Tag Archives: National Security

Cyber threat intelligence sharing

Nowadays, Cyber Threat Intelligence (CTI) sharing is considered necessary to survive current and future cyberattacks by working proactively. Organizations may be compelled to have a threat intelligence program and share their information. As such, stakeholders may be held responsible in the future for not sharing known threats that might affect other organizations. The core idea …

Partage de renseignements sur les menaces cybernétiques

De nos jours, le partage de renseignements sur les cybermenaces est considéré comme nécessaire pour survivre aux cyberattaques actuelles et futures en travaillant de manière proactive. Les organisations peuvent se voir contraindre d’avoir un programme de renseignement sur les menaces et de partager leurs informations. À ce titre, les parties prenantes pourraient être tenues responsables …

Election Cybersecurity and the Role of Political Parties

Political parties are an essential part of electoral democracy. They have also been identified by the intelligence community and academic researchers as a weak point in the cybersecurity of many democracies. The hacking of the Democratic National Committee’s emails is one prominent example of how ineffective cybersecurity by a political party can have far-reaching implications. …

Questioning the “Loneliness” of Lone-Wolves: A Social Network Analysis of Lone-Wolf Terrorists

Dr. David Hofmann Presented at the 2018 Atlantic Security Conference In this presentation, Dr. Hofmann will discuss his recently completed funded research (TSAS / Public Safety Canada) into the three different types of social networks formed by lone-wolves during the 24 months prior to the commission of their first act of terrorist violence. Dr. Hofmann …

Military CyberSec Logistics,Playing to Win

Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …