Resource Library:
AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.
Filter the library by ...
TechNet Augusta 2018 Solutions Showcase Compendium
Provided By: AFCEA

Aug 2018
As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic activities arena. The association reached out to industry and received more than 40 potential solutions from a range of innovators with technical and thought-provoking approaches to addressing difficult problems. Read how entrepreneurs, pioneers and large companies recommend the Army solve some of their biggest challenges.
Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Provided By: AFCEA

Jan 2018
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...
The Cyber Edge - April 2017
Provided By: AFCEA

Apr 2017
The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M. Gilday, USN, describes the challenges facing the sea service in cyberspace.
- Research into quantum security already is leading to applications in that esoteric area.
- A new commercial approach to cybersecurity effectively renders a network invisible to attackers.
- Cyber warriors must change their tactics on the fly as adversaries continue to innovate.
Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Provided By: AFCEA

Jan 2017
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...
Key Cyber Issues and Recommendations: A Way Forward
Provided By: AFCEA

Jan 2017
Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve with respect to coordinated
cybersecurity readiness and response. The sheer size and number of agencies with their various systems, missions and legal mandates make it difficult to know how major cyber threats should be addressed and cyber events can be mitigated. Decisions on response actions are delayed or rejected due to lack of understanding on the consequences of th ...
Public/Private Information Sharing
Provided By: AFCEA

Oct 2016
This white paper captures some areas of great interest to the cyber community as represented by our sample of interviewees. There is no shortage of practical and achievable process improvement ideas. The overarching theme is that, with the correct and timely level of cooperation between the public and private sector, we can improve our response to cyber attacks and begin to better understand how the adversaries are attempting to position themselves in the ever-changing world of cyberspace.
Recommended Context and Framework for a National Cyber Information Sharing Initiative
Provided By: AFCEA

Oct 2016
There has been increased public dialogue recently regarding the importance, potential benefits and urgency of sharing cyber-related information. The inference from much of the dialogue is
that information sharing is viewed as a primary means to improve the nation's cybersecurity posture. AFCEA's Cyber Committee has been evaluating the topic of information sharing. This paper provides additional recommendations for establishing the
standards and implementation of an effective National Information Sharing Infrastructure.
Recommended Implementation Strategies for a National Cyber Information Sharing Initiative
Provided By: AFCEA

May 2016
The AFCEA Cyber Committee has continued to evaluate the appropriate strategies for improving our nation's approaches to information sharing. In the fall of 2014, the committee developed a set of recommendations and provided them to the White House team evaluating this topic. More recently, the committee provided recommendations regarding the appropriate context and framework for developing a national cyber information sharing infrastructure. This paper addresses recommendations for implementation strategies that should be pursued in implementing the provisions of the ex ...
The Cyber Edge -April 2016 - Sponsored by Fortinet
Provided By: AFCEA

Apr 2016
The Cyber Edge in SIGNAL's April 2016 issue features:
-The new deputy assistant secretary of defense for cyber policy discussing the way ahead for cyber.
-How U.S. forces are pursuing programs to seed the military with young cyber experts.
-Researchers and how they are testing new ways of providing vital cybersecurity for unmanned aerial vehicles.
-The key to meeting emerging cybersecurity challenges with a segmented network environment.
The Cyber Edge -January 2016 - Sponsored by Fortinet
Provided By: AFCEA

Feb 2016
The Cyber Edge in SIGNAL's January 2016 issue gives readers these four stellar articles:
" A U.S. Army cyber leader confronts the ethics of offensive operations in the cyber domain.
" The U.S. Army reassesses how it understands and defines cyber talent.
" One firm's solution to cybersecurity combines tradition with innovation.
" University researchers are taking a new approach to cybersecurity.
Driving Cybersecurity Awareness Home!
Provided By: AFCEA

Dec 2015
In the cyber environment, some realities defy dispute. First, the cybersecurity challenge is pervasive and growing with an ever-evolving range of threats. Second, no one wants to be a victim of cyber crime or a cyber attack, but many people, businesses, and organizations simply do not know how to dissuade cyber intruders.
The Cyber Edge - Sponsored by Fortinet
Provided By: AFCEA

Oct 2015
SIGNAL Magazine introduces "The Cyber Edge". This quarterly publication will immerse readers in the cyber world with cutting-edge cyber news stories that highlight threats and solutions.
The Security Implications of the Internet of Things
Provided By: AFCEA

Mar 2015
The Internet of Things (IoT) comprises creative products that connect healthcare, home energy consumption, mass transit, insurance, and almost every economic sector. With these new devices, we have infinitely more opportunities, yet little consideration is being paid to the cyber security of this phenomenon. Once consumers introduce the IoT into their lives, machine-to-machine interactions begin on their behalf. Assumptions about privacy and protections need to be considered now, before the massive rollout. The implications of the IoT are significant, and nothing short ...
Cybersecurity
Provided By: AFCEA

Jan 2015
Cybersecurity is becoming the defining element of information system success. Where capabilities and services once ruled, safety now is looming as the most important aspect of a network or information storage system. Since its origins as an afterthought, cybersecurity has moved up the ladder to hold
veto power over the use of a new capability.
The Future of Internet Governance - AFCEA Cyber Committee
Provided By: AFCEA

Jan 2014
The central theme of our research was and remains the issue of the existing and future evolution of the much-debated current Internet governance model. The current construct is often described as the ICANN model after the organization that has its roots in the earliest history of the Internet and has indeed evolved to represent global needs. It is easy to find alternative models, along with advocates for each. We present some of them and offer pros/cons for each.
Secure Mobility - AFCEA Cyber Committee
Provided By: AFCEA

May 2013
Mobile technology is a pervasive driver for innovation, agility, and flexibility in the workplace for both the U.S. Government and industry. This report documents the demographic and key findings of an AFCEA Cyber Committee industry survey modified from a survey prepared by the Federal CIO Council.
Looking for the Right Answers in the Clouds - AFCEA Cyber Committee
Provided By: AFCEA

Sep 2012
Everyones talking about Big Data today. Is Big Data a buzz word, real
phenomenon, or next evolution in our world? In this AFCEA white paper,
we surveyed many notable experts to gain perspectives on Big Data. This
paper serves as a primer on Big Data characteristics and provides insights
into technology challenges and solutions. The intent is to help federal
agencies, companies, and communities develop new solutions for consuming, storing, processing, and analyzing Big Data in order to find the right answers needed to accomplish the mission, gain competiti ...
Supply Chain Risk Management Awareness - AFCEA Cyber Committee
Provided By: AFCEA

Aug 2012
Continued globalization marks todays information and communications technology (ICT) marketplace. Mission critical systems and networks extensively leverage commercial, globally interconnected and globally sourced components. These components include hardware, software and firmware and while global sourcing provides innumerable economic and innovative benefits, it also provides our adversaries with increased opportunity to compromise the supply chains of our critical systems.
Security and Cloud Computing - AFCEA Cyber Committee
Provided By: AFCEA

Mar 2012
Security remains the number one obstacle to adoption of cloud computing for businesses and federal agencies. Public cloud solutions are seen as the most vulnerable options from a security perspective, leaving many federal customers to seek private alternatives to overcome security challenges. Regardless of the deployment model selected--private, public, community, or hybridconquering security concerns is required for cloud computing to achieve its full potential as the next generation of IT architecture. Recent trends in cloud computing demonstrate the architecture has ...