Representatives from the military, industry and academia are using a new center at Fort Belvoir known as the Forge to help improve Defensive Cyber Operations.
Upcoming Summits
Representatives from the military, industry and academia are using a new center at Fort Belvoir known as the Forge to help improve Defensive Cyber Operations.
Within the U.S military services, leaders often discuss the close relationship of cyber warfare and electronic warfare. But what’s less clear is the relationship between these two disciplines at U.S. Cyber Command.
That may be changing.
According to recent budget documents as well as industry representatives, Cyber Command is investing tens of millions of dollars in tools that allow operators to take advantage of cyberspace as well as the electromagnetic spectrum.
After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data is properly protected data.
What the hackers took was “the equivalent of the stealth technology for the Air Force,” said Ron Ross, a fellow at the National Institute of Standards and Technology who focuses on computer security.
Bradford Rand, President and CEO of Cyber Summit USA joins the Colorado Business roundtable to talk about the third annual Cyber Security Summit: Denver on April 2nd. We’ll even get some cyber security tips for the average computer user.
Presented at the 2018 DC Metro Cyber Security Summit by David Cass, CISO, IBM.
Top Cloud Questions from Leadership
Are we protected from the latest threats?
Have we protected our most critical data?
Do we have access to the right skill sets?
Are we adapting to changing platforms?
Are we operating at an appropriate maturity level for our industry?
Are we communicating our risks clearly to our leaders and our board?
Are we maximizing the value of our security investments?
Criminal actors offer distributed denial of service (DDoS)-for-hire services in criminal forums and marketplaces. These DDoS-for-hire services, also known as booters or stressers, are leveraged…
In conjunction with National Cyber Security Awareness Month, the FBI is re-iterating the growing concern of cyber criminals targeting unsecure Internet of Things (IoT) devices…
Ransomware is a form of malware that targets both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and systems. Ransomware is frequently…
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments…
In May 2000, the IC3 was established as a center to receive complaints of Internet crime. There have been 4,063,933 complaints reported to the IC3 since its inception…
The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, these attacks…
The Justice Department announced today the guilty pleas in three cybercrime cases. In the District of Alaska, defendants pleaded guilty to creating and operating two botnets, which targeted “Internet of Things”…
Auction fraud involves fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site…
Presented at the Cyber Security Summit Atlanta – February 28, 2018
Although fundamentally intertwined, security teams and the rest of the business often struggle to communicate, especially when the topic is risk. Security teams measure this as technical risk, “how vulnerable are we?” The rest of the organization measures this as a business risk, “what will our losses be and how much will the recovery cost?” Join us to discuss how various scoring mechanisms can be implemented to bridge this gap to articulate risk in a way that all teams understand.
Ransomware
January 28, 2026
Tampa
January 30, 2026
Seattle/Bellevue
February 3, 2026
San Diego
February 5, 2026
Atlanta
February 6, 2026
Silicon Valley
February 11, 2026
New York
February 25, 2026
Healthcare
February 26, 2026
Chicago
March 3, 2026
Dallas
March 5, 2026
Identity
March 11, 2026
FinSec
April 22, 2026
Baltimore
April 28, 2026




















































































Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |








