Can your logistics systems, applications, and services operate in a contested environment? Critical unclassified systems (like numerous logistics systems and the majority of our critical infrastructure) may encounter cyber threats from a cyber-peer of the United States Military - if operating in a hostile environment. Many of these systems were designed in their threat profiles (low -moderate – high) for Confidentiality – Integrity – Availability (CIA) with a security control overlay template of less than CIA High – High – High. Cyber threats from cyber peers are capable, proficient, intelligent, persistent, and co-evolving. The DoD’s Zero Trust (ZT) efforts offer the potential to add ZT capabilities and activities that could significantly enhance our ability to prevent, detect, and contain even advanced cyber threats. How should we explore the potential available in the DoD’s ZT implementation to enable our numerous operational systems to operate even in contested environments? Do you have a plan to handle higher level threats – if your systems/applications/services are operating in contested environment? Or will higher level cyber threats prevent your critical operational capabilities from being available and/or trusted when our warfighters need them the most?