This news is classified in: Defense Cyber Defense / IT
Jul 29, 2019
The ability to operate freely in the cyber domain is of critical importance to the United States. Our 6th annual Cyber Operations for National Defense Summit will address the internet and internet-enabled technologies and how they enable much of our communications, economic activities, and military capabilities. This reliance on cyberspace makes it an attractive target to malicious actors wishing to harm the United States. Our defense community has always maintained a basic level of cyber security - protecting networks and computers from unauthorized access and attack - but the current threat landscape of great-power competition has necessitated a shift towards offensive cyber operations. These operations are deployed in the same manner as traditional operations, often falling beneath the threshold of war, and are carried out by cyber-specific entities like the Cyber Mission Force.
The expansion of the global Cyber Domain has enabled technological advancements and enhanced the capabilities of the Federal Government, the DoD, and the American private sector. However, our reliance on the Cyber Domain leaves us vulnerable to attacks perpetrated by hostile state actors, terrorist groups, and cybercriminals who exploit weaknesses in our systems to interfere with and degrade our defense and commercial networks and critical infrastructure. These cyber intrusions threaten the ability of the US government and military to operate effectively and will become increasingly important to address as our dependence on the Cyber Domain grows.
To effectively combat our adversaries and maintain our cyber superiority and freedom of action in the Cyber Domain, the Government has made significant investments in updating its networks and capabilities. Additionally, the signing of a new Presidential Memorandum has provided USCYBERCOM with new cyber authorities that allow for increased offensive cyber operations that will disrupt and deter adversarial activities.
Forecasts by Deployment Mode (Cloud-based, On-premise), by Component (Hardware, Software, Services), by End-user (Army, Navy, Air Force, Cyber Commands), by Security Type (Network Security, Endpoint Security, Application Security, Cloud-based Security, Data Security), by Solutions (Threat Intelligence and Response Management, Identity and Access Management (IAM), Intrusion Detection and Prevention Systems (IDPS), Security Information and Event Management (SIEM), Firewall, Other) AND Regional and Leading National Market Analysis PLUS Analysis of Leading Companies AND COVID-19 Impact and Recovery Pattern Analysis
Download free sample pagesOur 6th Annual Cyber Operations for National Defense Symposium will provide a forum to discuss the latest developments in US offensive and defensive cyber capabilities, changes in policy that allow for greater freedom of action in the cyber domain, and the most pressing cyber threats facing our nation. This year's Symposium will foster conversation between relevant stakeholders from the community to discuss how to meet and overcome evolving cyber threats and ensure continued US dominance in cyberspace.