Another successful run of the Cyber warfare exercise

Standard

US CYBERCOMMANDAs part of the Harvard Kennedy School’s Executive Education program on Cybersecurity: The Intersection of Policy and Technology, we ran the cybersecurity warfare scenario that we have used for many years now.  As usual it seemed to be a blast for both participants and organizers.  The original gang was back with professor Jim Waldo leading the charge.  I also had a couple of folks from the Harvard Info Sec team join the fun.

Incidentally, I today I received a patch for the U.S Cyber Command (USCYBERCOM) with an MD5 hash on it: 9ec4c12949a4f31474f299058ce2b22a

It is the hash for the mission statement of USCYBERCOM:

USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Advertisements

2 thoughts on “Another successful run of the Cyber warfare exercise

  1. Hi! I’m looking to start my career in cybersecuirty, I’ve recently completed by bachelors in Computer Science and I’m also in the air force as a cyber transport specialist. which route should i take in becoming a cyber security expert

    • Hi Perry – There are many possible answers to your question. Cyber security is now a vast domain with needs ranging from deep tech to strategy/policy, from defensive to offense capabilities, new product development, operations, projects, etc… Which area seems more appealing to you?

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.