Back to news

January 11, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

CEO of BAE Systems: Overcoming hardships for a better year

By: Charles Woodburn

The beginning of 2020 was an exciting time for our company; we had just announced we would acquire two high-performing new businesses out of the Raytheon and United Technologies Corporation merger. None of us could have predicted that just weeks later, the majority of our 88,000 employees around the world would be working from home as, like so many companies, we grappled with the unprecedented impact of a global pandemic.

Like all businesses, we've experienced challenges this year, especially in the areas that support civil aviation. We've had to adapt and make difficult decisions, but thanks to the actions we've taken to enhance the resilience of our business and the remarkable fortitude of our people, we've continued to deliver on our customers' priorities while keeping our people safe.

While COVID-19 clearly caused disruption in the second quarter, since then most of our defense businesses have been operating with well over 90 percent of employees working. The willingness of our customers to maintain cash flow into our businesses also enabled us to support our suppliers — including small and medium-sized companies — through the pandemic.

Collaborative partnership with our customers has been essential to the defense industry's ability to press ahead over the past year. It remains essential as we move forward through 2021 and face an uncertain global environment with complex threats. It's only by industry and government working closely, understanding each other, and maintaining trust that we'll be able to innovate quickly to outpace the threats. As governments commit to increased spending on defense in countries such as Australia, the U.K. and several European nations, the defense industry must rise to the challenge.

Our sector not only provides critical capability for a nation's security — we deliver real benefits to the economy by sustaining and creating highly skilled jobs through investment in research and technology and through exports. I strongly believe we can have a key role to play in restoring the economies of the countries in which we operate.

For our part in 2021, we'll continue to invest in skills and in new technologies that are vital to maintaining our strong positions on next-generation capabilities across the air, maritime, land and cyber domains.

In the U.S. market, we continue to stay well-aligned to the U.S. National Defense Strategy and are investing heavily in modernizing facilities and using new technologies. For example, we're deploying new virtual manufacturing and robotic welding in our combat vehicle production. While the new administration's priorities are not yet clear, we expect to stay well-aligned, given our work focused on combat vehicles, precision-guided munitions, naval ship repair and modernization, electronic warfare, hypersonics, space resilience, and security.

In the U.K., the announcement of increased funding for the Ministry of Defence provides welcome stability. The submission of the outline business case for Tempest at the end of 2020 was another significant step in this hugely exciting project to deliver a next-generation future combat air system. Working with our partners and supply chain, we're using cutting-edge technologies to transform how we design, develop and manufacture, helping to reduce time and cost. We'll ramp up the number of people we have working on the program through 2021, including apprentices and graduates, as part of our commitment to recruit 1,250 trainees across the U.K., despite the pandemic.

In Australia, we're excited to have begun work on the prototype for the Hunter-class frigate — an Australian version of the U.K.'s Type 26. We recently recruited the 1,000th Hunter employee and expect to recruit up to 1,000 more people, including apprentices and graduates, in 2021 as the program continues to ramp up. Working with our partners and customer, we're supporting Australia to develop its sovereign defense capability to deliver on the country's recently published 10-year defense strategy.

It's been a challenging year of trying to stay connected while maintaining physical distance; the inability to travel to our businesses around the world and meet our people and our customers is something I've found frustrating at times. But if we continue working closely with our partners to use the lessons we've learned in 2020, particularly regarding our agility, resilience and efficiency, this industry can play an increasingly important role in restoring our battered economies, while keeping citizens safe and economies prosperous.

Charles Woodburn is the CEO of BAE Systems.

https://www.defensenews.com/outlook/2021/01/11/ceo-of-bae-systems-overcoming-hardships-for-a-better-year/

On the same subject

  • Défense aéroterrestre : dossier envoyé aux 170 000 contacts COGES le 11 juin prochain.

    May 25, 2020 | International, Aerospace, Land

    Défense aéroterrestre : dossier envoyé aux 170 000 contacts COGES le 11 juin prochain.

    #COGES #missile #drone #H160M #ALAT #aéroterrestre #Guépard Air&Cosmos finalise son dossier du 5 juin "Matériels de défense aéroterrestre". Cette édition d'Air&Cosmos bénéficiera d'une sur-diffusion exceptionnelle et ciblée : Diffusion à tous les abonnés papier et numérique d'Air&Cosmos magazine Diffusion à tous les contacts exposants, visiteurs et délégations partenaires du COGES/Eurosatory. En partenariat avec le COGES, la version numérique de cette édition du 5 juin sera en effet incluse dans la newsletter du COGES du 11 juin 2020 expédiée à 170 000 contacts. Diffusion dans l'espace Partenaires presse du site web d'Eurosatory. Voici le détail du dossier : Emploi des drones au sein de l'Armée de Terre. Interview du Comalat, le Général Bertrand VALLETTE d'OSIA Infographie détaillée de l'Airbus Helicopters HIL (H160M) "Guépard" Le Guépard et son MCO Mistral 3 : l'arme anti-drones de MBDA https://air-cosmos.com/article/dfense-aroterrestre-dossier-envoy-aux-170-000-contacts-coges-le-11-juin-prochain-22966

  • Northrop Grumman plans ammunition plant partnership in Lithuania

    September 23, 2024 | International, Land

    Northrop Grumman plans ammunition plant partnership in Lithuania

  • What’s changing in the cyber domain? We ask industry experts

    September 3, 2019 | International, Security

    What’s changing in the cyber domain? We ask industry experts

    By: Andrew Eversden “What are you talking about now in cybersecurity that you weren't talking about six months ago?” Fifth Domain posed this question to cybersecurity experts at Black Hat, a cybersecurity conference in Las Vegas, Nevada, that ran from Aug. 3-8. With the cyber domain rapidly evolving, we wanted to know how conversations within the cyber community are changing. Some pointed to a new focus on utility systems and web-connected devices that sit on critical infrastructure. “It's only a matter of time until there's another major disruption in an electric utility somewhere in the world, probably not in the U.S., but elsewhere,” Sergio Caltagirone, threat intelligence director at Dragos, said at the conference Aug. 5. “But oil and gas has the higher likelihood of a major destructive and loss-of-life event. And I think most people did not realize how close to that we actually were.” Caltagirone was referring to the TRISIS event, malware that struck industrial control systems at a Saudi Arabian petrochemical plant and could've caused physical harm. He said that in the aftermath of that attack, threat researchers diving into the details realized just how bad it could've been. “We started finding a lot of stuff which hadn't been found before,” Caltagirone said. “Which made us realize very quickly how close that space is to a major event.” Dave Weinstein, chief security officer at Claroty, pointed to an “explosion” of devices connected to the internet of things.. “It's really a product of this general consensus among industrial organizations that the benefits exceed the costs in terms of embracing this type of digital transformation," Weinstein said Aug. 8, adding that organizations must be “mindful” of these devices and have a plan to mitigate their potential vulnerabilities. Brian Costello, a senior vice president at Flashpoint, told Fifth Domain on Aug. 8 that he is more often than before focusing on targeted cyberattacks from bad actors. That's a shift away from “campaign-based” attacks that tracked. There's “more planning out, more scoping out of targets and taking long-term planning to go after [a] particular target with a specific asset in mind,” Costello said. Along that same vein, Julian Zottl, a senior cyber architect at Raytheon, said he's noticing more inclusion of all-source intelligence in threat analysis. “We're looking at ... all the sources and trying to figure out indicators,” Zottl said Aug. 7. “[We're] even trying to do predictive analytics now, where it's like, ‘Oh, we see this threat might be coming.' I think that's something that we're starting to talk about more and more.” Several cybersecurity professionals interviewed by Fifth Domain said the U.S. government is moving away from the classic cyber kill chain and over to the MITRE ATT&CK framework, which dives deeper into potential threats to information security. “They used to think the hackers would just come in to steal secrets, conduct espionage and then leave,” said Tom Kellermann, chief cybersecurity officer at Carbon Black and a former commissioner on the Commission on Cyber Security for then-President Barack Obama. “In fact, they're maintaining persistence in these systems. They're manipulating the integrity of data and then they're using federal government agencies themselves and personnel's devices themselves to target anyone who implicitly trusts that person, that agency, that department.” he told Fifth Domain on Aug. 6. Chris Kennedy, chief information security officer at AttackIQ and a former official with the Treasury Department and the Marine Corps, said these new frameworks in use along with federal continuous monitoring programs allow for more attacker emulation, essentially simulating the attack agencies could face. “Agencies are starting to realize the value of attacker emulation as a way to measure and benchmark the effectiveness of their security controls,” Kennedy said on Aug. 7. And with government agencies in different stages of cloud migration, agencies will need to learn how that fits into their cybersecurity posture. Marten Mickos, CEO of white hat hacking company HackerOne, said this a new discussion. He also said the conversation surrounding the use of ethical hackers in government environments has evolved: The word “hacker” is becoming more accepted. “I do think it signals a shift in mindset," Michos said. There's a realization that "those people who portray themselves as hackers are actually those who will rescue us, not those who will destroy us.” Despite all the changing technology and evolving threats, one aspect of cybersecurity remains set in stone, said M. K. Palmore, a field chief security officer for the Americas at Palo Alto Networks and a recently retired FBI cyber agent. “It's about adhering to cybersecurity fundamentals,” Palmore said. “That message hasn't changed regardless of my position or where I'm located.” https://www.fifthdomain.com/show-reporters/black-hat/2019/08/30/whats-changing-in-the-cyber-domain-we-ask-industry-experts

All news