Why It Matters

The U.S. military's ability to defend against and conduct cyber operations is about to get a closed-door review on Capitol Hill. The Senate Armed Services Subcommittee on Cybersecurity has scheduled a classified briefing for May 13 on cyber operations and readiness covering the fourth quarter of fiscal year 2025 and the first quarter of fiscal year 2026. The stakes are concrete: decisions shaped by this briefing will inform the fiscal year 2026 National Defense Authorization Act and determine how billions of dollars in defense spending flow toward cyber forces, training infrastructure, and emerging technologies like post-quantum cryptography and AI-enabled defense systems.

The Policy Landscape

Defense contractors and cybersecurity firms have spent the past year pressing Congress on the same issues the subcommittee is expected to examine: cyber force training and readiness, post-quantum cryptography transitions at the Department of Defense, IoT security requirements, and AI applications for military readiness.

Quantum Research International Inc. spent $280,000 lobbying on cyber security operations tied to the FY26 NDAA and defense appropriations across five consecutive quarters, from the first quarter of 2025 through the first quarter of 2026. OpenPolicy Inc. has been pressing DoD specifically on post-quantum readiness and IoT security requirements in the 2026 NDAA, spending $113,000 across four quarters. Site 525 filed a first-quarter 2026 disclosure targeting authorization and funding for military cyber training environments and synthetic training infrastructure, including FY26 NDAA provisions related to cyber force training and readiness.

Booz Allen Hamilton Inc. has maintained a steady $90,000-per-quarter lobbying presence on cybersecurity issues, including federal cyber workforce development and federal procurement policy. Palo Alto Networks Inc. has been similarly active at $120,000 per quarter, covering AI-enabled cyber defenses, federal government cyber practices, and cyber-related trade policies. Virtualitics Inc. disclosed $100,000 in first-quarter 2026 lobbying on AI for military readiness, targeting the FY27 NDAA.

Who's In The Room

The briefing is chaired by Sen. Mike Rounds (R-S.D.), with Sen. Jacky Rosen (D-Nev.) serving as ranking member. The full subcommittee roster includes senators with long records on defense and intelligence matters: Sen. Roger Wicker (R-Miss.), Sen. Tom Cotton (R-Ark.), Sen. Joni Ernst (R-Iowa), Sen. Eric Schmitt (R-Mo.), Sen. Ted Budd (R-N.C.), Sen. Jack Reed (D-R.I.), Sen. Kirsten Gillibrand (D-N.Y.), Sen. Gary Peters (D-Mich.), and Sen. Elissa Slotkin (D-Mich.).

Booz Allen Hamilton's PAC has contributed $3,500 to Rounds in the past two years, according to FEC records, while also contributing $2,000 to Wicker during the same period. The firm's PAC distributed $48,500 total across 17 members of Congress over the past two years, with $35,500 going to Republican recipients.

The Readiness Question

The briefing's framing suggests lawmakers are conducting a systematic review of operational posture rather than responding to a single incident. The fourth quarter of fiscal year 2025 runs through September 2025, and the first quarter of fiscal year 2026 runs through December 2025, meaning senators will be examining a six-month window of cyber operations activity that predates the current congressional session's major legislative pushes.

That timeline matters for the NDAA process. The Senate Armed Services Committee typically marks up its version of the defense authorization bill in the spring, meaning insights from this closed briefing could directly shape provisions on cyber force structure, training requirements, and technology investment before the bill moves to the floor.

The lobbying record reflects exactly that dynamic. Firms are not just seeking appropriations - they are pressing for specific statutory language. OpenPolicy's disclosures reference IoT security requirements and post-quantum cryptography mandates as NDAA provisions. Site 525's filing targets authorization language for synthetic cyber training infrastructure. These are not general advocacy positions; they are bids for specific legislative text that a subcommittee briefing like this one could help advance or foreclose.

The Hearing

The closed hearing limits public visibility into what the subcommittee will actually hear, but it is standard practice for cyber operations briefings, which frequently involve details about adversary capabilities, U.S. offensive operations, and vulnerability assessments that cannot be disclosed publicly.

Because the briefing is classified, there will be no public witness list, no testimony transcript, and no post-hearing summary released. What will be visible is any legislative action the subcommittee takes in the weeks following.

Access the Legis1 platform for comprehensive political news, data, and insights.