Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many
Topic: Electronic Warfare (EW)
Michael Woudenberg, Systems Engineer, Operations Research for Lockheed Martin. Michael is the research lead for autonomy, artificial intelligence and machine learning and is working on architecting and designing autonomous systems. Prior to joining Lockheed, Michael served in a variety of increasingly responsible positions at Raytheon in Tucson Arizona.
Industry leaders are warning that the targets U.S. Cyber Command will pursue in the future may not be connected to the internet or even accessible through the traditional, IP-based operations that the command has historically exploited in the past.
David K. Woolrich is a program manager in BAE Systems’ Survivability, Targeting, and Sensing Solutions business area. His background is information security, information assurance, and cyber electronic warfare. He is focused on increasing awareness and survivability of DoD assets from cyber-attacks.
Katie D. Sobolewski is a Technology Development Manager for Cyber Electronic Protection at BAE Systems with experience in cyber defense, cyber electronic warfare, and platform protection. Katie has a background in algorithm development, signal processing, and optimization for increased system performance.
Mr. Giorgio Bertoli works for the US ARMY Intelligence and Information Warfare Directorate (I2WD), Communications-Electronics Research Development and Engineering Center (CERDEC), US Army Research Development and Engineering Command (RDECOM), where he is currently serving as Senior Scientific technology Manager (SSTM) of Offensive Cyber Technologies and