Resource Library:
AFCEA's trusted Resource Library offers a wide range of white papers, e-books, case studies, executive videos and analytical content. These documents may be relevant to your work and of interest to you as a member of the global cyber, defense, security, intelligence and technology communities. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
For information regarding posting content in the Resource Library, please contact our advertising department by phone (703) 631-6181 or email or your SIGNAL account executive.
Filter the library by ...
Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Provided By: AFCEA

Jan 2018
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...
Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Provided By: AFCEA

Jan 2017
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...
Recommended Context and Framework for a National Cyber Information Sharing Initiative
Provided By: AFCEA

Oct 2016
There has been increased public dialogue recently regarding the importance, potential benefits and urgency of sharing cyber-related information. The inference from much of the dialogue is
that information sharing is viewed as a primary means to improve the nation's cybersecurity posture. AFCEA's Cyber Committee has been evaluating the topic of information sharing. This paper provides additional recommendations for establishing the
standards and implementation of an effective National Information Sharing Infrastructure.
Recommended Implementation Strategies for a National Cyber Information Sharing Initiative
Provided By: AFCEA

May 2016
The AFCEA Cyber Committee has continued to evaluate the appropriate strategies for improving our nation's approaches to information sharing. In the fall of 2014, the committee developed a set of recommendations and provided them to the White House team evaluating this topic. More recently, the committee provided recommendations regarding the appropriate context and framework for developing a national cyber information sharing infrastructure. This paper addresses recommendations for implementation strategies that should be pursued in implementing the provisions of the ex ...
The Future of Internet Governance - AFCEA Cyber Committee
Provided By: AFCEA

Jan 2014
The central theme of our research was and remains the issue of the existing and future evolution of the much-debated current Internet governance model. The current construct is often described as the ICANN model after the organization that has its roots in the earliest history of the Internet and has indeed evolved to represent global needs. It is easy to find alternative models, along with advocates for each. We present some of them and offer pros/cons for each.
Secure Mobility - AFCEA Cyber Committee
Provided By: AFCEA

May 2013
Mobile technology is a pervasive driver for innovation, agility, and flexibility in the workplace for both the U.S. Government and industry. This report documents the demographic and key findings of an AFCEA Cyber Committee industry survey modified from a survey prepared by the Federal CIO Council.
Looking for the Right Answers in the Clouds - AFCEA Cyber Committee
Provided By: AFCEA

Sep 2012
Everyones talking about Big Data today. Is Big Data a buzz word, real
phenomenon, or next evolution in our world? In this AFCEA white paper,
we surveyed many notable experts to gain perspectives on Big Data. This
paper serves as a primer on Big Data characteristics and provides insights
into technology challenges and solutions. The intent is to help federal
agencies, companies, and communities develop new solutions for consuming, storing, processing, and analyzing Big Data in order to find the right answers needed to accomplish the mission, gain competiti ...
Supply Chain Risk Management Awareness - AFCEA Cyber Committee
Provided By: AFCEA

Aug 2012
Continued globalization marks todays information and communications technology (ICT) marketplace. Mission critical systems and networks extensively leverage commercial, globally interconnected and globally sourced components. These components include hardware, software and firmware and while global sourcing provides innumerable economic and innovative benefits, it also provides our adversaries with increased opportunity to compromise the supply chains of our critical systems.
Security and Cloud Computing - AFCEA Cyber Committee
Provided By: AFCEA

Mar 2012
Security remains the number one obstacle to adoption of cloud computing for businesses and federal agencies. Public cloud solutions are seen as the most vulnerable options from a security perspective, leaving many federal customers to seek private alternatives to overcome security challenges. Regardless of the deployment model selected--private, public, community, or hybridconquering security concerns is required for cloud computing to achieve its full potential as the next generation of IT architecture. Recent trends in cloud computing demonstrate the architecture has ...