in its hosting strategy and cloud environment to minimize risk and introduce industry best practices.Securing the Nations Network|Page 4'