YoVDO

Beyond the Build - Leveraging the Cyber Mission Force

Offered By: The Aspen Institute via YouTube

Tags

Aspen Institute Courses Cybersecurity Courses Cybercrime Courses Technology Policy Courses Cyber Warfare Courses

Course Description

Overview

Explore a comprehensive discussion on cyber warfare, terrorism, and crime with the head of the National Security Agency and Cyber Command. Delve into the challenges of defending against potential large-scale cyber attacks, examining recent state-sponsored incidents like the Sony hack and OPM breach. Gain insights on the Cyber Mission Force, government-private sector partnerships, and the evolving threat landscape. Learn about early warning systems, rules of engagement, and the complexities of cyber response strategies. Understand the importance of data protection, the role of Silicon Valley, and the challenges in recruiting and training cybersecurity professionals.

Syllabus

Intro
Admiral Rogers
Why are we seeing a rash of statesponsored attacks
What made the Sony hack different
How did the US respond to the Sony hack
The OPM hack
Data is valuable
Iran
Cyber Mission Force
Government vs Private
Early Warning Radar
North Korea Sony
Espionage
Partnership
Working with Silicon Valley
How quickly will the US get out of the business of retaining the data
Do you think the threat is evolving into something bigger
Do you have the rules of engagement that you need
Is it the length of the bit codes that is making it so difficult
Approach of response
Preemption
Recruiting and Training


Taught by

The Aspen Institute

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
International Cyber Conflicts
State University of New York via Coursera
Cybersecurity Awareness and Innovation
EIT Digital via Coursera
Privacy in the Western World
EIT Digital via Coursera
A Half Century of Internet: How it works today
openHPI