Former Cyber Command Private Sector lead, Jason Kikta Interview
Cyber Heroes and Real-World Missions: Lessons from the Cyber National Mission Force with Jason Kikta
In this week’s feature from Gula Tech Adventures, we dive into a compelling blend of cyber animation and real-world insight. The episode begins with a satirical animated short titled Cyber Heroes, in which a rogue AI language model—LLM Man—emerges from an unpatched tool and attempts to take over the world’s systems. It’s a clever reminder that all the threat intelligence in the world won’t help if your systems aren’t patched. Following the short, Ron Gula sits down with Jason Kikta, former Marine Corps officer and Cyber National Mission Force (CNMF) leader, for an in-depth interview about cyber operations, defense strategy, and why basic IT hygiene still reigns supreme.
From Marine Corps to Cyber Command
Kikta’s journey into elite cyber operations began with a humble IT background. Enlisting in the Marine Corps as a computer technician, he learned to fix PCs, printers, and servers—skills that formed the foundation of his cyber expertise. After receiving an officer commission and a degree from Miami of Ohio, he was assigned to Marine Forces Cyber Command. But a twist of fate sent him straight to Cyber Command proper—and more specifically, into the early formation of CNMF, where he became the 14th person on what was then a brand-new team.
This experience placed him at the epicenter of the military’s growing cyber mission, at a time when CNMF was tasked with defining what “cyber operations” would even look like.
Understanding the Ecosystem: NSA, Cyber Command, and CNMF
Kikta offered clarity for those unfamiliar with the government’s cyber structure. NSA operates under both the intelligence and defense umbrellas, drawing its authority from Title 50. Cyber Command, on the other hand, is a purely Title 10 military organization focused on action and deterrence.
While NSA collects signals intelligence, it is Cyber Command—through CNMF—that is tasked with taking action to disrupt adversaries. This dual-hat structure, where the Director of NSA also leads Cyber Command, allows for close integration of intelligence and operational execution.
Evolving Battlegrounds: Red, Gray, and U.S. Space
Initially, CNMF focused on “red space”—foreign adversary infrastructure within sovereign borders like Russia or China. The challenge was always jurisdiction: What could the U.S. military touch, and what required local or law enforcement cooperation?
But adversaries adapted. They moved from hijacking foreign servers to leasing commercial infrastructure, especially in U.S.-based cloud providers like AWS. That change made things more complex. When an adversary rents a server in Virginia to attack U.S. systems, it's no longer an international matter—it’s domestic. And Title 10 military operations can't take place inside the U.S. without special conditions.
Kikta helped launch new collaboration models to respond to this challenge, including one called “Under Advisement,” where CNMF would work directly with U.S. companies to help them defend against adversaries using their own infrastructure.
Public-Private Cyber Partnerships: Trust is the New Firewall
Kikta emphasized that effective defense requires trusted partnerships across the public and private sectors. Early on, industry players were wary of sharing threat intelligence with the government, especially with a military agency. Some even outright refused. But over time, trust grew—fueled not by authority or rank, but by transparency and consistency.
The principle behind programs like “Under Advisement” was simple: accept tips under mutual understanding, not enforcement. In some cases, companies handed over crucial threat indicators—begrudgingly or even anonymously—but did so because they believed it was the right thing to do.
Kikta and his team focused on being a reliable partner rather than a feared authority. He likened it to helping someone return a lost wallet—you do it because it’s the right thing, not because you’re obligated.
Hunt Forward Missions: Offensive Defense on Foreign Soil
One of CNMF’s most impactful initiatives was “Hunt Forward,” where teams were deployed to allied nations to detect and disrupt adversaries before they could strike U.S. systems. These proactive missions involved sending U.S. cyber forces into foreign networks—with permission—to search for signs of Russian, Chinese, or Iranian activity.
The results? Rich, actionable intelligence and stronger relationships with partner nations. These missions not only helped protect U.S. networks but also contributed to a broader coalition defense effort against shared threats.
Patch Your Stuff: The Most Underrated Defense Strategy
Kikta’s most enduring lesson from a decade of cyber ops? Basic IT hygiene—especially patching—is still the most powerful defense against cyber threats.
CNMF could kick out intruders from compromised networks, but if those networks weren’t properly patched, the adversaries came right back. Without inventorying assets, automating patch deployment, and securing identities, even the most advanced counter-cyber team couldn’t prevent repeat intrusions.
From Military Ops to Private Sector Impact: Automox
Today, Kikta serves as Chief Security Officer and Head of Product at Automox, a patch management platform that automates system updates and security configurations. For Kikta, this isn’t just a product—it’s a mission continuation.
After years of watching the same vulnerabilities exploited again and again, Kikta saw patch management as a missing link. Automox helps organizations—small businesses and large enterprises alike—stay ahead by simplifying patching and configuration. It’s fire-and-forget, cloud-native, and designed to reduce the toil that plagues most IT teams.
Kikta sees Automox not just as a patching solution, but as the foundation of cyber hygiene. And thanks to his background at CNMF, he brings a deep understanding of what’s really at stake if organizations fail to act.
Serving the 99%: From Fortune 500 to Main Street SMBs
While some security companies focus exclusively on large enterprises, Automox serves a broad swath of the market. Whether you have 50 endpoints or 50,000, the same cloud platform delivers security outcomes. The difference is in how it’s deployed—self-service for smaller teams, robust integrations and reporting for the big players.
It’s a refreshing model in an industry where “simple” is often sacrificed for “feature-rich.” Automox does both, without the complexity.
Beyond Automox: Education and Mission Continuity
Kikta isn’t done serving. He teaches a graduate-level course at Johns Hopkins’ Alperovitch Institute called “Intelligence and Cyberspace,” where students explore how espionage, disinformation, and cyber operations intersect. It’s one more way he’s shaping the next generation of cyber defenders.
Final Thoughts: Cybersecurity is a Team Sport
In both his CNMF days and his current role, Kikta sees cybersecurity as a collective responsibility. Government, military, commercial vendors, and small businesses all play a part. The days of working in silos are over.
From cartoons of rogue AI to real-world Hunt Forward operations, this episode of Cyber Heroes reminds us that cyber threats don’t stop evolving—and neither should we. Whether you’re a Marine fixing servers, a vendor managing patches, or an enterprise fighting ransomware, the mission is the same: secure your systems, build partnerships, and stay patched.
To learn more about Automox or connect with Jason Kikta, visit automox.com or find him on LinkedIn. And if you liked this episode, subscribe to Gula Tech Adventures for more interviews, animated insights, and real-world strategies to defend the digital frontier.