From the Fall 2025 Issue

From On-Premises to the Cloud: Transforming Cyber Resilience for Mission-Critical Systems

Josh Salmanson
Vice President, Defensive Cyber Practice, Chair of the WashingtonExec Cyber Council | Leidos

Organizations across environments such as military platforms, base operations, industrial control systems/supervisory control and data acquisition (ICS/SCADA), internet of things (IoT), and operational technology (OT) systems face an evolving threat landscape driven by advancements in technology, increased interconnectivity, and the sophistication of adversaries. Cloud computing can significantly enhance the operations and resilience of systems across environments by providing scalability, advanced analytics, centralized management, and robust disaster recovery capabilities. However, organizations must carefully address security, compliance, latency, and integration challenges to fully realize the benefits of cloud computing while maintaining the integrity and reliability of their systems. In an era of AI-driven threats, ransomware evolution, and supply chain infiltration, leaders must move beyond generic frameworks and embrace environment-specific risk management strategies. Failing to embrace cloud tools for specific operational needs is inefficient and dangerous. This article explores how securely managing systems from the cloud is essential for modern cybersecurity resilience and outlines actionable recommendations to leverage cloud capabilities across military platforms, ICS/SCADA systems, IoT networks, and OT environments.

The Benefits of Leveraging Cloud Computing for Enhanced Operations and Resilience

Cloud computing offers scalability, flexibility, and advanced security features that can significantly improve operational efficiency and resilience.

Cloud computing isn’t just a technological shift, it’s a game changer for organizations looking to strengthen their security, boost resilience, and unlock new levels of operational efficiency. Cloud computing offers scalability, flexibility, and advanced security features that can significantly improve operational efficiency and resilience. However, moving on-premises computing to the cloud, or adapting environments that are already cloud-based, must be done carefully to address the unique challenges and risks associated with each environment. Here are the key benefits of leveraging cloud computing to enhance security and resilience across mission-critical systems:

1.    Scalability and Elasticity
  • Benefit: Cloud platforms provide on-demand scalability, allowing organizations to dynamically allocate resources based on operational needs.
  • Environment application examples:
    • Military platforms can scale computational resources for mission-critical applications during peak operational periods.
    • Base operations can handle surges in administrative workload, such as payroll processing or logistics management.
2.    High Availability and Redundancy
  • Benefit: Cloud providers offer built-in redundancy and failover mechanisms to support the high availability of services.
  • Environment application examples:
    • ICS/SCADA systems can use cloud-based backups to recover quickly from disruptions.
    • OT systems can leverage cloud-based disaster recovery solutions to maintain operational continuity.
3.    Advanced Analytics and AI Integration
  • Benefit: Cloud platforms support the use of advanced analytics and AI tools to process large volumes of data and detect anomalies.
  • Environment application examples:
    • IoT systems can use cloud-based AI to analyze sensor data for predictive maintenance.
    • Base operations can leverage AI for threat detection and response in smart base environments.
4.    Centralized Management
  • Benefit: Cloud platforms provide centralized management and monitoring capabilities, simplifying oversight of distributed systems.
  • Environment application examples:
    • Military platforms can use cloud-based dashboards to monitor the status of deployed systems in real-time.
    • ICS/SCADA systems can centralize control and monitoring of geographically dispersed infrastructure.
5.    Enhanced Collaboration
  • Benefit: Cloud computing facilitates secure collaboration and data sharing across teams and locations.
  • Environment application examples:
    • Base operations can use cloud-based collaboration tools for interdepartmental coordination.
    • Military platforms can securely share mission-critical data with allied forces.
6.    Cost Efficiency
  • Benefit: Cloud computing is designed to reduce the need for on-premises infrastructure, lowering capital expenditure.
  • Environment application examples:
    • IoT systems can offload data processing to the cloud, which is designed to reduce the need for expensive edge computing devices.
    • Base operations can migrate administrative systems to the cloud, which aims to reduce IT overhead.
7.    Resilience Through Distributed Architecture
  • Benefit: Cloud providers operate distributed data centers, ensuring resilience against localized disruptions.
  • Environment application examples:
    • OT systems can use geographically distributed cloud resources to support continuity during regional outages.
    • ICS/SCADA systems can replicate critical data across multiple cloud regions for added resilience.

Environment-Specific Applications of Secure Cloud Computing

Organizations must tailor their risk models and controls to address the unique challenges of each environment while maintaining a holistic approach to cybersecurity.

While all environments share common cybersecurity principles, the implementation of risk management and security controls varies based on the operational priorities, threat landscapes, and compliance requirements. Military platforms emphasize survivability and mission assurance, while ICS/SCADA and OT systems prioritize availability and operational continuity. IoT systems focus on device-level security and privacy, and base operations integrate physical and cyber security. Organizations must tailor their risk models and controls to address the unique challenges of each environment while maintaining a holistic approach to cybersecurity.

Military platforms can use cloud-based mission planning and simulation tools to enhance operational readiness. Cloud computing also allows for secure cloud storage for encrypted communications and data backups during missions with Disrupted, Degraded, Intermittent, and Low-bandwidth (DDIL) environments.

  • Challenges for military platforms: Compliance with security requirements and integration/alignment with existing tools.
  • Mitigation strategy: Implementing automatic scanning tools, aligned with regulatory security frameworks, post-quantum encryption, and access controls can help protect sensitive data in the cloud.

Base operations professionals can relieve administrative burden by allowing cloud-based systems to handle payroll, logistics, and personnel management. Cloud computing adds to the resilience of base operations by maintaining continuity of operations during cyber or physical disruptions.

  • Challenges for base operations: Designing systems to integrate with physical security systems, like surveillance cameras, with cloud-based monitoring tools.
  • Mitigation strategy: Middleware and APIs may facilitate the connectivity of physical security elements and cloud analytics.

ICS and SCADA systems can use cloud-based analytics for real-time monitoring and predictive maintenance of critical infrastructure. Manufacturing, production, and utilities facilities can use cloud-based backups and failover mechanisms to recover from operational disruptions.

  • Challenges for ICS/SCADA systems: Updating aging infrastructure to address latency and connectivity issues for time-sensitive operations.
  • Mitigation strategy: Multicloud solutions can be designed to support the portability of applications and data across different cloud platforms.

IoT systems can use cloud-based platforms to manage and analyze data from the connected devices. Cloud-native analytics and AI can detect anomalies and predict failures in IoT networks.

  • Challenges for IoT systems: Secure communication between the IoT devices and the cloud to prevent data breaches.
  • Mitigation strategy: Implementing secure boot and firmware validation mechanisms, regularly updating and patching IoT devices, and using advanced encryption can enhance the secure communication protocols for edge computing devices.

OT systems can use cloud-based monitoring and control systems for manufacturing and logistics operations. There are cloud-based disaster recovery solutions to support the continuity of physical processes.

  • Challenges for OT systems: Ensuring compatibility between legacy IoT systems and modern cloud platforms.
  • Mitigation strategy: Prioritize these compatibility issues to strengthen access controls and authentication mechanisms and deploy intrusion detection systems tailored for OT environments.D

Cross-Environment Comparison

While each environment requires tailored strategies to address its unique challenges, understanding how risk management approaches and security controls differ across environments can provide valuable insights for building resilience. The following two tables offer a comparative view of these strategies and controls, highlighting the distinct priorities and practices that shape cybersecurity across military platforms, base operations, ICS/SCADA systems, IoT networks, and OT environments.

Josh Salmanson Table 1
Table 1. A comparison of risk management across environments
Josh Salmanson Table 2
Table 2. Contrasting security controls across environments

Cross-Environment Challenges and Considerations

Emerging threats such as AI-powered attacks, ransomware targeting critical systems, IoT vulnerabilities, and quantum computing risks are reshaping the cybersecurity battlefield across all environments. Organizations must adopt proactive strategies, leverage advanced technologies, and collaborate with government and industry partners to address these threats effectively and enhance their resilience in the face of evolving challenges. Here are some emerging threats that these organizations should be aware of:

  1. Cloud security risks:
    • Challenge: Vulnerabilities in cloud environments used for data storage and processing across environments
    • Mitigation strategy: Adopt a zero trust architecture and continuously verify access requests and enforce the principle of least privilege
  2. Supply chain attacks:
    • Challenge: Exploitation of vulnerabilities in hardware, software, or third-party vendors across all environments
    • Mitigation strategy: Strengthen supply chain security by conducting rigorous assessments
  3. AI-powered threats:
    • Challenge: Use of AI by adversaries to automate attacks at scale, evade detection, and manipulate data
    • Mitigation strategy: Invest in proactive AI-based defenses, use AI and machine learning to detect, respond, and power through sophisticated cyber attacks
  4. Quantum computing risks:
    • Challenge: The potential for quantum computing to break encryption, threatening secure communications and data protection
    • Mitigation strategy: Begin transitioning to secure post-quantum cryptography to lessen future risks
  5. Cyber-physical attacks:
    • Challenge: Integration of cyberattacks with physical sabotage to disrupt operations and cause damage
    • Mitigation Strategy: Enhance threat intelligence and participate in information sharing initiatives to stay informed about emerging threats

To meet today’s evolving threat landscape, Leidos delivers AI-driven cyber defense solutions that help securely manage mission-critical systems on premises and in the cloud. The solutions are designed to scale across diverse environments, supporting secure and agile capabilities to the unique challenges of military platforms, ISC/SCADA systems, IoT networks, and OT environments. By integrating advanced analytics and machine learning, Leidos helps organizations stay ahead of adversaries and protect cloud-based systems that are critical to mission success and operational continuity.

The Role of Leadership in Cyber Resilience

Building cloud-based cyber resilience requires strong leadership and a commitment to proactive risk management. Leaders must prioritize cybersecurity as a strategic imperative, embedding cloud capabilities into mission planning and decision-making. Collaboration is also essential. Organizations must work together to share threat intelligence, develop industry standards, and coordinate responses to emerging threats.

By educating employees on the risks and empowering them to take ownership of cybersecurity, organizations can move beyond enforcement to build a truly resilient security culture.

Leaders must foster a culture of cybersecurity awareness, ensuring that personnel at all levels understand the importance of protecting critical systems. Cybersecurity teams can’t be the “Department of ‘No’” anymore. There are too many institutionalized “workarounds.” Instead, they must collaborate with IT departments and organizational leadership to integrate security practices into their daily operations and decision-making. By educating employees on the risks and empowering them to take ownership of cybersecurity, organizations can move beyond enforcement to build a truly resilient security culture.

Conclusion 

The urgency of securely managing mission-critical systems from the cloud cannot be overstated. As adversaries grow more sophisticated, the risks to critical systems, from military platforms to IoT networks, continue to escalate. Organizations must adopt tailored strategies to address the unique challenges of each environment while leveraging cross-environment best practices to enhance overall cyber security resilience.  

By embracing zero trust principles, investing in AI-based defenses, and proactively preparing for quantum computing threats, leaders can safeguard their mission-critical operations and national security. The time to act is now — failure to prioritize environment-specific cybersecurity risks will have devastating consequences that extend far beyond individual systems to the very fabric of our national security, critical infrastructure, and the interconnected systems that underpin modern society. 

Leidos stands at the forefront of these efforts, delivering scalable, secure, and agile AI-driven. These cloud-based cyber defense solutions help organizations build resilience and operational continuity in an increasingly interconnected and hostile digital environment. 

Cyber resilience is not just a technical challenge; it is a strategic imperative. Leaders must rise to the occasion, embedding cybersecurity into mission planning, decision-making, and long-term investment, so their organizations are prepared to face the evolving threat landscape with confidence and resolve. lock

Josh Salmanson

Leave a Comment