Military Cyber: An In-Depth Interview with Major General (Ret.) Neil Hersey


 

From the Battlefield to the Keyboard: A Conversation with Major General Neil Hersey on the Future of Cyber Defense

In the latest episode of our cybersecurity video series, we had the privilege of sitting down with Major General (Ret.) Neil Hersey to explore the evolving landscape of cyber operations in the U.S. military. The episode opens with a dose of humor and insight, thanks to an animated segment titled “The Cyber Recruit”, before diving into a far-reaching conversation about everything from cyber force structure and AI to the looming threats of quantum computing and the importance of public-private collaboration.

Cyber Command: Beyond the Stereotypes

The video begins with a lighthearted but pointed animated introduction. In it, Virtual Ron narrates the story of a tank-driving Army applicant who finds himself navigating the unexpected terrain of Cyber Command. It’s an amusing reminder that today’s cyber warriors come from all backgrounds—not just hoodie-wearing hackers, but also drone pilots, legal analysts, and linguists. The segment cleverly unpacks the misconceptions around military cyber careers and sets the stage for a more serious exploration of what it means to serve in the digital domain.

The Journey of a Modern Warfighter

Major General Hersey’s military story is one of adaptation and foresight. Starting in ROTC and cutting his teeth in military intelligence, he later pivoted to aviation and special operations—roles that took him to the front lines and ultimately into key leadership positions, including Deputy Commander of Army Cyber Command. His diverse background uniquely positioned him to help integrate cyber capabilities into broader joint military operations.

He emphasized that intelligence remains foundational across all domains of warfare. Whether it’s flying helicopters or launching cyber campaigns, good intel enables better decisions. Hersey brought an operator’s perspective to Cyber Command, one rooted in practical mission execution rather than abstract strategy.

NSA, CYBERCOM, and the Importance of Roles

A recurring theme throughout the discussion was the importance of clearly defining the roles and responsibilities of the various agencies in the cyber ecosystem. Hersey explained that while the NSA is focused on intelligence gathering under Title 50 authority, U.S. Cyber Command operates under Title 10, focused on defense and offense within the military context. Meanwhile, the FBI is charged with domestic cybercrime investigations under Title 18.

This division of labor is critical for legal clarity, mission effectiveness, and avoiding overreach. Effective cyber defense, Hersey argues, requires not just technical talent, but coordination between these entities to ensure missions are authorized, precise, and deconflicted.

Defining “Lethality” in the Digital Era

When people think about military power, they often think about tanks, missiles, or aircraft. But Hersey explains that lethality in cyber warfare is more nuanced. It might mean disabling an adversary’s air defense network before a physical operation or disrupting supply chains without firing a shot.

These effects are no less critical to mission success. In fact, they can reduce casualties and enhance precision. Cyber operations are not simply about data—they are about creating real-world consequences, often with far-reaching strategic impact.

Tech Innovation: Faster Than the Pentagon Can Blink

One of the more candid parts of the discussion revolved around the mismatch between how fast technology moves and how slowly military procurement operates. Traditional defense systems can take years or even decades to field. Cyber capabilities, however, evolve in months or weeks.

To stay ahead, Hersey emphasized the need for continued investment in talent, academic partnerships, and innovation pipelines. He praised the military’s growing openness to collaborating with startups and small businesses—a crucial move, he says, to tap into bleeding-edge technologies like quantum-safe encryption and synthetic data generation.

The Quantum Elephant in the Room

Speaking of quantum, Hersey didn’t mince words when it came to the threat posed by quantum computing. Once it becomes viable, today’s encryption systems—whether for banking, email, or national security—could be rendered obsolete. He called for urgent action in developing and deploying quantum-safe cryptography.

Solutions include better entropy generation, more robust randomness in key generation, and infrastructure segmentation like air gapping. He stressed that this isn’t just a government problem. The private sector must also start “quantum-proofing” their systems today—not after the first major quantum breach.

AI: A Force Multiplier for Commanders

Artificial Intelligence is already reshaping the battlefield, according to Hersey. From anomaly detection to alert prioritization, AI is helping defenders make sense of overwhelming data volumes. But it’s also aiding commanders by fusing data streams—cyber, kinetic, and signals—into coherent operational pictures.

However, he cautioned that AI is not a silver bullet. The quality of the models, the specificity of the use case, and the trust placed in autonomous systems all matter. Leaders must be able to interpret and challenge AI-driven recommendations, not blindly follow them.

Understanding Cyber Force Structure

Another key point was the structure of Cyber Command and how it integrates across services. Each military branch has its own cyber units, some focused on service-specific missions and others contributing to the Cyber Mission Force, a joint operational effort. Hersey also underscored the value of National Guard units, which often draw on private-sector expertise from members who work in tech during the week and serve on weekends.

There’s ongoing debate around whether NSA and Cyber Command should remain under a single leader (the so-called “dual-hatting” structure). Hersey believes they should. While both organizations are strong independently, their synergy—especially when it comes to intelligence-driven operations—makes the nation safer.

Life After the Uniform

Retirement hasn’t slowed Hersey down. He’s actively involved in several companies focused on cutting-edge cybersecurity domains—quantum-safe cryptography, cyber training software, synthetic data, and time-series analytics.

He also emphasized the importance of maintaining work-life balance. A world-class triathlete, Hersey encouraged today’s cyber professionals to get outside, pursue personal growth, and avoid tunnel vision. Cybersecurity, he noted, is a demanding field. Wellness and diverse interests are essential to long-term success.

A Call to Serve—and Lead

The episode ends on a hopeful note. Hersey encourages viewers—especially young people—to consider careers in the Army’s cyber branch or the broader cybersecurity field. It’s a career path with multiple tracks: technical, legal, policy, leadership—and it touches every aspect of national security and civilian life.

If you're passionate about problem-solving, protecting infrastructure, or pioneering new technologies, the cyber domain offers a mission with real impact.

Cyber operations are no longer a niche or backroom activity—they are front-line missions with the power to shape conflicts and protect nations. As this episode illustrates, success in this domain requires more than just coding skills. It demands leadership, adaptability, cross-sector collaboration, and a relentless commitment to innovation.

We thank Major General Hersey for his service and his continued contributions to the cyber ecosystem. If you haven’t already, watch the full episode and consider how you can play a role in securing the digital frontier.

 

Watch More

 
Next
Next

What SciFi Teaches About AI - Star Trek, HAL 9000, Colossus & WarGames Explained