June 25 - 27, 2012, Crystal City Marriott, Arlington, VA
Register by June 25, 2012 and receive up to $300 off!
Mark Your Calendar for the Cyber Warfare & Security Summit 2012 Event!
Download the Cyber Warfare & Security Summit Brochure
Snap shot of last years’ attendees
Want the latest research and policy on cyber warfare & security efforts worldwide? Access the Resource Library for free downloads.
The Looming Specter of Cyber Warfare: Deprivations and Social Breakdowns
Become a IDGA Member and receive our weekly newsletter!
Learn more about sponsor & exhibit opportunities
Tell a Colleague
IDGA’s Download Center provides regularly updated Presentations, Speaker Interviews and Articles coordinated with the event. All of the resources below are available to you entirely free of charge. You will be asked to complete a short form for the first download, but after that you will have immediate access to all items.
Download the Brochure
Snap shot of last years’ attendees
Latest Content | Electronic Warfare Article Series | Articles | Podcasts
Past Presentations | Videos | Whitepapers | Extras
21st Century Chinese Warfare
The history of Chinese warfare on American networks is rooted in the history of how China views the western world. According to Lt Col Bill Hagestad, Author of ‘21st Century Chinese Warfare’, you “cannot pick up a newspaper or read a blog without hearing about the cyber threats from the People’s Republic of China regarding their use of cyber and information warfare”. The following interview delves into this in detail and examines how the US can prepare for Chinese cyber attacks.
DOD Making Headway On Cybersecurity Testing Challenges
Lessons from simulated cyber attacks conducted late last year are helping the Defense Department better understand how to conduct effective cyber security testing on major weapons and information technology programs, according to a previously unreported Pentagon assessment. Continue reading.
He who defends everywhere defends nowhere” - Brigadier General Stone on Cyber PlanningThere’s no way to have enough resources to be fully prepared at every state and local level for every contingency, so that’s a huge strength of the Incident Command System” says Brigadier General Michael Stone, Assistant Adjutant General, Michigan National Guard. In an IDGA exclusive interview Brig Gen Stone examines the main strengths and weaknesses of the ICS and highlights the ways in which the Michigan National Guard prepares for potential cyber attacks and deals with the issue of surge capacity.Click to read.
Lt Col Bill Hagestad on the Chinese Cyber Threat
Listen up to this IDGA exclusive featuring Lt Col Bill Hagestad, Author of ‘21st Century Chinese Warfare’. The following interview delves into this in detail and examines how the US can prepare for Chinese cyber attacks.
Examining the Incident Command System with Brig Gen Mike Stone, Michigan National GuardThere’s no way to have enough resources to be In an IDGA exclusive interview Brig Gen Stone examines the main strengths and weaknesses of the ICS and highlights the ways in which the Michigan National Guard prepares for potential cyber attacks and deals with the issue of surge capacity. Listen up!.
The Looming Specter of Cyber Warfare: Deprivations and Social Breakdowns Keeping your finger on the pulse of evolving cyber threats is very difficult as they change so frequently and abruptly. In the following interview, IDGA’s @DefenseInsider explores the current and future landscape of cyber warfare with Scott Borg, CEO of the Cyber Consequences Unit. Chris Archer asks how cyber warfare will affect defense in the future and what’s being done to ensure the military and government remain ahead of the evolving threats. Scott Borg also reveals the current aims and priorities within the US Cyber Consequences Unit. Click to download.
Examples of Electronic Warfare CountermeasuresIntroduction: Defeating IR missiles used to be an afterthought placed well behind surviving the radar missile threat. Now with the proliferation of advanced IR missiles, defeating the IR threat is becoming more important and more difficult. The primary countermeasure used to defeat IR missiles is the self-protection flare. This chapter will discuss flare characteristics and employment considerations. One of the main difficulties in defeating an IR missile is knowing that one has been launched.
EW in OperationsIntroduction: The Army is currently expanding its electronic warfare (EW) capability. It maintains several EW systems in its inventory. Currently, all units whose sole purpose is to conduct EW operations are assigned to 1st Information Operations Command. When requested, these capabilities are provided to combatant commands for employment at corps and lower echelons.
Understanding Cryptography in Modern Military CommunicationsInformation is the raw material of the 21st century. The exchange and gathering of information has become a central component of private and economic activities. Information is filed in documents and is transmitted by communication. If confidential information gets into the wrong hands, immense damage could be done.
[ Register Now ]