This half-day virtual security conference will bring together security leaders to offer insights from the past year to help guide strategies for the year ahead. It will focus on stories from pentesters, customers, and industry leaders to help you build a robust security strategy. This year's theme is the Cobalt company handbook which emphasizes leading
Topic: Cybersecurity Strategy
Ransomware incidents are on the rise, specifically due to expanding and complex network configurations. Not only are the incidents costly, monetarily and timewise, but also lead to long-term impacts on the nation’s critical infrastructure. The Cybersecurity & Infrastructure Security Agency (CISA) defines critical infrastructure as the physical cyber
Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many
The White House has released a new Executive Order on America's Cybersecurity Workforce. The Executive Order will implement programs that will grow and strengthen our Nation's cybersecurity workforce to meet the challenges of the 21st century.
Dr. Bharat Doshi retired from the US Army Communications-Electronics Research, Development, and Engineering Center (CERDEC), where he was Senior Research Scientist (ST) for Cyber Security. In that role, he developed strategies and techniques for securing current and new generation networks and information systems against all forms of attacks in the cyber
"America’s prosperity and security depend on how we respond to the opportunities and challenges in cyberspace. Critical infrastructure, national defense, and the daily lives of Americans rely on computer-driven and interconnected information technologies. As all facets of American life have become more dependent on a secure cyberspace, new vulnerabilities
GAO has consistently identified shortcomings in the federal government's approach to ensuring the security of federal information systems and cyber critical infrastructure as well as its approach to protecting the privacy of personally identifiable information (PII).
In 2015, we continued to see more major cyber attacks than ever before which in turn put pressure on organizations in every industry to have the right measures in place to protect both themselves and their customers. While most organizations already have some sort of security practices in place, many do not have a complete security strategy for end-to-end
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.