THE SECOND AGE

OF CYBER

The Second Age of Cyber provides the strategic roadmap for organizations frustrated with the ineffectiveness and unconstrained cost growth of cybersecurity and no metrics to determine if they are winning or losing engagements in cyberspace.

 

In the First Age of Cyber attackers have had a distinct advantage by exploiting and then amplifying subsystem vulnerabilities in order to steal critical data and disable key systems, and enterprise cybersecurity has proven incapable of defending the critical data of hundreds of global organizations including governments, businesses, and militaries.

 

The Second Age of Cyber dawns when the offense-defense balance shifts away from cyber-attackers to cyber-defenders as a result of organizational change, knowledge-based networks, and defined, reliable and repeatable metrics of success.

International Conference on System Sciences

Cyberphysical Forensics: Lessons from the USS JOHN S. MCCAIN Collision

International Conference on System Sciences

Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain

istock_000071413057_small.jpg

International Conference on System Sciences

Defensive Cyber Operations in a Software-Defined Network