Exclusive Content

The Big Cyber Spend and its Mission Force

The Big Cyber Spend and its Mission Force

This exclusive infographic dives deeper into the Cyber Force Team’s missions and how the DOD has stepped up its cyber security game. It also includes,

  • A breakdown of the FY2017 budget for cyber operations and what it supports
  • The DOD’s three primary cyber missions The five major end-goals for the military Strategies to incorporate new technologies across the cyber spectrum
  • How to develop and integrate new cyber strategies
Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Looking to tap cyber talent in the private sector, the U.S. Navy has been holding a series of hackathons. The challenge: Find a way to crack the security systems of military drones and warships. Courtesy of FastCompany.com
Global Cyber Weapons Technologies Market Forecast to 2026

Global Cyber Weapons Technologies Market Forecast to 2026

This new sample report examines, analyzes and predicts the evolution of technologies, markets and outlays (expenditures) for offensive and defensive Cyber Weapons until 2026, starting from 2016. The report also examines each of these markets geographically, focusing on the top 95% of global markets (United States, Europe and Asia).
WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks announced that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The huge trove of data, called “Vault 7,” exposed the hacking capabilities of the US Intelligence Agency and its internal infrastructure.
7 Outlets of FY17 DHS Cyber Funding

7 Outlets of FY17 DHS Cyber Funding

This FY17 budget accelerates the Continuous Diagnostics and Mitigation initiative to protect federal networks from cyber-attack. Resources are also allocated internally across all DHS Components that own information technology systems as part of a plan to fix known information technology system vulnerabilities.
Digital Transformation is the first line of Defence

Digital Transformation is the first line of Defence

In today’s digital age, governments, businesses and citizens are all seeking to create new opportunities and efficiencies through the use of digital technologies. For defence agencies, the secure, fluid and timely flow of data and intelligence is the life-blood of modern military activity.
FBI and CIA Viewpoints on Current and Future Cyber Threats

FBI and CIA Viewpoints on Current and Future Cyber Threats

We recently spoke with FBI Section Chief, Trent Teyema, who oversees all aspects of operation readiness for the FBI’s Cyber Division, and most recently served as the Special Agent in Charge of Counterintelligence and Cyber for the Los Angeles Field Office. As well as Sherrill L. Nicely started her tenure as CIA’s Chief Information Security Officer. She is responsible for overseeing the defensive posture of the Agency's cyber security capabilities.
Cyber Security Agenda - Fast Track Download!

Cyber Security Agenda - Fast Track Download!

Protecting Our Nation Against Faceless Enemies

Join us as we explore the next generation of Cyber Defenses in our Cyber Warfare and Cyber Range Focus Day, followed by two extraordinary days of information packed content on the newest acquisition projections, evolving challenges of cyber and network commands, and more.

Russia's Approach to Cyber Warfare

Russia's Approach to Cyber Warfare

Russia views cyber very differently than its western counterparts, from the way Russian theorists define cyberwarfare to how the Kremlin employs its cyber capabilities. The paper examines the Russian approach to cyber warfare, addressing both its theoretical and its practical underpinnings. 

Michael Connell, one of the two authors who wrote this insightful whitepaper, will be speaking at the upcoming Cyber Security for Defense Summit. Michael Connell is an expert in Persian-Gulf security-related issues, the armed forces of Iran, U.S.-GCC security cooperation, and adversary cyber policy and strategy. He has served as CNA's Field Analyst to Naval Forces Central Command (NAVCENT). Prior to joining CNA, Connell was an intelligence officer in the U.S. Army. Connell has a Ph.D. in History and Middle Eastern Studies from Harvard University and a B.A. in Near East Studies from Brandeis University. He speaks Persian and French.

Post Show Report: Looking Back at Cyber Security for Defense 2017

Post Show Report: Looking Back at Cyber Security for Defense 2017

Want to learn more about what happened in 2017? Check out our Post Show Report that highlights: attendee statistics, top speaking sessions, what to expect in 2018 and more!

Everything you Need to Know About the $583 Million Increase in Cybersecurity Funding for FY2019

Everything you Need to Know About the $583 Million Increase in Cybersecurity Funding for FY2019

We took a look at the top ten departments scheduled to receive the most additional funding for cybersecurity in FY2019. This infographic shares where these departments are looking to spend in 2019, as well as how much their cybersecurity budgets have increased over the last few years. The FY 2019 President’s Budget includes $15 billion of budget authority for cybersecurity-related activities, which is a $583.4 million (4.1 percent) increase above the FY 2018 Estimate. This amount does not represent the entire U.S. cybersecurity budget, as some funding is classified.

Top Recommendations for Defending Against Cyber Threats

Top Recommendations for Defending Against Cyber Threats

We sat down with Dr. Michael Connell and Dr. Lily Chen to discuss protecting sensitive and critical information. Dr. Connell is the Principal Research Scientist for the Center for Naval Analyses and Dr. Chen is currently Project Manager at the National Institute of Standards and Technology. Both share insight into adversary's cyber behavior , what to prioritize when responding to threats, best practices for protecting critical information, using cryptography algorithms for defense and more. Both Dr. Connell and Dr. Chen will be presenting at the upcoming Cyber Security for Defense Summit.