Beyond the Build - Leveraging the Cyber Mission Force
Offered By: The Aspen Institute via YouTube
Course Description
Overview
Explore a comprehensive discussion on cyber warfare, terrorism, and crime with the head of the National Security Agency and Cyber Command. Delve into the challenges of defending against potential large-scale cyber attacks, examining recent state-sponsored incidents like the Sony hack and OPM breach. Gain insights on the Cyber Mission Force, government-private sector partnerships, and the evolving threat landscape. Learn about early warning systems, rules of engagement, and the complexities of cyber response strategies. Understand the importance of data protection, the role of Silicon Valley, and the challenges in recruiting and training cybersecurity professionals.
Syllabus
Intro
Admiral Rogers
Why are we seeing a rash of statesponsored attacks
What made the Sony hack different
How did the US respond to the Sony hack
The OPM hack
Data is valuable
Iran
Cyber Mission Force
Government vs Private
Early Warning Radar
North Korea Sony
Espionage
Partnership
Working with Silicon Valley
How quickly will the US get out of the business of retaining the data
Do you think the threat is evolving into something bigger
Do you have the rules of engagement that you need
Is it the length of the bit codes that is making it so difficult
Approach of response
Preemption
Recruiting and Training
Taught by
The Aspen Institute
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera International Cyber Conflicts
State University of New York via Coursera Cybersecurity Awareness and Innovation
EIT Digital via Coursera Privacy in the Western World
EIT Digital via Coursera A Half Century of Internet: How it works today
openHPI