Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...


China, Cyberspace and Hybrid State Power
Provided By: AFCEA   Send Email to POC   View Content   Feb 2021
The rise of China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. The AFCEA Cyber Committee opens the discussion of China's hybrid approach to the use of power, particularly in cyberspace, as a competitor to the United States. Internal and external governance and to its application on the battlefield are two facets of China's approach.

The Cyber Edge January 2021
Provided By: AFCEA   Send Email to POC   View Content   Feb 2021
When the GAO performs cybersecurity-related audits and reports its findings, the watchdog provides key recommendations to agencies to improve their networks and information technology from risks. The GAO also follows up to see how an agency implemented those recommendations.

Strengthening the Nation's Cybersecurity Strategy, Part Two
Provided By: AFCEA   Send Email to POC   View Content   Jan 2021
The AFCEA Cyber Committee is pleased to present the second in a series of white papers designed to inform an evolving national cybersecurity strategy. While many cybersecurity recommendations focus on federal government activities, including civilian
 and military components, the committee recognizes the vital role that state and local authorities and stakeholders must play to safeguard the nation's civil, critical and business infrastructures. A one-size-fits-all model doesn't exist because local government organizations vary in size and complexity, cyber capability an ...

AFCEA TechNet Augusta Solutions Showcase
Provided By: AFCEA   Send Email to POC   View Content   Jan 2021
AFCEA International is hosting TechNet Augusta in an exciting and diverse format. The conference's series of information-sharing events began with the Army's request for industry capabilities proposals to some of its most difficult problems. Members of the association's Technical Committee reviewed more than 60 potential solutions. This document features these solutions, which have been made available to the Army's leaders, program managers and technologists

Strengthening the Nation's Cybersecurity Strategy
Provided By: AFCEA   Send Email to POC   View Content   Oct 2020
Cybersecurity and its relationship to the national interests have evolved swiftly and will continue to do so. AFCEA International's Cyber Committee offers strategy recommendations as a result of numerous studies and commissions. This is the first in a series that will highlight specific recommendations that merit action now and in the next four years.

The Cyber Edge September 2020
Provided By: AFCEA   Send Email to POC   View Content   Oct 2020
A Cyber Thread Runs Through Government Future Assessments.
The office tasked with keeping Congress abreast of advances sees innovation emerging from several areas.

Effectively Integrating Cybersecurity Into Enterprise Risk Management
Provided By: AFCEA   Send Email to POC   View Content   Sep 2020
Cybersecurity is now a significant area of focus and concern for senior leaders of public and private organizations. Unfortunately, for too many organizations, cybersecurity continues to be a technically focused effort managed by the technical wizards. Instead, board of director discussions often zero in on describing the latest cyber threats, which are often unintelligible to leaders, counts of cyber attacks thwarted and recommendations for cybersecurity investments. Learn how to conduct enterprise risk management processes to benefit your organization to help all staf ...

Provided By: AFCEA   Send Email to POC   View Content   Jul 2020
Any comprehensive National Security Emergency Preparedness (NSEP) capability in the United States has atrophied amid the increase of threats that could cause a catastrophic disaster across the country. Of key interest is whether any of the DHS/FEMA critical infrastructure Information Sharing and Analysis Centers or Information Sharing and Analysis Organizations have been utilized in the dramatic effort to address COVID-19.

The Cyber Edge July 2020
Provided By: AFCEA   Send Email to POC   View Content   Jul 2020
Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three.

Open Source Software and Mission-Critical Applications: A Cautionary Tale
Provided By: AFCEA   Send Email to POC   View Content   May 2020
AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its motivation and some of these risks and drawn an analogy to previous quality control experiences. Members offer suggestions for mitigating the risks when building systems they intend to trust.

Small Business Cybersecurity
Provided By: AFCEA   Send Email to POC   View Content   May 2020
AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The fundamental problem is twofold: increasing technology complexity and competition for training security professionals. Members of the Small Business and Cyber committees suggest best practices, recommendations and information resources for small businesses to address these issues

The Who, What, Why and How of DDoS Attacks: A Guide for IT Pros
Provided By: AFCEA   Send Email to POC   View Content   May 2020
The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years. The December 2019 New Orleans cyberattack is such an example: This attack combined a classic ransomware deployment with a DDoS attack. The DDoS upward trend promises to continue. DDoS attacks date back to the dawn of the public internet, but the force is strong with this one. According to a 2018 report from International Data Group (IDG), the median downtime caused by a DDoS attack is 7 to 12 hours. Using an estimate from Gartner of $5,600 per minute of ...

Summer 2020 Technology Vectors Update by the AFCEA Technology Committee
Provided By: AFCEA   Send Email to POC   View Content   May 2020
An annual presentation on current technology trends provided by the AFCEA International volunteer Technology Committee. Provides insights and expertise in emerging technology topics most relevant to Federal technology leaders.

The Cyber Edge April 2020
Provided By: AFCEA   Send Email to POC   View Content   Apr 2020
Daily cyber attacks and other threats naturally take up the short-term attention of many governmental agencies, but there is a need for a more strategic look at risks to the nation's critical infrastructure.

The U.S. Cybersecurity Industrial Base and National Security
Provided By: AFCEA   Send Email to POC   View Content   Feb 2020
This white paper conveys to U.S. national security policy makers and decision makers observations and recommendations regarding the nation's cybersecurity industrial base and this sector's ability to support and strengthen the national security of the United States.

The Cyber Edge January 2020
Provided By: AFCEA   Send Email to POC   View Content   Jan 2020
FBI Strives to Keep Ahead of Cyber Adversaries.
A rapidly changing threat environment compels increased cooperation.

5G Wireless Opens New Possibilities for Government
Provided By: AFCEA   Send Email to POC   View Content   Jan 2020
5G wireless technology is poised to take the world by storm, offering fast and effective network connectivity at data throughput speeds once reserved for dedicated fiberoptic landlines. This increased speed will also fuel new developments in wireless applications and connected devices to vastly increase the size, depth and interconnectivity of networks of all kinds. In this article, Nokia and Nokia Bell Labs explores the topic of 5G further. By submitting this form, you agree to receive marketing communications from Nokia. Nokia handles your data in accordance to Nokia' ...

The Cyber Edge October 2019
Provided By: AFCEA   Send Email to POC   View Content   Oct 2019
Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate within the Office of the Chief Information Officer/G-6. But new initiatives emphasize cybersecurity in the tactical environment, including networks, weaponry and any other systems used by warfighters.

Cyber Insurance
Provided By: AFCEA   Send Email to POC   View Content   Sep 2019
The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is contingent on individual company circumstances, such as revenue, risk tolerance, board guidance and regulatory environment relative to protected categories of information. In addition, every purchase decision should be critically reviewed regarding the extent of exclusions to coverage in each policy. The subcommittee also concluded that it remains in the indeterminate futur ...

The Cyber Edge July 2019
Provided By: AFCEA   Send Email to POC   View Content   Aug 2019
The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN The U.S. Army is building a tighter relationship with industry to tap commercial expertise and avoid long procurement delays that often render new information technologies obsolete before they are fielded