Главная
Study mode:
on
1
Intro
2
Admiral Rogers
3
Why are we seeing a rash of statesponsored attacks
4
What made the Sony hack different
5
How did the US respond to the Sony hack
6
The OPM hack
7
Data is valuable
8
Iran
9
Cyber Mission Force
10
Government vs Private
11
Early Warning Radar
12
North Korea Sony
13
Espionage
14
Partnership
15
Working with Silicon Valley
16
How quickly will the US get out of the business of retaining the data
17
Do you think the threat is evolving into something bigger
18
Do you have the rules of engagement that you need
19
Is it the length of the bit codes that is making it so difficult
20
Approach of response
21
Preemption
22
Recruiting and Training
Description:
Explore a comprehensive discussion on cyber warfare, terrorism, and crime with the head of the National Security Agency and Cyber Command. Delve into the challenges of defending against potential large-scale cyber attacks, examining recent state-sponsored incidents like the Sony hack and OPM breach. Gain insights on the Cyber Mission Force, government-private sector partnerships, and the evolving threat landscape. Learn about early warning systems, rules of engagement, and the complexities of cyber response strategies. Understand the importance of data protection, the role of Silicon Valley, and the challenges in recruiting and training cybersecurity professionals.

Beyond the Build - Leveraging the Cyber Mission Force

The Aspen Institute
Add to list
0:00 / 0:00