Cyber-Command 101 Planned Words in Notes Format. What is the IO Threat?

Slides:



Advertisements
Similar presentations
The Truth About Electronic Publishing David R Worlock Cambridge, February 2010.
Advertisements

Open Source Intelligence Doctrine
Planned Words in Notes Format
Cyber-Command or IO 21 Planned Words in Notes Format.
Hart District Acceptable Use Policy Acceptable Use Policy.
CYBER CAFÉ VISITOR TRACKING SYSTEM A Comprehensive Portal for Tracking Cyber Café Visitors.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
MS Partner Network 2011: LAR Session SARAH ARNOLD – MPN MARKETING MANAGER.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Navigating Customer Contact Space in the 21st Century Bill Durr Director, Global Field Marketing.
Developing the Mobile Learning Business London, 24 September 2001 Mark Watkinson e-Learning Principal, IBM Region North (c) Copyright IBM Corp m-
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. 21 st Century Learning Video Enabled Teaching and Learning.
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Leading 21st Century Simulation Solutions P rogram E xecutive O ffice S imulation, T raining and I nstrumentation Presented by Mr. John Wrigley Modeling.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Research and Innovation Research and Innovation Introduction 2013 Sprint to Summit (StoS) Barcelona, 16 April 2013 Alan EDWARDS Earth Observation Sector.
Health Informatics Series
C 4 I for the Objective Force 2800 Powder Mill Rd Adelphi, MD Direct Fire Function Infantry Carrier Function Indirect.
IST DEVELOPMENT IN LATVIA
Presented By Michelle Decker Elements Laws Classroom It’s our responsibility.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
U.S. Army Training and Doctrine Command (TRADOC)
J.R. Smith, CEO AVG Technologies. Introduction Privacy and cybersecurity are closely linked issues: to advance the latter it is important to adequately.
Social Networking in Education Presented by Justin R. Clark.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED Program Executive Office GIG Enterprise Services (PEO-GES) 101 Briefing As of October.
TeleManagement Forum The voice of the OSS/BSS industry.
E – Commerce and the Applicable Law Rules Judge Ehab Maher Elsonbaty Judge of South Sinai Court in Egypt and Visiting Scholar in the Institution for computer.
Real-Time Cyber Physical Systems Application on MobilityFirst Winlab Summer Internship 2015.
Where is the IT in ITS? T3 Presentation August 18, 2009 Mac Lister Knowledge and Technology Transfer Program Manager ITS Joint Program Office RITA.
BCS, The Chartered Institute for IT Mauritius 6 th November 2012.
Research at Department of Computer and Systems Sciences – DSV.
© Copyright 2010 Hewlett-Packard Development Company, L.P. 1 MORE THAN A DIGIT(AL) SHIFT Frank Huynen Director Strategy & Innovation.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
1 - 1 The Networked Economy: A new way of doing business Copyright © 2001 by Harcourt, Inc. All rights reserved. Part 1.
Mel C. Labrador Senior Analyst, APAN Asia Pacific Area Network (APAN)
Strategic Mobility 21 Focused on Making Decision Relevant Data A Logistics Multiplier in All Domains Strategic Mobility 21 Focused on Making Decision Relevant.
The Pedagogical ICT Licence ICT in initial teacher training Professional development of teachers in ICT Denmark.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
By Jared.  Under the terms of the alliance, epals this fall will add Microsoft’s
What is The Internet?. Internet Vs Intranet Internet –Computers connected throughout the world. PUBLIC Network Intranet- Secure connected computers within.
Two trends that will change the Internet
Microcomputer Networking II St. Cloud State University MCS 426, Fall 1999 Instructor: Adomas Svirskas TCP/IP addressing Addressing basics Address classes.
Chapter 1 An Introduction to Information Systems
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Defense Daily Cyber Summit
1st Technology Spontaneous and encrypted multimedia connections between users with dynamic IP addresses or ports, and visitors connecting through tunneled.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
E-COMMERCE & MOBILE COMPUTING. On Technicals… Considerations for evaluating platform Ecommerce Applications Development Process Integration Options Middlewares.
1 Data Versus Information WestCharles Mann 79154TM Shoes Monthly Sales Report for West Region Sales Rep: Charles Mann Emp No Item Qty Sold.
IT Security vs Office Administration Efficiency Office Administration Efficiency Date: João Stott.
FITARA Revamping IT in the Federal Government Presentation to DIR Information Security Forum Richard A. Spires April 14, 2016.
CS4HS Why Computer Science? Ed Lazowska Bill & Melinda Gates Chair in Computer Science & Engineering University of Washington August 2012.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-IX)
Paul Ormonde-James 2014 CYBERTREKING.COM By Paul Ormonde-James January 2014 The future is closed than you think. COM.
Computer Science skill sets
Presented By Michelle Decker
Computer Ethics and Research
TeleManagement Forum The voice of the OSS/BSS industry.
Computer Literacy – Grade 8
DISA Global Operations
Computer Science Courses
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Computer Literacy – Grade 8
DISN Evolution Mr. Charles Osborn
16EC Computer networks unit II Mr.M.Jagadesh
Computer Science Courses in the Major
Presentation transcript:

Cyber-Command 101 Planned Words in Notes Format

What is the IO Threat?

Collaboration Replaces Control

Army is Fraction of a Fraction

Human Minds Are Center of Gravity

Abandon the Legacy Mind-Set

What Does This Mean? Current Cyber-Command Proposed Cyber-Command Electronic WarfareOpen Spectrum & F/OSS Computer Network OperationsData Security from Hand to Cloud Psychological OperationsPublic Intelligence/ Open Source Intelligence (OSINT) Military DeceptionWhole of Government/ Multinational Decision-Support Operations SecurityEducation in All Possible Forms

Communications Matures

Intelligence Matures

Open Everything

Brains, Not Bits & Bytes

IO Cube

Four Forces After Next

Connecting the Dots

Ten Trends in Education 1Web-Searching 2Blending Learning 3Free/Open Source Software 4Open CourseWare 5Learning Portals 6Learners as Teachers 7Electronic Collaboration 8Alternative Reality including Serious Games 9Mobile Real-Time Learning 10Networks of Personalized Learning

Key Topics Authorities. Modify every single policy, acquisition, & operations authority. Organizations. C-9 in every organizationscreate the distributed Army brain. Signal Management. Open Spectrum now, data security not network security. Enterprise Services. Simple cell phones, OnStar, regional call & data centers. Operationalize Cyber. Every Army body is a thinker first, a shooter second. Execute Full Spectrum Cyber. Civil Affairs rules now, put the best & brightest there. Global Command & Control. Multinational, shared information as harmonizer Agile Cyber Proponency. Everyone on Earth has an IP address. Leverage that. 21 st Century Cyber-Warrior. May the crowd be with youleading minds. Requirements & Resources. Done right this impacts on every Army element. Cyber-Command in Three Words: Education, Intelligence, Research. Cyber-Command in One Word: Education.

This is Your IO Reality

Future of IO Part I

Future of IO Part II

May the Crowd Be With You…