< PreviousFEATURE | TRIBALNETONLINE.COM| tribalnetonline.com20TRIBAL PARTNER CLIENTS INCLUDEMEET YOUR VENDORS | ATRIENTAtrient, at its core, is a technology company. We’ve enabled a marketing platform that allows operators to effectively create and execute rewards & incentives based on real-time player value. Atrient’s team includes, both, software engineers and gaming operators who create a bridge to develop the most robust solutions for our operators.The majority of Atrient’s client base are tribal organizations from coast to coast. Atrient supports the tribal enterprises in numerous ways, including membership to all gaming associations, including NIGA, OIGA, and WIGA. We further support the associations by donating our technology services. Atrient team members can often be seen at tribal charity events supporting those causes that are important to our tribal partners.Gaming operators are recognizing the importance of leveraging technology across their enterprise. They seek solutions that create operational efficiencies, differentiate their property, and drive revenue; they are relying on information technology that improves their overall operating performance. Atrient helps our Gaming clients develop a solid technology-driven road map to accomplish these goals.HOW LOYALTY IS REWARDED.MELANIE AGORRILLA Marketing Administrator | magorrilla@atrient.comatrient.comAtrient is proud to be a supporter of TribalNet 2017 and will be showcasing both of our promotional and enrollment devices at the conference.meet Atrient The PowerKiosk is like a Ferrari; it is fast, sexy and provides differentiating patron experiences, something we are committed to providing here at Casino Del Sol. Vendors like to throw out the word partnership, but for us with Atrient, the relationship really has been a true partnership. When we have a request for them, Atrient always considers it from the perspective of “Will this be beneficial to our other customers?” If so, they often build the capability for us free of charge. It has worked out very well for both ends and we have received a product that is far superior to our incumbent and initially selected vendor. They are making an investment in us as much as we are making an investment in them.Ryan Frohberg, Casino Del Sol Executive Director of MarketingPRODUCTS & SERVICESAtrient’s marketing platform reduces overhead and generates incremental revenue to our tribal partners by automating core operational requirements throughout the gaming enterprise. Atrient produces Power Kiosks that automate, both, promotional activity and patron enrollment & card reprint for your players club.AKWESASNE MOHAWK CASINOGILA RIVER CASINOS ELK VALLEY CASINO MUCKLESHOOT CASINO FOUR WINDS CASINO SOARING EAGLE CASINO SAGANING EAGLES LANDING CASINOSAN MANUELDESERT DIAMOND CASINOCASINO DEL SOLMYSTIC LAKECHINOOK WINDS CASINO SEVEN FEATHERS CASINO TURNING STONE CASINO _!TNMag_FALL17_FINAL.indd 209/19/17 5:04 PMtribalnetonline.com |21TRIBALNET MAGAZINE | FALL 2017_!TNMag_FALL17_FINAL.indd 219/19/17 5:04 PM| tribalnetonline.comTECHNOLOGY | IT SYSTEMS22Think It’s Time for a System Replacement?Look into the application portfolio of any organization and you will find many different systems that facilitate day-to-day business activities. In gaming and hospitality, a select few of these systems are fundamentally rooted to our business’s core, including casino management/slot accounting, point of sale, property management, ERP, etc. These mission-critical systems keep transactions processing, create data for analysis, help with delivering great customer experiences and ultimately keep your business in operation. Without the right system in place, your business is likely unable to function as efficiently as it could. At some point in your organization’s lifecycle, your leadership team (or possibly a team of your predecessors) selected the handful of core systems that you use today. These systems were likely the latest and greatest of their times and household names in the industry. Many of these systems were installed during the opening of your facility, while others came along later and may have even replaced originally installed systems as your business operations evolved.Ultimately, your organization should strive to align and leverage these systems with your business needs and ensure that you are squeezing every ounce of value from them that you can. Any disruption to these systems usually creates major challenges, including loss of productivity, loss of revenue and customer dissatisfaction, to name a few. So why should an organization ever consider replacing a core system?The System Capacity is OutgrownIn an organization’s lifespan, business operations go through many stages of maturity. In Tribal Gaming, many Tribes started with a very small casino or bingo hall whose transactional capacity needs may not have been very demanding, which means that the systems they selected to support them were likely scaled to support smaller transactional capacity. Over time, organizations evolve, become more sophisticated, increase market share and maximize revenues. While growth and maturity takes place, the capacity demands of systems grow as well, sometimes to the point where the system cannot keep up with the business.The System No Longer Aligns with Business ObjectivesWhile an organization’s needs and demands for higher capacity can grow, business processes can become more complex as well. A system should not limit your ability to be agile, innovate and be competitive in the marketplace. Once a system cannot support your business objectives or operational initiatives, it is likely time to assess your options. Key subject matter experts and executive leadership will become disappointed that their ideas and initiatives cannot be implemented due to system limitations. The System is Technologically ObsoleteIt’s the old analogy of “driving your vehicle until the wheels fall off” or “don’t fix what’s not broken.” Some organizations may not have alignment or capacity issues and may be content with their systems “as is.” Maybe the budget does not exist to allow for a system change. Unfortunately, over time vendors must end of life (EOL) or end of support (EOS) their products and product versions. When this happens, it can create some big risks for your organization. Updates and patches for your system will no longer be available, the Microsoft OS that your system works on will likely have been EOL as well, which means that the system is also vulnerable to security risks. Should you run into any problems, there is no guarantee that your vendor will support you. New Leadership, New Values, New System? It happens: executive leadership and key decision makers come and go. I remember a job in which my boss changed six times in a few years. When changes like this occur, it can be disrupting to the business (especially without proper succession planning) and tough to keep business strategies alive. Along with new leadership comes new ideas, new perspective and sometimes some new system preferences. Have you ever heard “Well, (insert vendor name here) worked for me at my last property, so it should work here too”? BYJOE ROYBALCHIEF INFORMATION OFFICER,OSAGE CASINOSJoe Roybal joined Osage Casinos in 2014 as Chief Information Officer, bringing with him over 20 years of experience in the fields of IT and MIS, over 19 of which have been dedicated to tribal gaming. Prior to working for Osage Casinos, Joe worked in management and executive roles at Sandia Resort & Casino and Isleta Resort & Casino, both in Albuquerque, NM.ABOUT THE AUTHORHERE ARE A FEW THINGS TO CONSIDERupgrade?_!TNMag_FALL17_FINAL.indd 229/19/17 5:04 PMtribalnetonline.com | 23Even within the same industry, businesses can be fundamentally different. Although the system you previously used worked great for your organization, it may not be a home run at your current place of employment. A Few More Considerations Before The Infamous Rip & ReplaceSo, your organization is coming to the conclusion that it may be time to seek a replacement system. Replacing a core system can be a very expensive endeavor as well as highly disruptive to your business. Capacity and obsolescence can be clear indicators that it may be time to evaluate other systems, but change of business direction or a misaligned system requires some additional diligence before you head down the path of replacement. Here are a few more questions to consider: WILL THE POTENTIAL BENEFITS TO YOUR ORGANIZATION OUTWEIGH THE COST TO REPLACE? This can be very challenging to quantify as there are both tangible and intangible cost benefits to calculate, including efficiencies gained through system automation, customer service improvements, adherence to industry or compliance requirements (i.e. EMV) and potential new revenues gained through marketing or operational enhancements. Your business should identify each area where the current system is deficient and put a dollar amount to it. You also want to quantify how a new system’s features could enhance your organization. You will likely want to model this out for three-to-five years to make sure that the math supports your decision. If you are going to invest a few million dollars in a new CMS, you probably want to have some clear cost benefits. HAVE YOU EXHAUSTED YOUR SYSTEM PROVIDER’S SUPPORT RESOURCES? If your organization is struggling to align your system with business goals and objectives, your vendor should be aware and engaged. A successful system requires equal participation and effort from both the vendor and the customer. There are regular maintenance and support channels to rely on for day-to-day issues and support, but if your organization’s system is seriously misaligned, you may want to consider requesting a system optimization from your vendor. These are typically small engagements (usually a cost associated) that can reap large rewards, including helping confirm that your system can meet your needs (or not) and helping you identify system capabilities that you may not be aware of. It is very easy to romanticize about how a system worked for you before, but a system’s success is dependent on how engaged the organization is with the system, the maturity level of the business and the resources it has to support it. 877-369-6208 | Sales@Agilysys.comIt’s time for a POS solution that can give you real insight behind the orders you takeIt’s time to expect more out of your POS than just simple ordering. Access to business intelligence on POS orders and performance can help improve guest service and increase guest spending. Agilysys award winning InfoGenesis® POS solution includes enhanced business analytics powered by rGuest® Analyze, allowing you to get a better understanding of your guests’ preferences.UNDERSTAND GUEST PREFERENCESWWW.AGILYSYS.COMINCREASE REVENUE AT EVERY VENUETRIBALNET MAGAZINE | FALL 2017_!TNMag_FALL17_FINAL.indd 239/19/17 5:04 PMFEATURE | TRIBALNETONLINE.COM| tribalnetonline.com24A sound records management program will contribute to the preservation of a tribe’s contemporary cultural and governmental story. Culturally, Native American tribes practice recordkeeping. Images found painted on a tipi or buffalo hide, etched in pottery or stone, or in ancient tales passed down through oral tradition all help preserve ancestral customs.” This is the lead paragraph on the U.S. Department of the Interior’s Office of the Special Trustee for American Indians webpage detailing its tribal records management support services. This is a simple paragraph that says a lot.With 567 federally recognized Native American tribes across the United States, it can be difficult to ensure that records and information management (RIM) best practices are being consistently utilized across every tribal government. Charged with protecting sovereign data, historical records and information trails associated with litigation and discovery in a variety of physical forms—which includes paper records and backup tapes, in addition to electronic records stored in government data centers—tribes continue to collect a high volume and variety of tribal records. Additionally, tribal nations have the unique challenge of preserving physical artifacts that may not fit the traditional definition of a record but nevertheless serve as an invaluable asset of the tribe’s history. Although some tribal organizations like the Oglala Sioux Tribe have established RIM policies, many still have room to transform into fully modernized organizations.Tribal governments must create comprehensive frameworks for RIM that will allow them to retain complete control over their data throughout the information lifecycle, from collection to application to archive or disposition. In addition to mitigating unneeded records and information risk, this also lifts some of the burden off already-busy end-users. For example, when considering governance, tribes can reduce the risk of records backlog build-up by applying automated retention rules, allowing employees to focus on response to customers by accessing and applying the information for better outcomes. By establishing a proper RIM strategy around protecting, storing, indexing and delivering content to users, tribal governments can ensure the protection and accessibility of the information under their control. This will help tribal governments to create and manage retention schedules that do not depend on email, outdated desktop technologies or heavyweight enterprise applications. Tribal governments should also begin assessing their current classification schemes and taxonomies now to understand if they need to be updated or possibly rebuilt entirely. Although this is often one of the most challenging steps in starting up a comprehensive RIM framework, defining a classification scheme, or taxonomy, is one of the most vital steps. Mapping out the various information assets and defining metatagging structures are challenging, but combining the assets of multiple entities across a tribal government—or between tribal nations —raises that challenge even further. Neglecting to do so, however, means tribes will be unable to realize benefits like enhanced searchability, automation and metadata tagging. Further, if currently implemented classification schemes lag too far behind the modernization curve, they will also seriously hamper tribal governments’ ability to realize these meaningful returns. For these reasons, this assessment is one of the most important steps, but also one of the most difficult to get right.Setting the Record Straight: Considerations for Tribal Records and Information ManagementBYAPRIL CHENSENIOR PRODUCT MANAGER, IRON MOUNTAIN GOVERNMENT SERVICESApril Chen is Senior Product Manager for Iron Mountain Government Services, responsible for federal content management and document conversion solutions, including management of Iron Mountain’s Federal Information Asset Framework. April graduated from the University of California, Berkeley and holds an MBA from the University of North Carolina’s Kenan-Flagler Business School.ABOUT THE AUTHORTECHNOLOGY | TRIBAL RECORDS & INFORMATION MANAGEMENT‘‘_!TNMag_FALL17_FINAL.indd 249/19/17 5:04 PMtribalnetonline.com | 25 Once tribal governments are confident in their classification schemes, they can ease their workload by automating several aspects of their records programs. Automation should play a major role in how tribal governments approach their information governance in the near TRUSTED GUARDIANS OF INFORMATION…WE SPECIALIZE IN PROTECTING WHAT MATTERS MOSTLEARN MORE AT IRONMOUNTAIN.COM/FEDERAL© 2017 Iron Mountain Incorporated. All rights reserved. ABOUT IRON MOUNTAINWe understand the importance of protecting sovereign data, historical records and information trails to preserve tribal culture and heritage. As the world’s largest provider and industry leader in records storage and information management, we’ve been a trusted partner for over 60 years. We offer a portfolio of solutions to protect every record and piece of information, physical or digital, and provide lasting value to tribal governments and the members they serve.future. They need to examine how they can best utilize this technology to ensure that their information inventory is continuously kept up-to-date through automated governance and retention policies. By accounting for where information resides; what format the information takes; how information is stored, backed up, disposed of or preserved, tribal governments will lower their overall risk of under utilizing, losing or compromising records and information under their control. It is vitally important that tribal governments implement RIM best practices. This includes modernizing their supporting technology, leveraging effective storage and leasing options, implementing automated backup and governance, and establishing or updating information governance frameworks. In the end, these practices will result in a controlled and secure system for managing every record and piece of information, no matter if it’s in a physical or digital format, and will provide lasting value to tribal governments and the members they serve.TRIBALNET MAGAZINE | FALL 2017_!TNMag_FALL17_FINAL.indd 259/19/17 5:04 PMFEATURE | TRIBALNETONLINE.COM| tribalnetonline.com26FEATURE | COMPUTER TECHNOLOGY AND THE WORLDHPE Micro Datacenter is a self-contained, modular, software-defined data center optimized to provide the cloud-enabled, hybrid IT environment of the future. It incorporates compute, network, storage, and control automation. It has all the protection you need a data center to have. And it’s on wheels. It’s a complete—though tiny—enterprise IT data center that enables the flexibility to deploy computing where and when you need it while maintaining the efficiency, security, and control of your corporate data centers.For more information visit www.hpe.com or email david.winn@hpe.comThe HPE Micro Datacenter’s utility is as diverse as the technology needs of our Native American customers. It can be utilized in a hub and spoke framework to capture demands at the edge, or as a temporary solution or permanent installation in remote, hazardous, or insecure environments where a dedicated computer room is impractical or cost prohibitive. You can also deploy within existing data centers to facilitate IT projects, DevOps, and other ring-fenced applications such as Gaming IT with specific data security requirements. The only limitation in the utility of the HPE Micro Datacenter is the imagination in which it is applied.Hewlett Packard has been in the innovation business for more than 75 years. Our vast intellectual property portfolio and global research and development capabilities are part of an innovation roadmap designed to help organizations of all sizes—from global enterprises to local startups—transition from traditional technology platforms to the IT systems of the future.HPE Micro Datacenter Modular data centers for the new idea economyproduct spotlight_!TNMag_FALL17_FINAL.indd 269/19/17 5:04 PMtribalnetonline.com |27TRIBALNET MAGAZINE | FALL 2017TRIBALNET MAGAZINE FALL 2017 | ACCELERATING WIRELESS DEPLOYMENT NOTICE OF PROPOSED RULEMAKING AND NOTICE OF INQUIRY (NPRM)In his June 2, 2017, blogpost “Heading Together Toward the Future,” FCC Chairman Ajit Pai noted his personal commitment to an exchange of perspectives between Tribes and the FCC on the full range of issues associated with the deployment of wireless broadband infrastructure, particularly in the context of the Accelerating Wireless Broadband Deployment by Removing Barriers to Infrastructure Investment NPRM, adopted on April 20, 2017. The NPRM examines the FCC rules and procedures for complying with the National Historic Preservation Act and National Environmental Policy Act. The FCC seeks input on the historic preservation and environmental review processes as currently structured and asks what changes could be made to minimize costs and delays. (See: https://go.usa.gov/xRdXk)The FCC hosted several regional Tribal consultation sessions focusing on the NPRM this summer in South Dakota, Oregon, Oklahoma and Arizona, as well as a session at FCC headquarters in Washington, D.C. The FCC remains interested in receiving Tribal input on this proceeding. Although the formal comment period has ended, the FCC’s rules provide for “ex parte” presentations, which may permit the submission of information discussed or developed during consultation. All written submissions into the public record, including ex partes, must be filed through the FCC’s Electronic Comment Filing System. ONAP is available to provide assistance in ensuring that your submission is properly filed. Please contact Carolyn Conyers at carolyn.conyers@fcc.gov CONNECT AMERICA FUND PHASE II AUCTION On August 3, 2017, the Commission adopted a Public Notice seeking comment on the proposed auction application and bidding procedures, including how interested parties can qualify to participate. This action was the FCC’s next step towards the planned 2018 auction that will provide nearly $2 billion over 10 years towards rural broadband expansion. (See: https://go.usa.gov/xRdXX) MOBILE FUND PHASE II On August 3, 2017, the Commission established the challenge process to ensure that Mobile Fund Phase II support is provided to primarily rural areas that lack unsubsidized 4G LTE service. This process will allow the Commission to resolve eligible area disputes quickly using coverage data, in conjunction with subsidy data. (See: https://go.usa.gov/xRdX5) BROADBAND DEPLOYMENT ADVISORY COMMITTEE (BDAC) The BDAC’s mission is to make recommendations for the Commission on how to accelerate the deployment of high-speed internet access, or “broadband,” by reducing and/or removing regulatory barriers to infrastructure investment. This Committee has a Tribal member and Tribal representation on its working groups. (See: https://www.fcc.gov/broadband-deployment-advisory-committee)Broadband InfrastructureAGENCY UPDATE: FCCThe Office of Native Affairs and Policy (ONAP) of the Federal Communications Commission (FCC) serves as a one-stop resource for Tribal Nations regarding communications issues. ONAP is the official Commission liaison for consultation coordination and outreach to American Indian Tribes, Alaska Native Villages, Native Hawaiian governmental organizations and other Native and Tribal entities. ONAP’s home page is www.fcc.gov/native and the Office can be reached at native@fcc.gov.AGENCY UPDATE | FEDERAL COMMUNICATIONS COMMISSIONTHE FCC’S OFFICE OF NATIVE AFFAIRS & POLICYLYLE ISHIDA Acting Chief202-418-8240 lyle.ishida@fcc.gov SAYURI RAJAPAKSE Senior Legal Advisor202-418-2579 sayuri.rajapakse@fcc.gov JANET SIEVERT Legal Advisor202-418-1362 janet.sievert@fcc.gov DANIEL MARGOLIS Legal Advisor202-418-1377 daniel.margolis@fcc.gov CAROLYN CONYERS Policy Advisor202-418-2002 carolyn.conyers@fcc.govconnectionsFEDERAL COMMUNICATIONS COMMISSION (FCC) | AGENCY UPDATE_!TNMag_FALL17_FINAL.indd 279/19/17 5:04 PMFEATURE | TRIBALNETONLINE.COM| tribalnetonline.com28SECURITY | CYBER THREATSCurtis Keliiaa, Washoe Tribal Citizen, Cherokee, and Native Hawaiian. Curtis is a senior network engineer and principal investigator for the Tribal Cyber Infrastructure Assurance initiative with Sandia National Laboratories, a CISSP, IPv6 Forum Gold CertifiedIPv6 Engineer and a professional member of AISES.CYBERSECURITY There are three tenets of cybersecurity: confidentiality, integrity and availability. These principles are used to secure the systems and networks that deliver information for use and ensure that information is available to authorized users. Guarding against cyber threat is further complicated by networked “smart” devices. Consider, for example, energy systems. This type of operational technology has a different order of priority: availability first, then integrity and confidentiality. Cyber defenders must now provide overall information and operational technology system security in an expanding cyber ecosystem. AN EXPANDING CYBER ECOSYSTEMAt the same time that information and operational infrastructures are in transition because of their dependence on old and new technologies, information and operational technologies are converging into a new, much larger cyber ecosystem. But just upgrading to the latest technology does not mitigate all of the risk: security must be a design requirement as development occurs. Upgrading to newer information technology and divesting old technology will reduce cyber-threat exposure. CYBER COMPLEXITY, RISK AND COSTMany organizations continue to rely on older internet connectivity, even though the American Registry for Internet Numbers (ARIN) exhausted the free-pool of IPv4 addresses on September 24, 2015. Its successor, IPv6, has been available since 1998, but adoption has been slow because of the added complexity, risk, and costs incurred when organizations transition to newer, less familiar technology. Complexity, risk and cost can be reduced when the newer technologies are well understood and BYCURTIS KELIIAACOMP SYS SECURITY ANALYSIS R&D, SANDIA NATIONAL LABORATORIESwidely available, as indicated by the World IPv6 Launch Measurements website. The requirements include: a new technology professionally qualified cyber workforce; reducing threat exposure and complexity by moving away from old technologies to new technologies; and securing technology deployment with security as design requirement from the start. LEAP AHEAD OF LEGACY TECHNOLOGYNewer technologies allow areas of underserved or unserved internet access a leap-ahead advantage without being burdened with the investment of outdated technology. One advantage of new technology is that security can be designed-in to strengthen protection. Risk can then be reduced by removing legacy dependence and moving to “baked-in” protection. CYBER CRITICAL INFRASTRUCTURE MODERNIZATION Critical infrastructure sector modernization is changing the worldwide cyber-scape. See, for example, modernization across the critical infrastructure sectors, as defined by the Department of Homeland Security at www.dhs.gov/critical-infrastructure-sectors. Updating cyber critical infrastructure presents opportunities to advance tribal governance, safety, security, economic prosperity and cultural preservation. These advances can only be realized with a qualified workforce trained to implement cybersecurity as a requirement with consistency for government, department, community and enterprise multi-domain operations. A PROFESSIONALLY QUALIFIED WORKFORCEThe first line of cyber defense is the general workforce, including all those with physical and cyber access. Every organization should a cyber workforceCall-to-Action A PROFESSIONALLY QUALIFIED CYBER WORKFORCE IS REQUIRED TO SEIZE OPPORTUNITIES IN ADVANCED INFRASTRUCTURE SERVICES AND DELIVER SUFFICIENT PROTECTION IN AN EXPANDING CYBER ECOSYSTEM.ABOUT THE AUTHOR_!TNMag_FALL17_FINAL.indd 289/19/17 5:04 PMtribalnetonline.com |29TRIBALNET MAGAZINE | FALL 2017Roadblocks delaying your telecom project?We can help!FINANCIAL MODELING • FUNDING ENGINEERING • DESIGN VENDOR SELECTION • CREDENTIALINGSERVICE DELIVERY • TECHNICAL SUPPORTCONTACT US TODAY844-558-2472 | info@nativenetwork.comwww.nativenetwork.comCONNECT | EMPOWER | PROSPERestablish a cybersecurity training, education and awareness program. Everyone should be aware of why policies and procedures are important, how to avoid trouble and how to recognize and report unusual content or activity. Many partners are needed to help develop and sustain a professionally qualified workforce. Training is an ongoing requirement where involvement with organizations, such as TribalNet, the Native American Telecommunication Association, the North American IPv6 Task Force and the Rocky Mountain IPv6 Task Force, provide venues to inform technical decision makers. Cybersecurity certifications play a pivotal role in the technology workforce call-to-action, as well as within professional organizations such as the American Indian Science and Engineering Society (AISES), tribal colleges and universities and higher educational institutions. The International Information Systems Security Certification Consortium (ISC) offers certifications relevant across the industry, including IT security; cloud security; authorization; secure software; and healthcare. ISC certifications offer the advantage of flexibility in respect to how individuals will meet continuous training requirements. The SysAdmin, Audit, Network, Security Institute (SANS) offers a variety of information security training and certifications. Subjects include cyber defense; detection and monitoring; penetration testing; incident response; digital forensics; ethical hacking; management, audit, legal; secure software lifecycle development; and a cybersecurity master’s degree program. Professional support opportunities exist as well. American Indian and Native Hawaiian ISC chapters may be created, in alignment with ISC chapters, which are established worldwide. Similarly, forums could be developed in alignment with the IPv6 Forum, which encompasses IPv6 development and adoption worldwide.RETURN ON INVESTMENT IN NEW TECHNOLOGIESThe new cyber ecosystem offers a favorable return on investment as vast as the new cyber ecosystem itself. Technology procurement since 2010 includes IPv6 in all modern operating systems and networks. Therefore, training is a short-term investment with long-term gain. There must be an executive champion who will promote the development of and need for this workforce skill and a concerted effort across multi-domain operations and educational institutions to develop a workforce with the skills relevant to the needs of the future. A CALL TO ACTIONI’m reminded of the leadership exemplified by a group of Cherokees who brought the first phone west of Saint Louis into Tahlequah, Oklahoma, in September of 1885. I am honored that my great, great grandfather R. M. Wolfe is named on the monument that commemorates this event. The work we do today builds on the work they did then and is to the advantage of future generations. Our collective strength is solving the hardest problems. This is a call-to-action for a new cyber workforce to achieve a culturally-aware, technically-empowered future for generations to come.Sources provided upon request. The views expressed herein are my own and not necessarily those of my employer. TRIBALNET MAGAZINE | FALL 2017_!TNMag_FALL17_FINAL.indd 299/19/17 5:04 PMNext >