SIGNAL Event Coverage
Real-time coverage from the Cyber Symposium, including blog posts, the Online Show Daily, related coverage, news and photos, all in one place. SIGNAL provides highlights and breaking news from speakers and panelists as they discuss the development of robust cyberspace capabilities and partnerships. Bookmark this link and check back frequently for new content.
Online Show Daily
No single solution, no single course of action, no single training regimen exists for combating cybermarauders on the Internet. Cyber officials are striving to establish guidelines for cybersecurity, yet they acknowledge that every organization in every nation has varying needs and must pursue different tracks to achieve what they determine is effective cybersecurity.
Government and the private sector must determine ways of cooperating in the fight to defeat cyberthreats, or else both will face potentially catastrophic consequences.
The Latest Event Coverage
The growing call for an independent U.S. cyber service along the lines of the Army, Navy, Air Force and Marine Corps is not likely to gain followers among policy makers, say a number of service cyber officers.
The acting chief information officer (CIO) for the U.S. Defense Department is promoting a diversity movement for information technology. He wants to see a younger work force that includes people who have come of age in the digital era.
U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the AFCEA Cyber Symposium.
U.S. Defense Department networks will need to operate with the minimum security available as connectivity and the threat picture evolve, said a top defense official. Terry Halvorsen, acting Defense Department chief information officer, minced no words as he described how tight budgets are limiting options across the board.
Related SIGNAL Articles
As if cyber breaches of key federal networks haven’t been problematic enough for experts, hackers increasingly target smaller branch offices that present a weak link in cybersecurity.
Strong legal issues must be addressed before companies take cyber active defense into their own hands.
While serving as the first luncheon keynote speaker at AFCEA’s Defensive Cyber Operations Symposium, Lt. Gen. Ronnie D. Hawkins Jr., USAF, outgoing director of the Defense Information Systems Agency (DISA), compared cyber and traditional weapons.
The password is vanishing. The cumbersome, multicharacter, hard-to-remember bane of Internet usage finally is dying. As biometric and behavioral monitoring technologies evolve, solutions that embrace revolutionary new identity verification systems based on users’ behaviors at the keyboards promise to replace the expiring relic.
A conflict erupting on the Korean Peninsula could lead to any of a number of developments and outcomes, and its effects—including cyber operations—might not be limited to the Koreas and the U.N. forces involved there.
Wireless links now are permeating virtually every electronic device in society, but they bring with them the vulnerabilities and threats that characterize cyberspace today.
Public News Coverage
Tweets about "#AFCEACyber"
Photos from the Cyber Symposium
Adm. Michael Rogers, USN, commander, U.S. Cyber Command, discusses a 3-year plan to build a cyber work force.