Representatives from the military, industry and academia are using a new center at Fort Belvoir known as the Forge to help improve Defensive Cyber Operations.
Upcoming Summits
Representatives from the military, industry and academia are using a new center at Fort Belvoir known as the Forge to help improve Defensive Cyber Operations.
Within the U.S military services, leaders often discuss the close relationship of cyber warfare and electronic warfare. But what’s less clear is the relationship between these two disciplines at U.S. Cyber Command.
That may be changing.
According to recent budget documents as well as industry representatives, Cyber Command is investing tens of millions of dollars in tools that allow operators to take advantage of cyberspace as well as the electromagnetic spectrum.
After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data is properly protected data.
What the hackers took was “the equivalent of the stealth technology for the Air Force,” said Ron Ross, a fellow at the National Institute of Standards and Technology who focuses on computer security.
Bradford Rand, President and CEO of Cyber Summit USA joins the Colorado Business roundtable to talk about the third annual Cyber Security Summit: Denver on April 2nd. We’ll even get some cyber security tips for the average computer user.
Presented at the 2018 DC Metro Cyber Security Summit by David Cass, CISO, IBM.
Top Cloud Questions from Leadership
Are we protected from the latest threats?
Have we protected our most critical data?
Do we have access to the right skill sets?
Are we adapting to changing platforms?
Are we operating at an appropriate maturity level for our industry?
Are we communicating our risks clearly to our leaders and our board?
Are we maximizing the value of our security investments?
Criminal actors offer distributed denial of service (DDoS)-for-hire services in criminal forums and marketplaces. These DDoS-for-hire services, also known as booters or stressers, are leveraged…
In conjunction with National Cyber Security Awareness Month, the FBI is re-iterating the growing concern of cyber criminals targeting unsecure Internet of Things (IoT) devices…
Ransomware is a form of malware that targets both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and systems. Ransomware is frequently…
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments…
In May 2000, the IC3 was established as a center to receive complaints of Internet crime. There have been 4,063,933 complaints reported to the IC3 since its inception…
The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, these attacks…
The Justice Department announced today the guilty pleas in three cybercrime cases. In the District of Alaska, defendants pleaded guilty to creating and operating two botnets, which targeted “Internet of Things”…
Auction fraud involves fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site…
Presented at the Cyber Security Summit Atlanta – February 28, 2018
Although fundamentally intertwined, security teams and the rest of the business often struggle to communicate, especially when the topic is risk. Security teams measure this as technical risk, “how vulnerable are we?” The rest of the organization measures this as a business risk, “what will our losses be and how much will the recovery cost?” Join us to discuss how various scoring mechanisms can be implemented to bridge this gap to articulate risk in a way that all teams understand.
Identity
March 11, 2026
Philadelphia
April 15, 2026


FinSec
April 22, 2026


Salt Lake City
April 23, 2026


Baltimore
April 28, 2026


South Florida
April 30, 2026


Denver
May 5, 2026


Boston
May 6, 2026


Nashville
May 13, 2026


Toronto
May 19, 2026


AppSec
May 27, 2026


Milwaukee
June 2, 2026


Hartford
June 3, 2026


St. Louis
June 9, 2026


Austin
June 11, 2026


Pittsburgh
June 23, 2026


AI for Next-Gen SOC
June 24, 2026


Minneapolis
June 30, 2026


Raleigh
July 15, 2026


DC Metro
July 23, 2026


State of Vulnerability Management
July 29, 2026


Detroit
August 18, 2026


Portland, OR
August 19, 2026


Threat Intelligence
August 26, 2026


Atlanta
September 1, 2026


Silicon Valley
September 1, 2026


Columbus
September 2, 2026


San Diego
September 10, 2026


Chicago
September 15, 2026


Attack Surface Management
September 16, 2026



Philadelphia
September 17, 2026


Identity
September 30, 2026


Scottsdale
October 1, 2026


Seattle/Bellevue
October 1, 2026


Boston
October 8, 2026


FinSec
October 14, 2026


Charlotte
October 20, 2026


Network Security
October 28, 2026


Dallas
October 29, 2026


Los Angeles
November 2, 2026


CSS Mega-Summit
November 4, 2026


Houston
November 12, 2026


New York
November 17, 2026


Government Security
November 18, 2026


Vancouver
November 19, 2026


Jacksonville
December 1, 2026


Cloud Security
December 2, 2026


GRC
December 16, 2026









































































































































































Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |









