Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


Key Cyber Issues and Recommendations: A Way Forward
Author: AFCEA   Send Email to POC   View Content
Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve with respect to coordinated
cybersecurity readiness and response. The sheer size and number of agencies with their various systems, missions and legal mandates make it difficult to know how major cyber threats should be addressed and cyber events can be mitigated. Decisions on response actions are delayed or rejected due to lack of understanding on the consequences of th ...

Recommended Context and Framework for a National Cyber Information Sharing Initiative
Author: AFCEA   Send Email to POC   View Content
There has been increased public dialogue recently regarding the importance, potential benefits and urgency of sharing cyber-related information. The inference from much of the dialogue is
that information sharing is viewed as a primary means to improve the nation's cybersecurity posture. AFCEA's Cyber Committee has been evaluating the topic of information sharing. This paper provides additional recommendations for establishing the
standards and implementation of an effective National Information Sharing Infrastructure.

Public/Private Information Sharing
Author: AFCEA   Send Email to POC   View Content
This white paper captures some areas of great interest to the cyber community as represented by our sample of interviewees. There is no shortage of practical and achievable process improvement ideas. The overarching theme is that, with the correct and timely level of cooperation between the public and private sector, we can improve our response to cyber attacks and begin to better understand how the adversaries are attempting to position themselves in the ever-changing world of cyberspace.

Results from the AFCEA Industry Brainstorming Session in Support of the Defense Health Agency (DHA)
Author: AFCEA   Send Email to POC   View Content
Representatives from several organizations currently doing or having done business with DHA and with IT expertise came together to discuss DHA current information technology and related issues and brainstorm to generate a list of potential priorities and focus areas for a new incoming CIO. Participants included small, medium and large businesses as well as federally funded research and development centers and consulting firms.

Recommended Implementation Strategies for a National Cyber Information Sharing Initiative
Author: AFCEA   Send Email to POC   View Content
The AFCEA Cyber Committee has continued to evaluate the appropriate strategies for improving our nation's approaches to information sharing. In the fall of 2014, the committee developed a set of recommendations and provided them to the White House team evaluating this topic. More recently, the committee provided recommendations regarding the appropriate context and framework for developing a national cyber information sharing infrastructure. This paper addresses recommendations for implementation strategies that should be pursued in implementing the provisions of the ex ...

The Cyber Edge -April 2016 - Sponsored by Fortinet
Author: AFCEA   Send Email to POC   View Content
The Cyber Edge in SIGNAL's April 2016 issue features:

-The new deputy assistant secretary of defense for cyber policy discussing the way ahead for cyber.

-How U.S. forces are pursuing programs to seed the military with young cyber experts.

-Researchers and how they are testing new ways of providing vital cybersecurity for unmanned aerial vehicles.
-The key to meeting emerging cybersecurity challenges with a segmented network environment.

The Cyber Edge -January 2016 - Sponsored by Fortinet
Author: AFCEA   Send Email to POC   View Content
The Cyber Edge in SIGNAL's January 2016 issue gives readers these four stellar articles:
" A U.S. Army cyber leader confronts the ethics of offensive operations in the cyber domain.
" The U.S. Army reassesses how it understands and defines cyber talent.
" One firm's solution to cybersecurity combines tradition with innovation.
" University researchers are taking a new approach to cybersecurity.

Driving Cybersecurity Awareness Home!
Author: AFCEA   Send Email to POC   View Content
In the cyber environment, some realities defy dispute. First, the cybersecurity challenge is pervasive and growing with an ever-evolving range of threats. Second, no one wants to be a victim of cyber crime or a cyber attack, but many people, businesses, and organizations simply do not know how to dissuade cyber intruders.

The Security Implications of the Internet of Things
Author: AFCEA   Send Email to POC   View Content
The Internet of Things (IoT) comprises creative products that connect healthcare, home energy consumption, mass transit, insurance, and almost every economic sector. With these new devices, we have infinitely more opportunities, yet little consideration is being paid to the cyber security of this phenomenon. Once consumers introduce the IoT into their lives, machine-to-machine interactions begin on their behalf. Assumptions about privacy and protections need to be considered now, before the massive rollout. The implications of the IoT are significant, and nothing short ...

Author: AFCEA, Sponsored by FireEye and Owl Computing Technologies, Inc.   Send Email to POC   View Content
Cybersecurity is becoming the defining element of information system success. Where capabilities and services once ruled, safety now is looming as the most important aspect of a network or information storage system. Since its origins as an afterthought, cybersecurity has moved up the ladder to hold
veto power over the use of a new capability.