SIGNAL Event Coverage
Real-time coverage from the Cyber Symposium, including blog posts, the Online Show Daily, related coverage, news and photos, all in one place. SIGNAL provides highlights and breaking news from speakers and panelists as they discuss the development of robust cyberspace capabilities and partnerships. Bookmark this link and check back frequently for new content.
Online Show Daily
No single solution, no single course of action, no single training regimen exists for combating cybermarauders on the Internet. Cyber officials are striving to establish guidelines for cybersecurity, yet they acknowledge that every organization in every nation has varying needs and must pursue different tracks to achieve what they determine is effective cybersecurity.
Government and the private sector must determine ways of cooperating in the fight to defeat cyberthreats, or else both will face potentially catastrophic consequences.
The Latest Event Coverage
The growing call for an independent U.S. cyber service along the lines of the Army, Navy, Air Force and Marine Corps is not likely to gain followers among policy makers, say a number of service cyber officers.
The acting chief information officer (CIO) for the U.S. Defense Department is promoting a diversity movement for information technology. He wants to see a younger work force that includes people who have come of age in the digital era.
U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the AFCEA Cyber Symposium.
U.S. Defense Department networks will need to operate with the minimum security available as connectivity and the threat picture evolve, said a top defense official. Terry Halvorsen, acting Defense Department chief information officer, minced no words as he described how tight budgets are limiting options across the board.
Related SIGNAL Articles
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
As if cybersecurity of late has not been tough enough, the emergence of the ubiquitous network consisting of billions of Internet connections and smart gadgets presents an alarming security threat that has failed to draw a concerted effort by experts—both in the government and industry—to address the weaknesses and protect users, experts say.
Recruiting for a qualified military and civilian workforce for the U.S. Defense Department's cybersecurity mission has proven successful so far, but retaining the force remains to be seen, cyber commanders told Congress during a hearing.
You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.
The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.
The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.
Public News Coverage
Tweets about "#AFCEACyber"
Photos from the Cyber Symposium
Adm. Michael Rogers, USN, commander, U.S. Cyber Command, discusses a 3-year plan to build a cyber work force.