\"
June 26 - 28, 2017
Hilton Crystal City, Washington Reagan National Airport, Arlington, VA

Media Center

Reports

Global Cyber Weapons Technologies Market Forecast to 2026

This new sample report examines, analyzes and predicts the evolution of technologies, markets and outlays (expenditures) for offensive and defensive Cyber Weapons until 2026, starting from 2016. The report also examines each of these markets geographically, focusing on the top 95% of global markets (United States, Europe and Asia).

Exclusive Content

FBI and CIA Viewpoints on Current and Future Cyber Threats

We recently spoke with FBI Section Chief, Trent Teyema, who oversees all aspects of operation readiness for the FBI’s Cyber Division, and most recently served as the Special Agent in Charge of Counterintelligence and Cyber for the Los Angeles Field Office. As well as Sherrill L. Nicely started her tenure as CIA’s Chief Information Security Officer. She is responsible for overseeing the defensive posture of the Agency's cyber security capabilities.

Infographics

The Big Cyber Spend and its Mission Force

This exclusive infographic dives deeper into the Cyber Force Team’s missions and how the DOD has stepped up its cyber security game. It also includes,

  • A breakdown of the FY2017 budget for cyber operations and what it supports
  • The DOD’s three primary cyber missions The five major end-goals for the military Strategies to incorporate new technologies across the cyber spectrum
  • How to develop and integrate new cyber strategies

7 Outlets of FY17 DHS Cyber Funding

This FY17 budget accelerates the Continuous Diagnostics and Mitigation initiative to protect federal networks from cyber-attack. Resources are also allocated internally across all DHS Components that own information technology systems as part of a plan to fix known information technology system vulnerabilities.

Fast Track Your Attendance

Past Attendee List

Take a look at the cyber experts that attended last year's Cyber Security for Defense event. Will you be there this June in Washington D.C. to meet and network with others?

Justify Your Trip

Present your approving manager with this customizable letter detailing the reasons why you should attend the Cyber Security for Defense event, and you'll be sure to receive permission to join us.

Current Attendee Snapshot

Take a look at the current attendees that you will meet at the event! Don't miss out on the chance to hear from and network with other cyber experts within the industry! Request a copy via email at gabbie.dixon@idga.org

Registration Form

Make sure you register for this fantastic event. Simply download this form and send it back to gabbie.dixon@idga.org to fast track your attendance to this industry-leading event!

Fast Track Your Attendance

Here is everything you need to know wrapped into one complete bundle!

Articles

Navy Sends Out An H.O.S. Challenge—Hack Our Ship—To Woo Millennial Tech Talent

Looking to tap cyber talent in the private sector, the U.S. Navy has been holding a series of hackathons. The challenge: Find a way to crack the security systems of military drones and warships. Courtesy of FastCompany.com

WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks announced that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The huge trove of data, called “Vault 7,” exposed the hacking capabilities of the US Intelligence Agency and its internal infrastructure.

Digital Transformation is the first line of Defence

In today’s digital age, governments, businesses and citizens are all seeking to create new opportunities and efficiencies through the use of digital technologies. For defence agencies, the secure, fluid and timely flow of data and intelligence is the life-blood of modern military activity.

Sponsorship Information

Cyber Security for Defense 2016 - Sponsorship Prospectus

Please fill out the form below to view your copy of the Sponsorship Prospectus. Alternatively, feel free to send your request to Dionne.Mariavaz@iqpc.com.

Interview

Securing the CIA From Future Attacks

We spoke with Sherrill Nicely, Chief Information Security Officer at the Central Intelligence Agency about the CIA’s Cyber Blue Team (CBT), a group of “white hat hackers,” and what new/emerging threats she sees in the next few years regarding the nation’s state of cyber security.

Whitepapers

The DoD Cyber Security Strategy

Read the latest official DoD strategy for cyber operations, from its strategic goals to its plans for managing multiple services. The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core American values – of freedom of expression and privacy, creativity, opportunity, and innovation.

Leveraging Automation for Advanced Network Troubleshooting

A 10 page paper examining why network troubleshooting is so challenging and exploring opportunities to improve incident response times with a divide and conquer strategy. The paper addresses how automation can be applied to a traditional troubleshooting methodology for isolating the problem, gathering information, and automating the analysis of critical data. Courtesy of our sponsor NetBrain.

Detecting and Combating Advanced Persistent Threats (APT)

How do you know if your organization is the target of an APT? If it is, how can you properly categorize and contain this threat while maintaining continuity of operations? APTs are the pinnacle of computer threats and preparing for them is just as important as identifying that you have become a target. We’ll go over steps your organization can take to prepare and defend against APTs and provide you with knowledge you need to become a hardened target. Courtesy of our sponsor ANRC.

Articles

DoD Looks to Private Sector for Cyber Security Partnerships

With every passing week, the necessity and vulnerability -- of cyberspace becomes more apparent. While recent technology advances developed in Silicon Valley and elsewhere have made many things in modern life “easier, cheaper and safer,” Defense Secretary Ashton Carter noted that “it’s become clear that these same advances and technologies also present a degree of risk to the businesses, governments, militaries, and individual people who rely on them every day …"

On the Verge of Explosive Growth: Cyber Pearl Harbour

This document from the DefenceIQ Intelligence and Analysis Unit, discusses which market segment for cyber security is on the verge of explosive growth during 2015-16 under simultaneous pressure from the insurance industry and upcoming government regulation. It highlights one of the critical oversights in the cyber security market, and how big cyber practices are missing out on a lucrative opportunity below their competitors’ radar.

The 15 Strategies For Combating & Detecting APTs

Advanced Persistent Threats (APTs) are some of the most dangerous and demanding challenges to computer security. They’ve been known to steal valuable company intellectual capital and even government secrets. So, it’s important to know if you’ve been targeted by one, and how to contain and combat the threat. Below Raed Albuliwi, Vice President of ANRC helps lay out the strategies for helping keep your network safe. ANRC is a sponsor of The 2nd Annual Cyber Security for Defense event, and will also be speaking on the topic of “Network Intrusion.”

Presentations

Army Network Cyber Security - Enabling Success

Essye B. Miller Director, Cyber security, Army CIO/G-6 Presents on key initiatives for improvements to cyber security and network modernization such as, capacity upgrades, removing legacy infrastructure etc. Also how the army is aligned to the DoD Army Strategy.

Logical Leap - How modern cyber attacks threaten our physical safety

Industrial Control System (ICS) vulnerabilities enableour adversaries to launch attacks that leap the logical barriers of cyberspace. This presentation by Waylon Krush, Lunarline Co-founder and Hacker-in-Chief, discusses physical cyber safety.

State of Cyber Workforce Development

Presentation given by Marie Baker, Senior Engineer at Software Engineering Institute, Carnegie Mellon University. Baker speaks about US cyber preparedness, training initiatives, training and awareness resources and the way ahead for training.

Developing New Paradigms for a 21st Century National Cyber Strategy

Cedric Leighton, Col, USAF (Ret.), Founder & President, Cedric Leighton Associates, discusses the evolving cyber threat, USCYBERCOM's evolving roles and missions, future strategies and challenges and opportunities in this past presentation. He also touches on integrating government and business efforts, the changing legal landscape and a look toward a true 21st century cyber strategy.

Sponsorship Information

Sponsorship Information

Take a look at the speakers, expected attendees and sponsorship and exhibiting opportunities.

If you prefer to receive a copy via email contact Dionne.Mariavaz@idga.org or call +1-646-378-6022