MXDR for Google Cloud
Lessons in Execution: Unity of Effort
Part of Foresite’s Lessons in Execution series, exploring how principles forged in service continue to shape modern cybersecurity leadership. |
In the days after Veterans Day, reflection matters as much as gratitude—the lessons of service continue to guide us every day.
It is a period of gratitude, certainly, but November is also an opportunity for sustained reflection on the essential foundations of effective service. These are lessons that transcend the uniform and apply directly to the most critical challenges we face today in cyberspace, forming the basis of our Lessons in Execution series.
The foundational truth of American conflict has rarely been one of isolation. From the earliest fights for independence to the global wars of the 20th century, the United States has fought alongside allies. The enduring strength of our nation—in both defense and diplomacy—has been defined by this capacity to build, coordinate, and execute joint missions with partners.
We are stronger, more resilient, and more effective together.
This historical reality of multi-national effort is not a talking point; it is a strategic blueprint for success, and it is the same blueprint that must govern our approach to modern defense.
The Unseen Front: From Foxholes to Backbones
My own service was defined by its joint, multi-national character. From NATO missions in Eastern Europe and Afghanistan to joint exercises across the Pacific with the Republic of Korea, Indonesia, Japan, and Mexico. Even after leaving active duty, that unifying principle remained in domestic operations—whether patrolling with the LAPD or fighting catastrophic fires alongside crews from federal, state, and global partners.
Different flags, different uniforms, different patches—yet on the ground, the purpose was always singular. We were bound by a clear allegiance to a mission greater than any single individual, unit, or nation.
That deep-seated commitment to a common purpose and strategic alliance is the thread that stitches the military experience to the world of cybersecurity.

Tim Suwandhaputra with multinational partners from the Romanian Army and Ukrainian Armed Forces during joint training operations. (2018)

Tim Suwandhaputra with soldiers from the Armenian Armed Forces and the German Bundeswehr during the NATO Resolute Support Mission (RSM) in Afghanistan (2018)

Coalition strength—forces from 14 nations during Rapid Trident 18, Yavoriv, Ukraine

Tim Suwandhaputra with the Tentara Nasional Indonesia (TNI) during RIMPAC 2018
When veterans transition into civilian careers, the shift is often seen as a change in profession. In cybersecurity, however, it is more accurately a change in the arena, not the intent. The principles of the joint force are the operating model for secure operations. The environment changes—from kinetic to digital—but the required operational tempo and dedication to the mission remain constant.
Principles of the Joint Force in Cybersecurity
-
Clarity Under Pressure
The ability to execute a complex plan when information is incomplete and the stakes are highest. This is the definition of effective incident response. When a crisis hits, the veteran’s trained instinct is not panic, but deliberate action based on established procedure. -
Unity of Effort
Understanding that a firewall, an analyst, or an executive decision is part of a larger defensive system. True defense requires precision from every element, regardless of its origin. This is the understanding that the smallest detail can compromise the entire mission. -
Disciplined Communication
Precision in language is the difference between success and catastrophic failure. In military operations, as in security operations, there is no room for ambiguity. Every report, every alert, must be concise, factual, and actionable.
The Imperative of Interoperability
In any joint operation, whether military or cyber, success hinges on interoperability. It means different systems—different armies, navies, or, in our case, different security tools and intelligence feeds—must be able to talk to one another, instantly and without translation.
In the field, this is about standardized map grids, common frequencies, and shared procedures that allow a Marine to call for support from an Air Force asset, or a U.S. unit to coordinate logistics with a German or Korean counterpart.

Tim Suwandhaputra speaks with a Romanian soldier at a checkpoint during Rapid Trident 18, Yavoriv, Ukraine, Sept. 10, 2018. U.S. Army photo by Sgt. Timothy Massey. Image courtesy of DVIDSHUB.
In cybersecurity, the principle is identical. We must standardize protocols, embrace open standards, and adopt a common language for telemetry and threat intelligence. Complexity and fragmentation are the adversary’s greatest advantage. Veterans naturally value interoperability because they have seen the cost of systems that cannot communicate. They understand that a mission-critical failure often begins not with a malicious payload, but with two friendly systems failing to exchange information effectively.
This discipline of adopting common standards is not a technical preference; it is a strategic imperative for progress.
The Operational Cycle: Plan, Execute, and Reflect
One of the most valuable transfers from military to cyber defense is the formal, relentless commitment to the operational cycle. In the military, this is the continuous loop of planning, execution, and, critically, the After-Action Review (AAR).
Cybersecurity requires this structured approach to maintain progress:
-
Deliberate Planning
Anticipating adversary movements and allocating resources before the event—not merely reacting to it. -
Disciplined Execution
Sticking to the plan until the conditions change, requiring a measured, not frantic, shift. -
Humble Reflection
The AAR is a non-judgmental process designed to find the truth of what happened and why. It is central to building organizational learning and future resilience. We must adopt this culture of honest self-assessment to win the long game in security.
Veterans are trained in this cycle. They understand that trust is built not only in the plan, but in the rigorous review that follows, ensuring that failures become lessons, and lessons become the new standard operating procedure.
Shared Fate: The Veteran’s Perspective on Cyber Alliance
The corporate landscape is competitive, yes, but in both the military and the cyber industry, there is a clear understanding of shared fate. When I was on a mission, the success of the entire joint force—regardless of uniform—was the only metric that mattered. Failure was not localized; it was systemic.
This translates directly to cybersecurity.
The community of professionals dedicated to cyber defense must transcend the boundaries of the company they work for or the technology stack they champion. A security failure anywhere is a lesson or a vulnerability everywhere. We compete on execution, but we must align on defense. Veterans understand this deeply: belonging is tied to a higher objective. Trust is earned through shared struggle, and genuine security is achieved through collective responsibility. Our highest purpose is the mission, and that mission is universal.
Veterans do not simply seek employment; they seek purpose. They bring with them a non-negotiable commitment to the mission, a profound understanding of alliance and interoperability, and a learned ability to build and lead through complexity. As an industry, we must not just welcome them, we must study the principles of discipline and unity they embody. We must operate as a joint force, leveraging every available ally, technology, and lesson learned.
Reflecting on the November observances of Veterans Day, Remembrance, and Armistice provides a clear reminder of the highest calling: service. The disciplined lessons of enduring alliance are, in fact, our best defense in cybersecurity, where that commitment is needed now more than ever.