AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.
Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.
Provided By: Endace Apr 2021
As distributed applications and cloud services have become commonplace, the increased complexity in network and application architectures has made it challenging for teams to ensure the reliability, performance, and security of enterprise networks. These complex environments open more attack vectors for exploitation while making it difficult or impossible for security teams to quickly determine what has happened in the event of a security incident. This has led to the need for organizations to capture complete information about network activity and provide it to securit ...
Provided By: Endace Mar 2021
As cybersecurity threats become more sophisticated, organizations need a way to quickly detect and stop an attack or track and analyze its aftereffects for clues. Deep packet analysis, or packet sniffing, is a data processing technique that allows organizations to monitor network traffic for signs of intrusion, block or reroute it if an attack is detected, and most importantly, record data traffic, allowing analysts to conduct detailed investigations into the nature of a cyber incident.
Provided By: SixGen Mar 2021
It appears that once a new data breach makes it to the public, there are conversations that follow wanting to highlight the demand for cyber security professionals. Recent data confirms trends from prior years that the information warfare domain is a risk that every organization needs to account for.
Provided By: Tanium Mar 2021
At its core, Zero Trust is a simple idea - trust no user or device, and always verify. Agencies need to be able to look beyond the users and data on their network and have full visibility into what is happening on their devices. With the flexibility of Tanium's platform and cutting-edge technology, agencies have the foundation necessary to support the evolution of a Zero Trust Architecture. In order to migrate to Zero Trust, Tanium recommends that agencies incorporate three key steps: 1. Identify actors on the enterprise, 2. Identify assets owned by the enterprise and 3 ...
Provided By: Circadence Mar 2021
Cyber security experts estimate that 90% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor.
Provided By: Circadence Mar 2021
As state and local governments shift operations to the cloud, it is more important than ever to stay on the front lines of cyber defense as cyber pros figure out how to secure cloud-based applications being used by employees. Learn why government agencies are adopting cloud computing and what security challenges governments face when shifting to the cloud. You'll learn why cloud-based training is the future of cyber learning for government security professionals and how the cloud shift will impact cybersecurity in the government sector.
Provided By: AFCEA Feb 2021
The rise of China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. The AFCEA Cyber Committee opens the discussion of China's hybrid approach to the use of power, particularly in cyberspace, as a competitor to the United States. Internal and external governance and to its application on the battlefield are two facets of China's approach.
Provided By: ViaSat, Inc. Feb 2021
As the U.S. government migrates to cloud-centric networks, the need to protect them from rapidly evolving cyber threats increases. This shifting environment presents Defense Department planners with security challenges. Securing information across military enterprise domains is a daunting consideration, especially when sensitive and classified data must move between different security layers in the network.
Provided By: AFCEA Feb 2021
When the GAO performs cybersecurity-related audits and reports its findings, the watchdog provides key recommendations to agencies to improve their networks and information technology from risks. The GAO also follows up to see how an agency implemented those recommendations.
Provided By: TrustWave Jan 2021
There is a virulent plague spreading across the globe, Homeland Security Secretary Alejandro Mayorkas warned earlier this year. But he wasn't talking about COVID-19. Instead, he was referring to what he called "an epidemic that is spreading through cyberspace: ransomware."
Provided By: RSA Jan 2021
The COVID-19 pandemic has forced federal agencies and private businesses around the world to adapt to a new reality, one where most of their employees now work remotely and communicate virtually. This "new normal" imposes changes on how organizations protect and manage their networks, making chief information officers (CIOs) and chief information security officers (CISOs) adapt procedures to operate in this new reality.
Provided By: AFCEA Jan 2021
The AFCEA Cyber Committee is pleased to present the second in a series of white papers designed to inform an evolving national cybersecurity strategy. While many cybersecurity recommendations focus on federal government activities, including civilian and military components, the committee recognizes the vital role that state and local authorities and stakeholders must play to safeguard the nation's civil, critical and business infrastructures. A one-size-fits-all model doesn't exist because local government organizations vary in size and complexity, cyber capability an ...
Provided By: Trace Jan 2021
The U.S. Department of Defense is returning to a command-and-control concept embracing joint and allied operations with the added domains of space and cyberspace adding to the mission space. But while this reorientation appears to revisit older Cold War-era strategies on the surface, it is the end result of careful analysis by the Pentagon to make up for operational deficiencies and neglected capabilities from two decades of counterinsurgency-oriented warfare.
Provided By: AFCEA Oct 2020
Cybersecurity and its relationship to the national interests have evolved swiftly and will continue to do so. AFCEA International's Cyber Committee offers strategy recommendations as a result of numerous studies and commissions. This is the first in a series that will highlight specific recommendations that merit action now and in the next four years.
Provided By: AFCEA Oct 2020
A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.
Provided By: AFCEA Sep 2020
Cybersecurity is now a significant area of focus and concern for senior leaders of public and private organizations. Unfortunately, for too many organizations, cybersecurity continues to be a technically focused effort managed by the technical wizards. Instead, board of director discussions often zero in on describing the latest cyber threats, which are often unintelligible to leaders, counts of cyber attacks thwarted and recommendations for cybersecurity investments. Learn how to conduct enterprise risk management processes to benefit your organization to help all staf ...
Provided By: Infor Sep 2020
All defense manufacturers know that it is of utmost priority to protect the defense supply chain from cybersecurity threats. The success of your business now depends on the cybersecurity of your supply chain, based on the recently released Cybersecurity Maturity Model Certification (CMMC) from the U.S. Department of Defense. By the end of 2020, it's expected that defense suppliers without the CMMC certification level required by an RFP will be ineligible to bid on that contract. Watch this on-demand webinar for details on the CMMC timeline, certification levels, and how ...
Provided By: Flexera Aug 2020
Supply chain management is vitally important to running and maintaining an organization's IT systems. When it is carried out, in many federal agencies it's traditionally a manual process managed on spreadsheets. In recent years new directives have mandated that the Department of Defense (DOD) and civilian agencies must all begin monitoring this, especially for cybersecurity considerations within the Department's Risk Management Framework (RMF). In this editorial, Flexera Software explains how many department directors are paying more attention to life-cycle management f ...
Provided By: AFCEA Jul 2020
Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three.
Provided By: PacStar Jun 2020
Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decision makers to gain a clearer picture of what is happening across DoD networks and ultimately, a bird's-eye view of the entire digital ecosystem.
Over the past several years, Defense Information Systems Agency (DISA) and other DoD agencies have focused on converging functions such as cyber SA, defensive cyber operations, and network operations (NetOps) in order to reduc ...