Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

The Truth About Federal Data Center Modernization
Author: Vertiv   Send Email to POC   View Content
From the Federal Data Center Consolidation Initiative nearly a decade ago to last year's IT Modernization Fund, the government continues to prioritize data center modernization. Despite directives from two administrations, agencies are often reluctant to transition away from outdated legacy systems. Progress remains slow and pocketed. This begs the question: why? Download this report to debunk the four perceived obstacles to modernization in the Federal government and to discover how to better make the case for modernization within your organization.

Stop the COTS Madness
Author: Pegasystems   Send Email to POC   View Content
Leaders within the US Department of Defense (DoD) are under pressure to think differently to modernize the force with innovations that will drive efficiency and effectiveness rapidly, while mitigating risk. Pega offers the DoD a uniquely superior solution for transforming legacy systems with the leading agile, secure, unified platform in the industry. Read on to find out how to stop the COTS madness and pursue urgent change at a significant scale now.

The Three Tenets of IT Modernization
Author: Pegasystems   Send Email to POC   View Content
Government organizations are complex. They have deeply rooted and unique cultures, data siloes, and significant legacy systems associated with them. To avoid the mistakes that have doomed past modernization efforts, agencies must consider employing best practices that are more agile and iterative in nature, cloud-based, and model driven. Download this white paper to find practical guidance on approaching legacy modernization.

Signal Cyber Edge July 2019
Author: AFCEA   Send Email to POC   View Content
The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN

The U.S. Army is building a tighter relationship with industry to tap commercial expertise and avoid long procurement delays that often render new information technologies obsolete before they are fielded

TN Augusta Solution Abstracts 2019
Author: AFCEA   Send Email to POC   View Content
As part of TechNet Augusta 2019, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the multidomain operations arena. The association reached out to industry and received nearly 80 potential solutions from a range of innovators with technical and thought-provoking approaches to addressing difficult problems. Read how entrepreneurs, pioneers and large companies recommend the Army solve some of their biggest challenges

Why UEM is the key to enterprise IT security?
Author: Zoho Corporation   Send Email to POC   View Content
Free e-book that aids in improving your enterprise IT security
Most IT admins have asked themselves at some point in time, "How do I achieve and sustain enterprise IT security?"

With cybercriminals sneaking into enterprises using new techniques every day, IT administrators have never been busier. Download your free e-book to understand the challenges in sustaining enterprise IT security, and learn how to overcome these challenges by implementing security-first procedures, securing corporate and personal data, maintaining user privacy, and increasing employee p ...

Cyber Deception: How to Build a Program
Author: Attivo Networks   Send Email to POC   View Content
With traditional cybersecurity, companies play a cat-and-mouse game to identify, block, and prevent threats. A deception program changes this by giving defenders the ability to learn about attackers in the same way attackers try to learn about their targets. Once an organization knows an attacker is in the network, it can observe the attacker's behaviours and patterns. This background helps security teams better understand what attackers are after and the best way to respond.

Beyond the Phish
Author: Proofpoint   Send Email to POC   View Content
In our deepest and most wide-ranging report yet, we explore user knowledge of a broad range of best practices for cyber hygiene, security, and compliance. The report analyzes millions of responses gathered from our Security Education Platform. Our latest Beyond the Phish Report includes: Data from nearly 130 million questions answered by customers end users Users understanding of 14 cybersecurity topics Two new categories: users understanding of unintentional and malicious insider threats and a view of executives cybersecurity knowledge Knowledge comparisons across 16 i ...

State of the Phish
Author: Proofpoint   Send Email to POC   View Content
This cybersecurity report analyses data from tens of millions of simulated phishing attacks sent through Proofpoint's Security Education Platform over a 12-month period, as well as an extensive survey of our global database of infosec professionals. It also includes survey data from thousands of working adults in seven countries, the US, UK, France, Germany, Italy, Australia, and Japan providing cybersecurity insights into end-user security awareness and behavior around phishing, ransomware, and more. Direct feedback from infosec professionals on today's threat landscap ...

SIGNAL Executive Video: Wrapping Software Licensing in a Blanket Purchase Agreement
Author: Thundercat & Symantec   Send Email to POC   View Content
Nothing in the field of information technology is more dynamic than software development. For consumers, individual personal mobile communications devices are constantly upgraded by weekly downloads of new apps. For large organizations such as the military services, vital information systems must be upgraded repeatedly and quickly, lest they enter the world of obsolescence. And, when it comes to security, obsolescence could be the death knell for any national security organization in a time of crisis.
Upgrading security across the breadth of a military service poses ...

SIGNAL Executive Video: Working Toward More Agile Defense Acquisition
Author: Red Hat   Send Email to POC   View Content
The public perception of the defense acquisition process is like that of the weather: Everyone complains about it, but no one does anything about it. That perception is wrong; many people in both government and industry are working to improve the process, and a host of initiatives are geared toward ensuring that innovation is sped to the warfighter and the decision maker as quickly as possible.

But acquisition is driven by laws and regulations, which of course originate from the government. For the Defense Department to truly reap the benefits of innovation, it m ...

Choosing the Best Mobility Management Solution: TCO, Satisfaction, Data Protection and Security
Author: Blackberry   Send Email to POC   View Content
VDC Research conducted a comparative analysis of the mobility management, data protection and security capabilities of BlackBerry's unified endpoint management (UEM) solution and Microsoft's Intune UEM solution. Each was assessed on the level of assurance and utility they provided, their cost effectiveness/total cost of ownership (TCO), and their impact on user experience. This whitepaper will detail the changing nature of end-user computing deployment environments, discuss the need for modern mobility management and collaboration tools that provide secure access to Saa ...

MULTI-DOMAIN SITUATIONAL AWARENESS
Author: Leonardo   Send Email to POC   View Content
TABLE OF CONTENTS 1. Threats evolution in the cyber-space 2. Situational awareness to face multi-domain threats 3. Cyber situational awareness: Leonardo solution 4. AI to improve human performance and decision-making processes 5. Who we are

How Red Hat Satisfied Lockheed Martin's Need for Speed on the F-22
Author: Red Hat   Send Email to POC   View Content
Lockheed Martin's F-22 Raptor is one of the most advanced fighter jets on the planet not to mention one of the fastest. But over the past few years, as other nations began to test-fly and deploy their own fifth-generation fighters, Lockheed Martin realized that its software development practices were holding it back, delivering new capabilities to the Raptor too slowly to maintain its dominance. With Red Hat's agile development practices and automated software production pipeline, Lockheed Martin was able to build and deploy new capabilities for the plane at supersonic ...

Protecting Critical Infrastructure in the DoD Landscape
Author: Owl Cyber Defense   Send Email to POC   View Content
This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of the most recent available guidance to secure critical infrastructure and the various supporting systems within a defense context. It is intended as a best practice primer for the cybersecurity of DoD critical infrastructure, and to provide a basic foundation of accumulated knowledge.

Protecting Critical Infrastructure in the DoD Landscape
Author:   Send Email to POC   View Content
This document includes an overview of critical infrastructure, the associated cybersecurity challenges including a background on industrial control system (ICS) security, and provides a synthesis of the most recent available guidance to secure critical infrastructure and the various supporting systems within a defense context. It is intended as a "best practice" primer for the cybersecurity of DoD critical infrastructure, and to provide a basic foundation of accumulated knowledge.

Deception to Enhance Endpoint Detection and Response
Author: Attivo Networks   Send Email to POC   View Content
Endpoint Detection and Response (EDR) systems have become more popular as the technology has advanced. As a result, organizations have shifted their security focus, and budget, to bolstering internal endpoint defenses and away from defending the perimeter. In this paper, Attivo Networks will delve into how deception technology complements EDR to make an organization's internal defenses more robust, complementing existing technologies and improving overall security.

SIGNAL Executive Video: Seizing the Reins of Long-Term Data Retention
Author: Thundercat & Veritas   Send Email to POC   View Content
From individuals to huge social media firms, everyone is awash in data. Warehousing it is not a problem-we have the cloud for that. For many organizations, the challenge is to be able to access the information they immediately need from the mountains of data that threaten to overwhelm their operations.

And that touches upon another challenge: how much data must be kept to meet government record-keeping regulations? Tossing data helps remove information that no longer is necessary for daily operations, but that data might be needed for legal reasons. So, widesprea ...

Dynamic Deception for Industrial Automation and Control Systems
Author: Attivo Networks   Send Email to POC   View Content
The implementation of a comprehensive cybersecurity plan to protect Industrial Automation and Control Systems (IACS), including SCADA, is critical to protecting confidential company information, complying with applicable laws and maintaining safe and reliable operations. A defense-in-depth approach to cybersecurity reduces risk with each effective layer of protection and combines a mix of defense and offense measures for the maximum protection against a breach. The implementation of a Dynamic Deception solution provides the real-time visibility into threats that have by ...

Signal Cyber Edge April 2019
Author: AFCEA   Send Email to POC   View Content
This edition of The Cyber Edge celebrates and recognizes the contributions of women in cybersecurity and STEM. All of the articles in the section were written by women and feature expert opinions on operating in a time where information o en can be a weapon.