"If we are waiting for a 'Cyber 9/11' or 'Cyber Pearl Harbor' we are misunderstanding how our adversaries wage cyber warfare."
Keynote speaker Michael McLaughlin opening up #CS2BOS with a reminder of the goal - keeping sensitive data out of the hands of adversaries to protect the front lines.
#CMMC #DIB #Cyber #ProtectTheDream
Cyber deception is one of my favorite technologies to deploy. The strategy of what an attacker will go after or where to place breadcrums. It’s like phishing the attacker.
The mindset of “assume you will be breached” is how I like operate. Deception technology allows me to detect and alert if something malicious is happening and react in real time.
I suggest checking out this course!
Tomorrow marks a significant milestone as the Foundation for Defense of Democracies (FDD) publishes their much-anticipated paper on the establishment of a separate Cyber Force. This is not just another publication; it’s the culmination of countless discussions, shared insights, and the powerful testimonials of many.
The paper not only explores the necessity but the potential framework of a dedicated Cyber Force, advocating for a strategic overhaul that could redefine our national security posture.
#CyberForce#NationalSecurity#DigitalDefense#FDD#USCYBERCOMLt Col Casey “Waldo” Miller, Rebecca Lively
Cyber Defence is usually seen as mitigating an adversaries actions rather than controlling them, so by default defenders are putting themselves on the back foot.
In the second part of our Tailored Cyber Defence Operations (TCDO) series we've shared some of the details on how we operate and the Cyber Defenders Kill Chain that we use which shifts this dynamic.
https://lnkd.in/euXnRhWK#TCDO#CyberDefendersKillChain