June 25 - 27, 2018
Washington D.C

Media Center

Additional Content Download

Articles

The 15 Strategies For Combating & Detecting APTs

Advanced Persistent Threats (APTs) are some of the most dangerous and demanding challenges to computer security. They’ve been known to steal valuable company intellectual capital and even government secrets. So, it’s important to know if you’ve been targeted by one, and how to contain and combat the threat. Below Raed Albuliwi, Vice... Read More

DoD Looks to Private Sector for Cyber Security Partnerships

With every passing week, the necessity and vulnerability -- of cyberspace becomes more apparent. While recent technology advances developed in Silicon Valley and elsewhere have made many things in modern life “easier, cheaper and safer,” Defense Secretary Ashton Carter noted that “it’s become clear that these same advances and technologies... Read More

On the Verge of Explosive Growth: Cyber Pearl Harbour

This document from the DefenceIQ Intelligence and Analysis Unit, discusses which market segment for cyber security is on the verge of explosive growth during 2015-16 under simultaneous pressure from the insurance industry and upcoming government regulation. It highlights one of the critical oversights in the cyber security market, and how big... Read More

Interview

Securing the CIA From Future Attacks

We spoke with Sherrill Nicely, Chief Information Security Officer at the Central Intelligence Agency about the CIA’s Cyber Blue Team (CBT), a group of “white hat hackers,” and what new/emerging threats she sees in the next few years regarding the nation’s state of cyber... Read More

Presentations

Army Network Cyber Security - Enabling Success

Essye B. Miller Director, Cyber security, Army CIO/G-6 Presents on key initiatives for improvements to cyber security and network modernization such as, capacity upgrades, removing legacy infrastructure etc. Also how the army is aligned to the DoD Army... Read More

Logical Leap - How modern cyber attacks threaten our physical safety

Industrial Control System (ICS) vulnerabilities enableour adversaries to launch attacks that leap the logical barriers of cyberspace. This presentation by Waylon Krush, Lunarline Co-founder and Hacker-in-Chief, discusses physical cyber... Read More

State of Cyber Workforce Development

Presentation given by Marie Baker, Senior Engineer at Software Engineering Institute, Carnegie Mellon University. Baker speaks about US cyber preparedness, training initiatives, training and awareness resources and the way ahead for... Read More

Developing New Paradigms for a 21st Century National Cyber Strategy

Cedric Leighton, Col, USAF (Ret.), Founder & President, Cedric Leighton Associates, discusses the evolving cyber threat, USCYBERCOM's evolving roles and missions, future strategies and challenges and opportunities in this past presentation. He also touches on integrating government and business efforts, the changing legal landscape and a look... Read More

Whitepapers

The DoD Cyber Security Strategy

Read the latest official DoD strategy for cyber operations, from its strategic goals to its plans for managing multiple services. The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core... Read More

Leveraging Automation for Advanced Network Troubleshooting

A 10 page paper examining why network troubleshooting is so challenging and exploring opportunities to improve incident response times with a divide and conquer strategy. The paper addresses how automation can be applied to a traditional troubleshooting methodology for isolating the problem, gathering information, and automating the analysis of... Read More

Detecting and Combating Advanced Persistent Threats (APT)

How do you know if your organization is the target of an APT? If it is, how can you properly categorize and contain this threat while maintaining continuity of operations? APTs are the pinnacle of computer threats and preparing for them is just as important as identifying that you have become a target. We’ll go over steps your organization can... Read More

Sponsorship enquiry

Sponsorship Information

Sponsorship Information

Take a look at the speakers, expected attendees and sponsorship and exhibiting opportunities.If you prefer to receive a copy via email contact Dionne.Mariavaz@idga.org or call... Read More