Blog Posts tagged with "Cyber Patriot"

The clock is winding down to the start of Cyber Endeavor 2011

Greetings from Budva, Montenegro! This past week was spent at the final planning conference (FPC) for Cyber Endeavor (CyE) 2011.

Note: I am happy to report that I did not lose any luggage unlike my trip to the MPC where my suitcase was (and is still) lost!

In my previous blog, I told you what Cyber Endeavor was all about. In this post, I’ll go over where we are at with CyE, who is providing seminars at the event, and the topics those seminars are going to cover. At this latest planning conference, we spent our time finalizing the schedule and agenda, as well as recruiting more participants from all of the nations in attendance. The conference was a success and we are on target to have an even better CyE than last year.

Will Poole (left) teaching newcomer, Larry Pettaway (right), the basics of our CyE strategy

What a difference a year makes! This year we’re looking to build on the success of last year by offering over twice the familiarization seminars and will double the number of participants from last year.

The importance of events like CyE cannot be overstated in light of cyber attacks happening to companies such as RSA, Lockheed Martin, and Sony.

As of today, we have over 20 different seminars being provided to 80 military members from almost 40 different countries.

It’s really exciting to be a part of this program. Cyber Endeavor is aimed to be the model program across DoD to provide familiarization and collaboration to our partner nations. CyE is quickly building up a positive reputation. It has also been mentioned by Adm. Stavridis in his March 2011 testimony before the house and senate armed services committees, as well as in the Department of Defense’s March 2011 Strategy for Operating in Cyberspace.

Wide range of participants from Academia, Industry, and Government

This year, I am very excited to say that we have multiple people from across academia, industry, and government presenting at CyE. Personally, I hope to get a chance to hear some of the presentations!

Academia – Michigan State University (MSU), Norwich University, Naval Postgraduate School, and Carnegie Melon
Industry – Microsoft, CISCO, SANS, McAfee, SAIC, LUSEC, Breaking Point Systems, IXL Center, and VeriSign
Government – EUCOM, AFRICOM, NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE), NATO Computer Incident Response Capability (NCIRC), NATO C3 Agency (NC3A), and NATO Headquarters.

Some of the topics that will be covered include:

• Live Threat Demonstration Lab (McAfee)
• Cyber Defence Monitoring Techniques and Solutions (LUSEC)
• Computer Forensics and Malware Analysis (AFRICOM)
• Security Development Lifecycle (Microsoft)
• Examining the Motives and Behaviors of Malicious Actors On and Off-line (MSU)
• Incident Handling (EUCOM)
• Securing the Human (SANS)
• Microsoft’s Vantage Point in Cyber Security (Microsoft)
• Risk Management (IXL Center)
• Packet Analysis (Breaking Point Systems)
• CyberNEXS Cyber Range (SAIC)
• Securely Configuring CISCO Firewalls (CISCO)
• Future of Cyber Warfare (Naval Postgraduate School)
• Understanding the Cyber Threat at the CIO Level (Naval Postgraduate School)

See you at the exercise!

In the upcoming months, we will finalize logistics and begin organizing seminars to support next year’s CyE. As a reminder, this year’s exercise is at Grafenwöhr, Germany and will run the following dates:

• 5-7 Sep (Firewall Seminar)
• 9-21 Sep (Management Track)
• 9-21 Sep (Technical track, including cyber-range)

Thank you for reading and see you at the exercise!

Shaun Cavanaugh
International Information Assurance and Cyber Defense

Contact info: iia@eucom.mil
Follow @Cyber_Patriot on Twitter for the latest Cyber Defense news!

Find more blog posts tagged with:

Comments: 1

by Dos Radol on July 2, 2011 :

Cyber Endeavor 2011 is a good program , But here is for civil or for military

Your comment:

Protecting our Cyber Ecosystem

On April 22, we celebrate Earth Day, a day intended to reflect appreciation for the Earth's natural environment. You are probably thinking, “How can we apply the concept of ecosystems to the man-made domain of cyberspace?” A recently published Department of Homeland Security (DHS) whitepaper, “Enabling Distributed Security in Cyberspace,” describes the need for a healthy and resilient cyber ecosystem. Similar to natural ecosystems, cyber ecosystems have a variety of diverse participants, including private firms, non-profits, governments, individuals, processes, and cyber devices. These cyber species interact at machine speed and can have a positive and a negative impact on the cyber ecosystem.

Find more blog posts tagged with: