Conceito militar, agora aplicado a Cibersegurança, o "the cyber kill chain" foi desenvolvido pela Lockheed Martin em 2011. Ele descreve as fases que um adversário seguirá para alvejar uma Organização. São 7 fases bem definidas e este ataque é considerado bem sucedido
se / quando todas as fases foram realizadas.
(DOCUMENTO EM INGLÊS)
Présentation de la suite ELK dans un contexte SIEM et zoom sur Wazuh (OSSEC) , IDS open source
Venez découvrir comment être proactif face aux problèmes de cyber sécurité en analysant les données fournies par vos équipements et applications critiques.
The document discusses the MITRE ATT&CK framework, which is a knowledge base of adversary behaviors and tactics collected from real-world observations. It describes how the framework categorizes behaviors using tactics, techniques, and procedures. The framework can be used for threat intelligence, detection and analytics, adversary emulation, and assessment and engineering. The document provides examples of how organizations can map their detection capabilities and data sources to techniques in the framework to improve visibility of attacks. It cautions against misusing the framework as a checklist rather than taking a threat-informed approach.
This document discusses cyber threat intelligence and strategies for defense. It begins with an introduction to cyber threat intelligence and discusses the cyber attack life cycle model from Lockheed Martin. It then addresses questions to consider regarding cyber threats. The document outlines threat intelligence standards and tools like STIX and TAXII, and discusses challenges with SIEM systems. It proposes architectures that incorporate threat intelligence to provide preventive, detective, and fusion capabilities. The presentation concludes with a discussion of data sources and architectures to support cyber threat analysis.
SOC and SIEM systems can help organizations detect and respond to security incidents and threats in a timely manner. A SOC acts as a security operations center to monitor, analyze, and respond to cybersecurity incidents. SIEM provides real-time analysis of security alerts and events to help identify potential threats. Implementing SOC and SIEM solutions can improve an organization's security posture through early threat detection, compliance with regulations, and reduced breach impact.
Security and Virtualization in the Data CenterCisco Canada
This presentation will discuss, effectively integrating security, core Data Center fabric technologies and features, secutiry as part of the core design, designs to enforce micro segmentation in the data center, enforce separation of duties in virtualized and cloud environments and security to enforce continuous compliance.
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchMITRE - ATT&CKcon
From MITRE ATT&CKcon Power Hour October 2020
By:
Aunshul Rege, Associate Professor, Temple University, @prof_rege
Rachel Bleiman, PhD Student/NSF Graduate Research Assistant, Temple University, @rab1928
This presentation from the MITRE ATT&CKcon Power Hour session on October 9, 2020, explores the application of the MITRE ATT&CK® and PRE-ATT&CK matrices in cybercrime education and research. Specifically, Rege and Bleiman demonstrate the mapping of the PRE-ATT&CK matrix to social engineering case studies as an experiential learning project in an upper-level cybercrime liberal arts course. It thus allows students to understand the alignment process of threat intelligence to the PRE-ATT&CK framework and also learn about its usefulness/limitations. The talk also discusses the mapping of the ATT&CK matrix, tactics, techniques, software, and groups for two cybercrime datasets created by collating publicly disclosed incidents: (i) critical infrastructure ransomware (CIRW) incidents, and (ii) social engineering (SE) incidents. For the CIRW dataset, 39% of the strains mapped onto the ATT&CK software. For the SE dataset, 49% of the groups and 65% of the techniques map on to the MITRE framework. This helps the researchers identify the framework's usefulness/limitations and also helps our datasets connect to richer information that may not otherwise be available in the publicly disclosed incidents.
Kaspersky Security center 10 documentationTarek Amer
The document discusses the architecture and components of Kaspersky Security Center 10, including network agents, the administration console, administration server, and database. It also covers the management tools of tasks, commands, policies, and groups/selections. System requirements for the administration server include supported Windows Server operating systems. Remote deployment and creating policies and tasks are also outlined.
Conceito militar, agora aplicado a Cibersegurança, o "the cyber kill chain" foi desenvolvido pela Lockheed Martin em 2011. Ele descreve as fases que um adversário seguirá para alvejar uma Organização. São 7 fases bem definidas e este ataque é considerado bem sucedido
se / quando todas as fases foram realizadas.
(DOCUMENTO EM INGLÊS)
Présentation de la suite ELK dans un contexte SIEM et zoom sur Wazuh (OSSEC) , IDS open source
Venez découvrir comment être proactif face aux problèmes de cyber sécurité en analysant les données fournies par vos équipements et applications critiques.
The document discusses the MITRE ATT&CK framework, which is a knowledge base of adversary behaviors and tactics collected from real-world observations. It describes how the framework categorizes behaviors using tactics, techniques, and procedures. The framework can be used for threat intelligence, detection and analytics, adversary emulation, and assessment and engineering. The document provides examples of how organizations can map their detection capabilities and data sources to techniques in the framework to improve visibility of attacks. It cautions against misusing the framework as a checklist rather than taking a threat-informed approach.
This document discusses cyber threat intelligence and strategies for defense. It begins with an introduction to cyber threat intelligence and discusses the cyber attack life cycle model from Lockheed Martin. It then addresses questions to consider regarding cyber threats. The document outlines threat intelligence standards and tools like STIX and TAXII, and discusses challenges with SIEM systems. It proposes architectures that incorporate threat intelligence to provide preventive, detective, and fusion capabilities. The presentation concludes with a discussion of data sources and architectures to support cyber threat analysis.
SOC and SIEM systems can help organizations detect and respond to security incidents and threats in a timely manner. A SOC acts as a security operations center to monitor, analyze, and respond to cybersecurity incidents. SIEM provides real-time analysis of security alerts and events to help identify potential threats. Implementing SOC and SIEM solutions can improve an organization's security posture through early threat detection, compliance with regulations, and reduced breach impact.
Security and Virtualization in the Data CenterCisco Canada
This presentation will discuss, effectively integrating security, core Data Center fabric technologies and features, secutiry as part of the core design, designs to enforce micro segmentation in the data center, enforce separation of duties in virtualized and cloud environments and security to enforce continuous compliance.
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchMITRE - ATT&CKcon
From MITRE ATT&CKcon Power Hour October 2020
By:
Aunshul Rege, Associate Professor, Temple University, @prof_rege
Rachel Bleiman, PhD Student/NSF Graduate Research Assistant, Temple University, @rab1928
This presentation from the MITRE ATT&CKcon Power Hour session on October 9, 2020, explores the application of the MITRE ATT&CK® and PRE-ATT&CK matrices in cybercrime education and research. Specifically, Rege and Bleiman demonstrate the mapping of the PRE-ATT&CK matrix to social engineering case studies as an experiential learning project in an upper-level cybercrime liberal arts course. It thus allows students to understand the alignment process of threat intelligence to the PRE-ATT&CK framework and also learn about its usefulness/limitations. The talk also discusses the mapping of the ATT&CK matrix, tactics, techniques, software, and groups for two cybercrime datasets created by collating publicly disclosed incidents: (i) critical infrastructure ransomware (CIRW) incidents, and (ii) social engineering (SE) incidents. For the CIRW dataset, 39% of the strains mapped onto the ATT&CK software. For the SE dataset, 49% of the groups and 65% of the techniques map on to the MITRE framework. This helps the researchers identify the framework's usefulness/limitations and also helps our datasets connect to richer information that may not otherwise be available in the publicly disclosed incidents.
Kaspersky Security center 10 documentationTarek Amer
The document discusses the architecture and components of Kaspersky Security Center 10, including network agents, the administration console, administration server, and database. It also covers the management tools of tasks, commands, policies, and groups/selections. System requirements for the administration server include supported Windows Server operating systems. Remote deployment and creating policies and tasks are also outlined.
This document outlines a 15-day course from Niasta on deploying and configuring Juniper SRX devices. The course covers topics such as security zones, policies, intrusion detection, network address translation, IPSec VPNs, user authentication, high availability clustering, and screen options. It includes 10 chapters that delve into these topics and provide labs to help students learn. The document also provides contact information for Niasta for any additional questions or information.
The document outlines a cybersecurity reference architecture that provides:
1. Active threat detection across identity, apps, infrastructure, and devices using tools like Azure Security Center, Windows Defender ATP, and Enterprise Threat Detection.
2. Protection of sensitive data through information protection, classification, and data loss prevention tools.
3. Management of identity and access to securely embrace identity as the primary security perimeter.
This document provides an overview of SIEM and threat hunting. It defines SOC (security operations center) and its goal of monitoring and analyzing an organization's security posture. It introduces SIEM tools and common terminology like threats, indicators of compromise, indicators of attack, and tactics, techniques and procedures. The document also briefly outlines the cyber kill chain that attackers use and examples of advanced persistent threats.
William F. Crowe presented on the cybersecurity kill chain, which models the stages of a cyber attack based on military doctrine. The model developed by Lockheed Martin includes stages of reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. ISACA and the European Union Agency for Network and Information Security also use similar kill chain models to analyze the process of advanced persistent threats targeting critical systems and data.
MITRE ATT&CK framework is about the framework that is followed by Threat Hunters, Threat Analysts for Threat Modelling purpose, which can be use for Adversary Emulation and Attack Defense. Cybersecurity Analyst widely use it for framing the attack through its various used Tactics and Techniques.
SOC presentation- Building a Security Operations CenterMichael Nickle
Presentation I used to give on the topic of using a SIM/SIEM to unify the information stream flowing into the SOC. This piece of collateral was used to help close the largest SIEM deal (Product and services) that my employer achieved with this product line.
This document summarizes the virtual ATT&CKcon 3 conference. It notes that over 5,000 people pre-registered to watch online from 75 countries. There were 125 people attending in-person. It provides submission and acceptance stats for presentations. It introduces the MITRE ATT&CK team members and lists the virtual event sponsors. It encourages continuing the discussion on their Slack channel.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document provides an overview of intrusion prevention systems (IPS). It defines IPS and their main functions, which include identifying intrusions, logging information, attempting to block intrusions, and reporting them. It also discusses terminology related to IPS like false positives and negatives. The document outlines different detection methods used by IPS like signature-based, anomaly-based, and stateful protocol analysis. It categorizes IPS based on deployment like network-based, host-based, and wireless. It provides Snort, an open-source IPS, as a case study and discusses its components, rules structure, and challenges.
The cyber kill chain describes cyber attacks from an attacker's perspective through distinct phases: (1) reconnaissance, (2) weaponization, (3) delivery, (4) exploitation, (5) installation, (6) command and control, and (7) actions on objectives. Each phase of the kill chain can be mapped to defensive tools and actions to prevent attacks. Understanding the kill chain stages gives analysts insight into what is being attempted and how to respond appropriately. The kill chain was developed by Lockheed Martin as a method to describe intrusions and prevent advanced persistent threats by highly trained adversaries targeting sensitive information.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
The document discusses the NIST Cybersecurity Framework. It defines key terms like information security, CIA triad, and cybersecurity. It explains that the NIST CSF provides guidance on cybersecurity risk management principles and best practices. It outlines the Framework Core, Implementation Tiers, and Profiles to help organizations manage cybersecurity risks in a cost-effective manner. The CSF can be used by organizations of any size or sector to understand and apply cybersecurity risk management.
An introduction to SOC (Security Operation Center)Ahmad Haghighi
The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.
As the industry’s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet, protecting all your users within minutes.
Cisco Advanced Malware Protection offers global threat intelligence, advanced sandboxing and real-time malware blocking to prevent breaches while it continuously analyzes file activity across your network, so that you can quickly detect, contain and remove advanced malware.
Presentation of Cisco Security Architecture and Solutions such as Cisco Advanced Malware Protection (AMP) and Cisco Umbrella during Simplex-Cisco Technology Session that took place at the Londa Hotel in Limassol on 14 March 2018.
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter.
The document discusses Windows credential attacks and defenses. It describes common credential theft techniques like dumping credentials from LSASS memory using Mimikatz. It then covers various Windows credential hardening defenses over time like Protected Processes, Restricted Admin, and CredentialGuard. It demonstrates CredentialGuard's effectiveness at preventing credential theft compared to normal and older Windows configurations through a lab demo. The presentation aims to educate on real-world credential attacks while showing that effective defense is possible.
Presentation talks about introduction to MITRE ATT&CK Framework, different use cases, pitfalls to take care about.. Talk was delivered @Null Bangalore and @OWASP Bangalore chapter on 15th February 2019.
This presentations highlights the Cisco Security Architecture. For more information Cisco's security products and solutions please visit our website here: http://www.cisco.com/web/CA/products/vpn.html
This document provides an overview of module 1 of a cybersecurity training course. The module objectives are to explain why networks and data are attacked and to describe the motivations and potential impacts of attacks. It discusses how threat actors like hackers, organized crime groups, and state-sponsored groups attack individuals, companies, and nations to steal information, money, and trade secrets. Specific attack types covered include rogue wireless hotspots, ransomware, and sophisticated malware targeted at infrastructure. The impacts of attacks include theft of personally identifiable information, lost competitive advantage from stolen intellectual property, and disruption of economic and political systems through cyber attacks.
Knowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK
The document discusses using storytelling to increase understanding of cyber threats through ATT&CK threat sightings. It describes the AC3 methodology for documenting threat actor tactics, techniques, and procedures with full context and observables. Different levels of abstraction and tools are used to translate threat sightings into various formats to ensure understanding across audiences. Maintaining defensive playbooks adapted from threat sightings helps continuous understanding and improvement of defenses.
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
The document discusses building and developing the U.S. Army's Cyber Branch career field. It outlines several initiatives to fill officer and enlisted roles to 90% by focusing on voluntary transfer programs, commissioning new second lieutenants, and capitalizing on experienced Cyber Mission Force personnel. It also discusses developing the branch's identity, culture and cohesion while training personnel to joint cyber standards and work roles.
This document outlines a 15-day course from Niasta on deploying and configuring Juniper SRX devices. The course covers topics such as security zones, policies, intrusion detection, network address translation, IPSec VPNs, user authentication, high availability clustering, and screen options. It includes 10 chapters that delve into these topics and provide labs to help students learn. The document also provides contact information for Niasta for any additional questions or information.
The document outlines a cybersecurity reference architecture that provides:
1. Active threat detection across identity, apps, infrastructure, and devices using tools like Azure Security Center, Windows Defender ATP, and Enterprise Threat Detection.
2. Protection of sensitive data through information protection, classification, and data loss prevention tools.
3. Management of identity and access to securely embrace identity as the primary security perimeter.
This document provides an overview of SIEM and threat hunting. It defines SOC (security operations center) and its goal of monitoring and analyzing an organization's security posture. It introduces SIEM tools and common terminology like threats, indicators of compromise, indicators of attack, and tactics, techniques and procedures. The document also briefly outlines the cyber kill chain that attackers use and examples of advanced persistent threats.
William F. Crowe presented on the cybersecurity kill chain, which models the stages of a cyber attack based on military doctrine. The model developed by Lockheed Martin includes stages of reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. ISACA and the European Union Agency for Network and Information Security also use similar kill chain models to analyze the process of advanced persistent threats targeting critical systems and data.
MITRE ATT&CK framework is about the framework that is followed by Threat Hunters, Threat Analysts for Threat Modelling purpose, which can be use for Adversary Emulation and Attack Defense. Cybersecurity Analyst widely use it for framing the attack through its various used Tactics and Techniques.
SOC presentation- Building a Security Operations CenterMichael Nickle
Presentation I used to give on the topic of using a SIM/SIEM to unify the information stream flowing into the SOC. This piece of collateral was used to help close the largest SIEM deal (Product and services) that my employer achieved with this product line.
This document summarizes the virtual ATT&CKcon 3 conference. It notes that over 5,000 people pre-registered to watch online from 75 countries. There were 125 people attending in-person. It provides submission and acceptance stats for presentations. It introduces the MITRE ATT&CK team members and lists the virtual event sponsors. It encourages continuing the discussion on their Slack channel.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document provides an overview of intrusion prevention systems (IPS). It defines IPS and their main functions, which include identifying intrusions, logging information, attempting to block intrusions, and reporting them. It also discusses terminology related to IPS like false positives and negatives. The document outlines different detection methods used by IPS like signature-based, anomaly-based, and stateful protocol analysis. It categorizes IPS based on deployment like network-based, host-based, and wireless. It provides Snort, an open-source IPS, as a case study and discusses its components, rules structure, and challenges.
The cyber kill chain describes cyber attacks from an attacker's perspective through distinct phases: (1) reconnaissance, (2) weaponization, (3) delivery, (4) exploitation, (5) installation, (6) command and control, and (7) actions on objectives. Each phase of the kill chain can be mapped to defensive tools and actions to prevent attacks. Understanding the kill chain stages gives analysts insight into what is being attempted and how to respond appropriately. The kill chain was developed by Lockheed Martin as a method to describe intrusions and prevent advanced persistent threats by highly trained adversaries targeting sensitive information.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
The document discusses the NIST Cybersecurity Framework. It defines key terms like information security, CIA triad, and cybersecurity. It explains that the NIST CSF provides guidance on cybersecurity risk management principles and best practices. It outlines the Framework Core, Implementation Tiers, and Profiles to help organizations manage cybersecurity risks in a cost-effective manner. The CSF can be used by organizations of any size or sector to understand and apply cybersecurity risk management.
An introduction to SOC (Security Operation Center)Ahmad Haghighi
The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.
As the industry’s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet, protecting all your users within minutes.
Cisco Advanced Malware Protection offers global threat intelligence, advanced sandboxing and real-time malware blocking to prevent breaches while it continuously analyzes file activity across your network, so that you can quickly detect, contain and remove advanced malware.
Presentation of Cisco Security Architecture and Solutions such as Cisco Advanced Malware Protection (AMP) and Cisco Umbrella during Simplex-Cisco Technology Session that took place at the Londa Hotel in Limassol on 14 March 2018.
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter.
The document discusses Windows credential attacks and defenses. It describes common credential theft techniques like dumping credentials from LSASS memory using Mimikatz. It then covers various Windows credential hardening defenses over time like Protected Processes, Restricted Admin, and CredentialGuard. It demonstrates CredentialGuard's effectiveness at preventing credential theft compared to normal and older Windows configurations through a lab demo. The presentation aims to educate on real-world credential attacks while showing that effective defense is possible.
Presentation talks about introduction to MITRE ATT&CK Framework, different use cases, pitfalls to take care about.. Talk was delivered @Null Bangalore and @OWASP Bangalore chapter on 15th February 2019.
This presentations highlights the Cisco Security Architecture. For more information Cisco's security products and solutions please visit our website here: http://www.cisco.com/web/CA/products/vpn.html
This document provides an overview of module 1 of a cybersecurity training course. The module objectives are to explain why networks and data are attacked and to describe the motivations and potential impacts of attacks. It discusses how threat actors like hackers, organized crime groups, and state-sponsored groups attack individuals, companies, and nations to steal information, money, and trade secrets. Specific attack types covered include rogue wireless hotspots, ransomware, and sophisticated malware targeted at infrastructure. The impacts of attacks include theft of personally identifiable information, lost competitive advantage from stolen intellectual property, and disruption of economic and political systems through cyber attacks.
Knowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK
The document discusses using storytelling to increase understanding of cyber threats through ATT&CK threat sightings. It describes the AC3 methodology for documenting threat actor tactics, techniques, and procedures with full context and observables. Different levels of abstraction and tools are used to translate threat sightings into various formats to ensure understanding across audiences. Maintaining defensive playbooks adapted from threat sightings helps continuous understanding and improvement of defenses.
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
The document discusses building and developing the U.S. Army's Cyber Branch career field. It outlines several initiatives to fill officer and enlisted roles to 90% by focusing on voluntary transfer programs, commissioning new second lieutenants, and capitalizing on experienced Cyber Mission Force personnel. It also discusses developing the branch's identity, culture and cohesion while training personnel to joint cyber standards and work roles.
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
This document provides an overview of current and emerging Army cyber requirements and capabilities gaps. It identifies the top priority gaps as improving commanders' situational awareness across all echelons, including understanding the social media dimension. Other high priority gaps include defending networks in depth, conducting defensive and offensive cyber operations, and extending cyber capabilities to tactical units. The document recommends solutions such as integrating cyber and electronic warfare planning, developing trained and ready cyber forces, and transforming Army doctrine to fully leverage cyber capabilities in operations.
August 25, 2015
COL Thomas A. Pugh, USA
Signal Commandant
U.S. Army Cyber Center of Excellence and Fort Gordon
This will provide an update from last year’s session of the US Army Signal School. The Signal Commandant will present the updated Signal School Lines of Effort and the current priorities and projects of the Signal School.
Automated planning, configuration, and monitoring
JENM: Network planning, configuration, and monitoring
JACS/ACES: Frequency management and spectrum planning
RBSAM: Radio battery and load planning
VMWare: Integrated virtual environment
Single User Interface: Common look and feel across tools
Mobile: Deployable on tactical laptops and servers
Scalable: Supports platoon to division level networks
Automated: Reduces manual processes and errors
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
August 25, 2015
Col. Stephen Elle, U.S. Army Cyber Center of Excellence & Fort Gordon
This discussion includes the new initiatives currently being designed such as the Future Leader Cyber Course, the Strategic Cyber Planners Course, and others. Additionally, the goal will be to ensure the materials prepared for the institutional and operational domain can also be used later for self-development.
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
Dale Manion and Phil Sines.
The Office Chief of Signal (OCOS) provides the strategic human resources planning and career programs management for approximately 60,000 Signal Enlisted, Warrant Officer and Officer’s that are critical to mission success of the Department of Defense Information Network (DoDIN) Operations worldwide.
The document summarizes highlights from the TechCast Project, which uses collective intelligence to forecast trends related to technology, the digital economy, and global change out to 2030. It discusses forecasts for areas like artificial intelligence, the digital economy, social trends, wild cards, and provides a most likely scenario for 2020-2030. The scenario envisions advances in sustainability, transportation, extending life, threats from various crises, higher social values, infinite knowledge/intelligence, and a potential global consciousness movement.
LTC Jonathan Long, USA
Assistant TRADOC Capability Manager for Network & Services (TCM N&S)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
This document discusses the U.S. Air Force's use of an Other Transaction Authority (OTA) to promote open systems acquisition and innovation. It provides an overview of the OTA, including that it allows the Air Force to prototype C4ISR systems using modular, plug-and-play technologies. It describes considerations for the Air Force's C4ISR OTA, such as requiring participation of non-traditional defense contractors. It also discusses plugtests, which allow multiple industry partners to demonstrate initial prototypes for assessment without traditional acquisition red tape. Contact information is provided for those interested in participating or obtaining more information.
The document discusses the impact of failure to innovate in business. It notes that executives want innovation but companies can become technologically stagnant over time. The business model and approach to innovation must change as the company lifecycle transforms. Truly innovative thinking requires going "out of the box" to understand customers' needs rather than make assumptions. Failure to innovate and adapt the business model can lead companies to become detached from reality and ultimately fail like Kodak. The key is to understand customers' pains rather than just focusing on potential gains from new products or features.
The document discusses how networks need to change to accommodate new demands like mobility, virtualization, and changing traffic patterns. It notes challenges around centralized management, flexibility, and cost reduction. New approaches are needed to close the gap between business needs and what traditional IT can deliver. The document advocates for software-defined networking and open architectures to provide innovation, flexibility, and efficiency through an ecosystem of partners. This will allow networks to better support trends like cloud computing, big data, and security services.
This document provides an overview of IT and internet security for small and mid-sized businesses. It discusses why information security is important, common cyber threats businesses face like data theft and denial of service attacks. It recommends defining security strategies through risk assessment and implementing best practices like securing networks and endpoints, mitigating threats through controls, and following the top 10 security steps for SMBs. Resources for additional guidance are also provided.
Dean Pfoltzer - Delivering Capability to the Warfighter Cost Effectivelyscoopnewsgroup
The document discusses the U.S. Army's information technology and network modernization efforts. It outlines the Army Chief Information Officer's key lines of effort to provide signal capabilities to forces, increase network throughput, deliver IT services to the edge, strengthen network operations, and enhance cybersecurity capabilities. Specific initiatives discussed include the Joint Regional Security Stacks migration, network convergence, private cloud computing pilots, unified communications capabilities, and distributed mission command systems. The goal is to build a secure, joint network that enables mission command capabilities anywhere at any time through these IT modernization efforts.
This document provides an update on the revision of US Army Training Circular TC 7-100.2 on opposing force tactics, which will be updated in fiscal year 2017. It summarizes the roles and responsibilities of TRADOC G-2 and ACE Threats Integration in developing opposing force doctrine. The document requests data from readers on state and non-state threats such as Russia, proxies, and groups like ISIL to incorporate into the updated opposing force tactics manual. It previews several articles in the newsletter on topics like Russian electronic warfare, Al Shabaab hotel attacks, and a training course on threat tactics.
The use of Projective Analysis (PAN) modeling tools to establish the value of increased agility in responding to increasingly multi-sided demands being made on operational capabilities. The approach addresses the need to reduce cohesion costs by creating economies of alignment as well as economies of scale and scope.
The document describes the process of effects based operations (EBO) in 11 steps: 1) define future scenarios, 2) identify drivers and conditions, 3) analyze driver/condition relationships, 4) develop scenarios, 5) define end states, 6) create effects, 7) identify means, 8) determine capabilities, 9) assess resources, 10) generate reports, 11) rate effect-means pairs. The goal is to identify actions that can achieve a desired strategic outcome through military and non-military means by considering direct, indirect and cascading effects.
There is considerable development work going on regarding emergency Applications and in this session attendees were informed about the most recent updates and heard first hand where the latest thinking will take us. They were also informed about standards discussed and produced by international Standards Developing Organisations (SDOs) and that will impact emergency calls handling organisations.
5G Training, 5G System Survey Training - Tonex TrainingBryan Len
Length: 2 Days
The rollout of 5G technology in the U.S. at long last started in 2019.
The improvement of 5G technology was required on the grounds that transporters worldwide were searching for solutions to adapt to the consistently developing demand of versatile information.
5G Training, 5G System Survey Training, presents 5G technology, architecture and protocols. 5G air interface and the center network advancements and arrangements are additionally talked about. The course incorporates traffic cases and survey of arrangements, organizations and items. Both 3GPP and IMT-2020 methodologies are secured.
Who Should Attend:
5G training, 5G system survey training is highly recommended for Engineers, managers, marketing and operation personnel who need an overview of the 5G systems including 5G Radio Access Network (RAN), 5G New Radio (NR), 5G core and integration with LTE/LTE-A and LTE-A Pro.
Learning Objectives:
Upon fruition of this course, members will have the option to:
Clarify the key 5G Principles, Services and Technical perspectives
Clarify the motivation behind actualizing 5G in the current portable ecosystem
Portray a portion of the 5G Use Cases and Applications: 3GPP and ITU 5G Use Cases (eMBB, URLLC and mMTC)
Rundown 5G Network Features including: functions, hubs and components, interfaces, reference focuses, essential operational methods and structural decisions
Depict the General 5G Network Architecture
Look into 5G systems versus customary LTE, LTE-An and LTE-A Pro systems (3GPP Releases)
Rundown and clarify 5G RAN and Core Network Architecture
Show the 5G Access
Depict 5G System Engineering (Access Network, 5G Core) Approaches
Depict utilization of NFV, SDN and network cutting in 5G System
Find out about 5G Radio Access Network including 5G New Radio (NR)
Course Topics:
Introduction to 5G Mobile Communication
Key Principles of 5G Systems
5G System Architecture
3GPP 5G System Architecture
5G New Radio (NR)
Request more information regarding 5G Training, 5G System Survey Training. Visit tonex.com for course and workshop detail.
5G Training, 5G System Survey Training
https://www.tonex.com/training-courses/5g-training-5g-system-survey-training/
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
How to Dimension user Traffic in 4G networks
What is the best LTE Configuration
Spectrum analysis for LTE System
MIMO: What is real, What is Wishful thinking
LTE Measurements what they mean and how they are used
How to consider Overhead in LTE Dimensioning and What is the impact
How to take into account customer experience when Designing a Wireless Network
LTE, LTE A, and LTE A Pro Migration to 5G Training : Tonex TrainingBryan Len
LTE, LTE-A, and LTE-A Pro Migration to 5G Training covers LTE, LTE-Advanced, LTE-Advanced Pro, features and enhancements and migration towards 5G. Other topics include: 5G NR, Air Interface Architecture, 5G Core (5GC) Architecture, Nodes, Interfaces, and Operation.
Topics Include:
5GC Overview
5G Technology Overview
5G System Survey
5G Architecture and Interfaces
5G Network Services
5G-NR Architecture, Interfaces, Protocols and Operations
5G-NR Signaling
5G Core (5GC) Architecture, Interfaces, Protocols and Operations
Multi-Access Edge Computing (MEC)
Advanced LPWA for IoT
5G Signaling and Operations
5G Protocol and Architecture
5GC Network Solutions
5G Network Design and Optimization
5G Network Roll-Out
5G Capacity Planning
5G For Non-Engineers and Managers
5G RAN Signaling
5G RF Engineering
5G RF Planning
Learning Objectives:
After completing this course, the student will be able to:
Describe the evolution from LTE/LTE-A and LTE-A Pro to 5G
Summarize LTE-A pro architecture enhancements towards 5G
Describe the fundamentals of 5G networks
Illustrate the architecture of the 5G network including 5G NR,5GC
Describe Enhanced Mobile Broadband (eMBB), Massive Machine Type (mMTC) Communications and Ultra-Reliable and Low Latency Communications (URLLC) features in 5G
Identify key 5G network functions, interfaces, protocols and interworking elements
Describe how the 5G NR works
Describe 5GC network functions and interfaces
Compare 5G Service Based Architecture vs. Reference Point Architecture
Describe ingratiation paths to 5G
Courses Material, Tools and Guides, Outlines:
Evolution from LTE/LTE-A Pro to 5G
Overview of 5G Network Services
5G Radio and Core Network Architecture
Network Slicing in 5G
Architecture Evolution from LTE/LTE-A and LTE-A Pro to 5G NR
Cloud and Open RAN Architectures
Control and User Plane Architecture and Bearer Types
Introduction 5G Core Network (5GC)
Overview of 5G Core Network (5GC) Network Entities
5G Network Deployment and Migration Paths
Case Studies
Request more information about LTE, LTE-A, and LTE-A Pro Migration to 5G Training. Visit Tonex.com link below
https://www.tonex.com/training-courses/lte-lte-a-and-lte-a-pro-migration-to-5g-training/
PEO Digital has reorganized into 8 new portfolios and 3 enabling pillars to better deliver services. Program activities and personnel were mapped based on total force, financials, functions/processes, and work performed. The new structure includes portfolios for digital workplace services, platform application services, infrastructure services, cybersecurity and operational services, end user services, strategic sourcing services, and public safety services. The command operations office and command strategy and business office provide cross-portfolio governance and intake/transition of new work. PEO Digital outlined opportunities for industry engagement and potential upcoming RFIs/RFPs.
Telefonica: Automatización de la gestión de redes mediante grafosNeo4j
The document discusses automation of network management through graphs. It covers the evolution of technologies and challenges, modeling networks with graphs, use cases demonstrating the theory in practice, and ongoing projects. Key points include using graphs for network inventories as the basis for automation of processes like network creation, service fulfillment, and assurance. Case studies demonstrate how graph databases support these functions.
The document discusses intelligent networks and their operation. It introduces intelligent network components like the service control point (SCP) and service switching point (SSP). It describes how intelligent network services are registered and originated, going through authentication, announcement, and call routing procedures. It also addresses related standards, performance evaluation methods, and technical issues regarding security, evolution to IP networks, and cost effectiveness.
This document discusses incident handling at the Naval Postgraduate School (NPS) in a bring your own device (BYOD) environment. It provides details on NPS's network upgrades including a new wireless network and cloud initiatives. It outlines NPS's cybersecurity organization and technologies used like a security information and event management system. The document describes the incident handling process based on the NIST framework and tools used like a JIRA incident tracking template. It emphasizes documenting incidents, leveraging automation, and collaborating across the incident response team.
Global IPv6 Summit Presentation - Global Deployment or Digital DivideAPNIC
This document summarizes IPv6 deployment efforts globally and in specific regions and countries. It discusses the growing need for IPv6 due to the depletion of IPv4 address space. Several case studies are presented on IPv6 deployment by mobile carriers like T-Mobile USA. Taiwan's government efforts to promote IPv6 are also summarized, as well as the work done by TWNIC and APNIC to measure IPv6 readiness and encourage adoption.
The document summarizes a master's thesis presentation on the impact of acknowledgements on application performance in 4G LTE networks. It provides background on the rapid growth of mobile networks and increasing use of 4G/LTE. It describes how LTE uses retransmissions at the MAC and RLC layers to handle wireless loss. The presentation outlines a study using ns-3 simulations to evaluate how adjusting LTE retransmission parameters impacts the performance of VoIP, FTP, and video applications under different loss conditions.
This document provides a summary of Mudassar Ali Khan's professional experience and qualifications. It details his current role as an Integration Professional at Alcatel-Lucent Pakistan since 2011, where he has led several projects involving 3G and 4G mobile network integration and expansion. It also lists his Bachelor's degree in Electrical Engineering, professional training including CCNA certification, and internship experiences.
Waqas Abbas has over 6 years of experience in the telecom sector in field operations and transmission network support roles. He has worked on projects for major operators in Pakistan like China Mobile Pakistan and Ufone. His experience includes roles as a team lead for field operations and transmission network support. He holds a Bachelor's degree in electronic engineering with a focus on telecommunications.
Wilson M. Arieta has over 8 years of experience in 2G and 3G network operations and tier 2 support. He is Cisco CCNA certified and holds a Bachelor's degree in Electronics and Communications Engineering. He is currently a Senior Engineer at SMART Communications, where he performs tasks such as site creation, configuration, and troubleshooting. Previously, he was a Senior Engineer at Sun Cellular, where he provided tier 1 and 2 troubleshooting support and transmission network management.
This document is a resume for Michael Kwame Kwankye, a Ghanaian telecommunications engineer. It summarizes his career objective, technical skills and experience, education, and references. He has over 15 years of experience in telecom planning, design, and management roles for companies like MTN Ghana and Vodafone Ghana. His technical skills include GSM, 3G, and packet core networks from Ericsson and Huawei.
Mohamed Talaat Ahmed Fouad is a Senior LTE Radio Network Engineer at Alcatel-Lucent Egypt since 2011. He has extensive experience optimizing and supporting LTE radio networks in various countries. His roles have included network optimization, feature activation and tuning, migration preparation, and troubleshooting performance issues. He is proficient with optimization tools like ACTIX, EDAT, TEMS, Atoll 9955 RNP, and ACCO.
This document contains a resume for Shashikant Sharma summarizing his work experience and qualifications. He has over 15 years of experience in telecommunications sales, solution architecture, and presales, specializing in NFV, SDN, vEPC, and vIMS solutions. His most recent role was with Ericsson Global India as a Solution Architect focusing on their NFV and cloud solutions.
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...AFCEA International
August 25, 2015
COL James P. Ross, USA
Military Deputy to the Armaments Research, Development and Engineering Center
Project Manager Tactical Radios
COL Michael J. Thurston, USA
Project Manager Mission Command
Key highlights include how developers have implemented Soldier feedback into improved operational network capability, fielding priorities for Army network Capability Set efforts, and discussion of needed technology to enhance these capabilities.
Similar to Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015 (20)
The CREATE program aims to develop methods to improve intelligence analysis by enabling groups to collectively identify, evaluate, and refine arguments. It will create structured tools to elicit argument elements from many individuals and aggregate their contributions. The goal is to make analysis more transparent, identify unstated assumptions, and allow new evidence to easily update judgments across multiple representations of an argument. Teams will need expertise in fields like the social sciences, logic, mathematics, computer science, and software development to address these challenges.
The document summarizes seven megatrends - Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, and Cybersecurity. It discusses the future of each trend, current trends, and open questions. Some benefits mentioned are improved collaboration, education, healthcare, safety, and business models. However, some risks include increased threats to privacy, job displacement, and security issues. The document recommends organizations consider how these trends could impact their operations and how to leverage new technologies while mitigating risks.
The document discusses the challenges faced by data-driven organizations in achieving closed-loop processes to enable real-time insights at scale. It outlines how such organizations want all available data in real-time to better inform decisions, but face issues such as limited bandwidth, evolving data formats, and ensuring compliance. The document proposes that a closed-loop "OODA" (Observe, Orient, Decide, Act) system architecture is needed to address these challenges, with distributed regional infrastructures feeding into a low-latency core infrastructure to facilitate real-time command and control and end-to-end data provenance.
The document discusses new implications for command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) from technological changes. It notes the rapid growth in computing power, sensors like satellites, drones and internet-connected devices, and data volumes. This explosion of data from many sources challenges traditional decision-making cycles and requires new approaches to information sharing, cybersecurity, and adapting organizations and training to make effective decisions from vast amounts of information.
This document discusses developing a computational methodology to support decision making across all phases of the acquisition process. It aims to maximize the value delivered to warfighters while minimizing time and cost. The methodology incorporates data from testing and assessments to evaluate alternatives based on measures of effectiveness and performance. It also discusses prototypes for valuing specific systems like a camera and optimizing plug-and-play sensor configurations and portfolios based on threat assessments. The methodology aims to support valuation of individual components, systems-of-systems, and evolving needs.
The document discusses the US Air Force's Better Buying Power and Cost Capability Analysis (CCA) initiative. It aims to improve acquisition processes to deliver capabilities faster and at lower cost through projects like CCA and Open Systems Acquisition. CCA establishes guidelines for gathering industry data to inform tradeoffs during requirements development. Open Systems Acquisition uses other transaction authorities and open standards to broaden competition and technology refresh cycles. The initiatives seek to establish metrics to measure acquisition performance and cost curve impacts over time, in order to make value-based decisions. Industry engagement is key to the success of these reform efforts.
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
Results from a one day, invitation only non-attribution session to discuss DHA current information technology and related issues and brainstorm to generate a list of potential priorities
and focus areas for a new incoming CIO.
List of participating organizations:
AFCEA International
Booz Allen Hamilton
Deloitte
DLT Solutions
Hewlett Packard Enterprise
Microsoft
Mitre
Noblis
Price Waterhouse Coopers
Wells Analytics
The document discusses passive optical LAN (POLAN) technology. It provides an overview of POLAN components and fundamentals, including how it uses single mode fiber and splitters to provide connectivity to end users. POLAN offers benefits over traditional copper networks like lower costs, reduced power consumption, and space savings. The document also covers sample POLAN layouts, supported network protocols, bandwidth and quality of service capabilities, and typical enterprise bandwidth needs.
The Capabilities and Innovations of Joint Communications Support Element (JCS...AFCEA International
The document provides an overview of the Joint Communications Support Element (JCSE) including its mission, organization, equipment, initiatives and training programs. JCSE's mission is to provide rapidly deployable command, control, communications and intelligence support to combatant commanders. It maintains various en route and early entry communications packages. Future focus areas include supporting the Joint Information Environment, developing next generation transport networks, and establishing an episodic Mission Partner Environment to enable information sharing at the tactical edge. The document outlines JCSE's capabilities, equipment, organization and initiatives to fulfill its mission of providing scalable C4ISR support globally.
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
COL James P. Ross, USA
Military Deputy to the Armaments Research, Development and Engineering Center
Project Manager Tactical Radios
COL Michael J. Thurston, USA
Project Manager Mission Command
The document discusses IPv6 security implications. It provides a brief history of IPv4 and IPv6, noting that IPv4 addresses were exhausted by 2014. It then covers limitations of IPv4 that led to the development of IPv6, including exponentially growing internet usage and the need for more IP addresses and security at the IP level. Finally, it describes several key features of IPv6, such as its larger address space, simplified header format, and mandatory IPSec support.
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015AFCEA International
The document discusses the mission and processes of the Cyber Center of Excellence (CoE) to collect, analyze, validate, and disseminate approved lessons and best practices to enable continuous improvement of cyber, signal, and electronic warfare training. It outlines the CoE's multi-phase process for collecting observations from training events, validating them, and disseminating approved lessons and best practices to units. The CoE aims to sustain and enhance the Army's capabilities in these areas based on lessons learned.
This document discusses next-generation firewall security updates for 2015. It covers using dynamic user and server lists instead of static IP addresses in firewall policies, the adoption of new IPSec protocols like Suite B, using commercial firewalls approved for classified networks, and blocking threats in real-time using reputation-based intelligence from sources like DISA. Modern firewalls examine network traffic more thoroughly, integrate intrusion detection and prevention, and support programming for advanced customization and integration.
David Brown
Director of CyberTalent
SANS Institute
Jim Michaud
Director of HR Business Development
SANS Institute
The SANS Institute, in partnership with selected veteran-friendly employers, has established VetSuccess in Cybersecurity to match skilled U.S. military veterans with today’s most compelling cybersecurity-related jobs.
Defending Your Base of Operations: How Industrial Control Systems are Being T...AFCEA International
Mike Assante
Lead for Training for ICS and SCADA
SANS Industrial Control
We are used to taking the fight to the enemy, but we are entering into an age where it is expected that the enemy will be doing the same.
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
The document discusses plans for using a miniature city infrastructure called "CyberCity" to train cyber warriors. It describes CyberCity as a 1:87 scale physical model incorporating elements like a power grid, transportation systems and buildings that can be remotely controlled for offensive and defensive cyber missions. The goal is to demonstrate the kinetic impact of cyber attacks in a hands-on way and help trainees recognize real-world consequences. Initial missions discussed include disabling enemy weapons and manipulating traffic to support first responders. The document recommends starting with simpler missions and expanding complexity over time.
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...AFCEA International
This document discusses the challenges of collaboration between highly technical specialists and policy makers. It notes that technical specialists think and work differently - moving fast, embracing failure, and questioning norms. However, policy makers tend to prefer structured processes with clear plans and compromise. This gap can limit effectiveness in addressing complex technical problems. The document suggests policy makers may not fully understand these differences in approaches and how to best learn from and partner with technical talent.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
The Antyodaya Saral Haryana Portal is a pioneering initiative by the Government of Haryana aimed at providing citizens with seamless access to a wide range of government services
karnataka housing board schemes . all schemesnarinav14
The Karnataka government, along with the central government’s Pradhan Mantri Awas Yojana (PMAY), offers various housing schemes to cater to the diverse needs of citizens across the state. This article provides a comprehensive overview of the major housing schemes available in the Karnataka housing board for both urban and rural areas in 2024.
Presentation by Julie Topoleski, CBO’s Director of Labor, Income Security, and Long-Term Analysis, at the 16th Annual Meeting of the OECD Working Party of Parliamentary Budget Officials and Independent Fiscal Institutions.
AHMR is an interdisciplinary peer-reviewed online journal created to encourage and facilitate the study of all aspects (socio-economic, political, legislative and developmental) of Human Mobility in Africa. Through the publication of original research, policy discussions and evidence research papers AHMR provides a comprehensive forum devoted exclusively to the analysis of contemporaneous trends, migration patterns and some of the most important migration-related issues.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
How To Cultivate Community Affinity Throughout The Generosity JourneyAggregage
This session will dive into how to create rich generosity experiences that foster long-lasting relationships. You’ll walk away with actionable insights to redefine how you engage with your supporters — emphasizing trust, engagement, and community!
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Presentation by Rebecca Sachs and Joshua Varcie, analysts in CBO’s Health Analysis Division, at the 13th Annual Conference of the American Society of Health Economists.
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
1. UNCLASSIFIED
UNCLASSIFIED 1
Mr. Alonzo Long & Mr. Matt Hunter
Doctrine Writers
US Army Cyber Center of Excellence & Fort Gordon
Cyber Center of Excellence
Directorate of Training
Doctrine Development
3. UNCLASSIFIED
UNCLASSIFIED 3
Mission: Manages the Cyber Center of Excellence (Cyber CoE) Doctrine Publication Program,
ensuring all publications are current and relevant by incorporating the latest cyberspace
operations, signal, and electronic warfare tactics, techniques, and procedures into doctrine.
Objectives:
1) Consolidate and re-organize cyberspace operations, signal, and electronic warfare doctrine
into a cohesive Cyber CoE Doctrine Publication Program
2) Transfer existing signal doctrine and develop new cyberspace operations, signal, and
electronic warfare doctrine according to Doctrine 2015
3) Develop and sustain Training Literature Publication Program of non-doctrinal training
publications for Cyber CoE
4) Manage Cyber CoE review of Army, joint, multi-service, and multinational doctrine
Mission
4. UNCLASSIFIED
UNCLASSIFIED 4
Key Activities
• Assess, plan, develop, and publish cyberspace operations, signal, and electronic warfare
doctrine
• Review other proponent doctrine to ensure cyberspace operations, signal, and electronic
warfare is accurately represented in Army, joint, multi-service, and multinational doctrine
publications
• Monitor implementation and incorporation of cyberspace operations, signal, and electronic
warfare doctrine into operations, training and education
• Manage Cyber CoE’s non-doctrinal cyberspace operations, signal, and electronic warfare
training publication program
6. UNCLASSIFIED
UNCLASSIFIED 6
Army Doctrine 2015
15 - Army Doctrine Publications (ADP)
15 - Army Doctrine Reference Publications (ADRP)
50 - Field Manuals (FM)
• Outlines fundamental principles
• 10 page restriction
• Published
• Expands on ADP fundamental principles
• 100 page restriction
• Published
• Contains tactics (employment/arrangement) & procedures
• 200 page restriction
• Approved by CAC CG
• Deconstructs Tactics,
Techniques and Procedures
to provide hierarchy in Army
publications
• Defines differences among
the hierarchy
• Provides format for Army
publications
• Ensures all doctrinal
publications are integrated
• Significant departure from
the previous doctrinal model
in TR 25-36, 2004 (New TR 25-
36 Apr 2014)
• Clear, concise, no
redundancy, builds on
information established in
higher doctrine
ATP 6-02.40
Techniques for
Visual
Information
Operations
1. ATP 3-36, Techniques for Electronic Warfare
2. ATP 6-02.40, Techniques for Visual Information (VI) Operations
3. ATP 6-02.45, Techniques for Signal Support
4. ATP 6-02.53, Techniques for Tactical Radio Operations
5. ATP 6-02.54, Techniques for Satellite Communications
6. ATP 6-02.60, Techniques for the WIN-T
7. ATP 6-02.70, Techniques for Spectrum Management Operations
8. ATP 6-02.71, Techniques for LandWarNet Network Operations
9. ATP 6-02.75, Techniques for COMSEC Operations
Cyber CoE Doctrinal Publications
1. FM 6-02, Signal Support to Operations
2. FM 3-12, Army Cyberspace Operations
3. FM 3-38, Cyber Electromagnetic Activities
ADP 1
The
Army
ADP 3-0
Unified
Land
Operations
ADP 6-0
Mission
Command
ADRP 3-0
Unified
Land
Operations
ADRP 6-0
Mission
Command
SUS: Dec 15
Army Techniques Publications (ATP)
• Contains techniques
• No page restriction
• Approved by Cyber CoE CG
Cyber CoE Doctrinal Publications
FM 6-02
Signal
Support to
Operations
FM 3-12
Army
Cyberspace
Operations
FM 3-38
Cyber
Electromagnetic
Activities
Published PublishedFinal Draft
7. UNCLASSIFIED
UNCLASSIFIED 7
Doctrine Cyber Transition
Cyber CoE Doctrine
Signal/Communications Networks & Information Services
FM 6-02, Signal Support to Operations
• CC - Network Operations
ATP 6-02.71, Techniques for LandWarNet Network Ops
• CC - Network Transport and Information Services
ATP 6-02.45, Techniques for Signal Support
ATP 6-02.53, Techniques for Tactical Radio Ops
ATP 6-02.54, Techniques for Satellite Communications
ATP 6-02.60, Techniques for the WIN-T
ATP 6-02.75, Techniques for COMSEC Operations
• CC - Visual Information Operations
ATP 6-02.40, Techniques for Visual Information Ops
Cyberspace Operations
FM 3-12, Cyberspace Operations
FM 3-38, Cyber Electromagnetic Activities (CEMA)
• CC - Offensive Cyber Operations
ATP X-XX.XX, Techniques for Offensive Cyberspace Ops
• CC - Defensive Cyber Operations
ATP X-XX.XX, Techniques for Defensive Cyberspace Ops
Electronic Warfare
• CC - Electronic Warfare
ATP 3-36, Electronic Warfare
• CC - Spectrum Management Operations
ATP 6-02.70, Techniques for Spectrum Management Ops
FM 3-12, Cyberspace Operations
Milestones
Jun 2014: Initial draft staffing
Sep 2014: Final draft staffing
May 2015: Revised final draft staffing
Oct 2015: Cyber CoE approval
Nov 2015: CAC approval
Nov 2015: Submit to CADD for publication
Dec 2015: Projected publication
(Published)
(Signature Draft)
(In Progress)
CC – Core Competency
Signal Doctrine
Signal
• Network Transport & Information Systems
FM 6-02, Signal Support to Operations
ATP 6-02.45, Techniques for Signal Support
ATP 6-02.53, Techniques for Tactical Radio Ops
ATP 6-02.54, Techniques for Satellite Communications
ATP 6-02.60, Techniques for the WIN-T
ATP 6-02.75, Techniques for COMSEC Operations
• Network Operations
ATP 6-02.71, Techniques for LandWarNet Network Ops
• Spectrum Management Operations
ATP 6-02.70, Techniques for Spectrum Management Ops
• Visual Information
ATP 6-02.40, Techniques for Visual Information Ops
Transition
To Cyber
Doctrine
9. UNCLASSIFIED
UNCLASSIFIED 9
Development Schedule
New Pub New Publication Title Publication Status
Program Directive
Staffing
Initial Draft
Staffing
Final Draft
Staffing
Date to Army
Publishing Directorate
FM 6-02 Signal Support to Operations Published – JAN 14
FM 3-12 Army Cyberspace Operations Final Draft – SEP 14 JUL 13 JUN 14 SEP 14 AUG 15
FM 3-38 Cyber Electromagnetic Activities Published – FEB 14
ATP 3-12.1
Techniques for Offensive Cyberspace
Operations (Classified)
Program Directive
ATP 3-12.2 TBD Program Directive
ATP 3-36 Electronic Warfare Techniques Published – DEC 14
ATP 6-02.40
Techniques for Visual Information
Operations
Published – OCT 14
ATP 6-02.45 Techniques for Signal Support Signature Draft – JUN 15 APR 13 DEC 14 MAY 15 OCT 15
ATP 6-02.53
Techniques for Tactical Radio
Operations
Signature Draft – JUN 15 APR 13 JUL14 MAY 15 OCT 15
ATP 6-02.54
Techniques for Satellite
Communications
Signature Draft – JUL 15 APR 13 JAN15 MAY 15 NOV 15
ATP 6-02.60
Techniques for the Warfighter
Information Network - Tactical
Signature Draft
Approval – JUL 15
AUG 13 MAY 14 APR 15 SEP 15
ATP 6-02.70
Techniques for Spectrum Management
Operations
Signature Draft
Approval – APR 15
APR 13 OCT 13 AUG 14 JUL 15
ATP 6-02.71
Techniques for LandWarNet Network
Operations
Signature Draft
Approval – APR 15
APR 13 OCT 13 SEP 14 JUL 15
ATP 6-02.75
Techniques for Communications
Security Operations
Final Electronic File to
Army Publishing
Directorate – JUL 15
APR 13 MAR 14 NOV 14 JUL 15
TC 6-02.20 Wire and Cable Final Draft – FEB 14 APR 13 TBD
10. UNCLASSIFIED
UNCLASSIFIED 10
Key Doctrine Updates
• Network Operations (NetOps) changes to Department of Defense information network
(DODIN) operations
• Information Assurance changes to cybersecurity
• Include relationships of cyberspace, signal and electronic warfare
• Added field manuals and Army techniques publications in addition to the Doctrine 2015
requirements
13. UNCLASSIFIED
UNCLASSIFIED 13
Status:
FM 3-12 is undergoing comment adjudication from
the world-wide staffing of the revised final draft. The
timeline was adjusted to incorporate content from CG,
Cyber CoE proir to WW staffing. Submission to the
Combined Arms Doctrine Directorate is scheduled for
November 2015.
Publication Timeline:
External Coordiantion:
11/6/2015Status Start Date End Date
FD WW Staffing 5/19/2015 7/31/2015
SD Cyber CoE O6 Concurrence 9/20/2015 10/4/2015
SD Cyber CoE Approval 10/4/2015 10/4/2015
Supersession of FM 3-38
EW as a cyberspace operation mission
Cyber Planner as a staff member
Staff collaboration in SCIF/T-SCIF
Operational reach and reachback for all
operations
CERF appendix
Updated MDMP tables
Major Changes
FM 3-12 Overview
16. UNCLASSIFIED
UNCLASSIFIED 16
Doctrine Development
Branch
(Vacant) Chief, O-4
Mr. Rick San Miguel, GS-12
Mr. Alonzo Long, GS-12
Mr. Matt Hunter, GS-12
(Vacant) Writer, GS-12
Contractor Support – RLM
Mr. Mike Terry, Writer
Mr. Mark McIntire, Writer
Mr. Robert Tuller, Writer
Ms. Vanwyck Swanson, Writer
Ms. Julia Williams, Writer
Mr. Don Darden, Editor
Ms. Gloria Haggerty, Editor
Mr. Joe Turner, Graphics Editor
Mr. Brodrick Mixon, Administrator
Contractor Support – Wyle
Mr. Kelly Asbury, Writer
Doctrine Development
(706) 791-9194
(706) 791-9463
Email: usarmy.gordon.cyber-coe.mbx.gord-fg-doctrine@mail.mil
Doctrine Branch