cybersecurity in navy budget request

Navy budgets for cyber resiliency

The Navy has taken aim at bolstering its cybersecurity posture, not only because of the threat a more connected world poses but also to ensure  it can operate effectively in contested cyber environments.

According to recently released budget documents, the service is asking asking for $88 million for research and development associated with cyber resiliency.  The funds will go towards specific recommendations stemming from Operation Rolling Tide and Task Force Cyber Awakening, a Navy spokesperson told GCN. 

Operation Rolling Tide was the Navy’s first named cyber operation; at least five Naval units were dispatched to defend unclassified networks against an Iranian intrusion seeking to impair command and control capabilities as well as conduct basic reconnaissance. 

Task Force Cyber Awakening aimed to “gain a holistic view of cybersecurity risk across the Navy and address the fragmented and uneven efforts across our platforms and systems,” according to the Office of the Deputy Chief of Naval Operations for Information Dominance.

To a large degree, the recommendations “focus on non-recurring engineering to establish control points and boundary defense” across Navy systems, as well as investments in cyber situational awareness, the spokesperson said.  “The [Department of the Navy’s] cyber resiliency efforts are focused on continued operations in a contested cyber environment.” 

The funding for programs contributing to cyber resiliency is as follows:

  • IT development - $4,650,000
  • Information systems security - $17,158,000
  • Surface support - $4,665,000
  • Combat system integration - $2,879,000
  • Tactical command system - $212,000
  • Aegis combatant combat system engineering - $19,828,000
  • Space and electronic warfare - $5,482,000
  • Ship self defense - $7,559,000
  • Depot maintenance - $396,000

About the Author

Mark Pomerleau is a former editorial fellow with GCN and Defense Systems.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected