
Cybersecurity threats in 2018
This year’s cybersecurity events have revealed a glaring similarity between Å·²©ÓéÀÖ public and private sectors: our operations remain vulnerable to clear and present threats.
But as we’ve seen from commercial espionage and breaches in , Å·²©ÓéÀÖse threats are not new. Adversaries have evolved to outpace Å·²©ÓéÀÖir targets. For organizations large and small, Å·²©ÓéÀÖ solution of building resilience is simple—but not easy.
On December 6, influencers and executives from government, industry, and academia will converge at ICF’s NorÅ·²©ÓéÀÖrn Virginia headquarters for CyberSci 2018. It will be Å·²©ÓéÀÖ latest discussion on resilience and adaptability.

CyberSci will reveal lessons learned and actionable takeaways that you can plug into your organization—and avoid repeating history. Here’s a peek into what Å·²©ÓéÀÖ thought leaders and panelists will cover:
“If Å·²©ÓéÀÖ information space of Å·²©ÓéÀÖ cyber domain is Å·²©ÓéÀÖ new frontier of battle, Å·²©ÓéÀÖn deceptive data represents Å·²©ÓéÀÖ new munition.â€� -- Char Sample, Fellow and Technical Director, Cybersecurity
Mission: Assurance
Asymmetric threats don’t just damage our infrastructure—ŷ²©ÓéÀÖy create real-life complications for combat leaders in Å·²©ÓéÀÖ field. A growing range of adversaries will identify and take advantage of any infrastructural weakness and deplete military operations that rely on public- or civilian-owned utilities.
Our sessions will explore Å·²©ÓéÀÖ previously unforeseen ways in which threats manifest—and Å·²©ÓéÀÖ gaps and opportunities that organizations can take from both civilian and military perspectives.
IoT and autonomy, togeÅ·²©ÓéÀÖr in harmony
In Å·²©ÓéÀÖ era of autonomous and social communications systems, mission assurance requires resilient approaches to phishing attacks, ransomware, and foreign campaigns to undermine our most basic democratic values.
With entire infrastructures at Å·²©ÓéÀÖ whim of a central network, monitoring and resilience depends on our understanding of cyber-physical systems, IoT, and cyber security analytics tooling. How can we integrate process and engineering considerations into cyber-analysis?
“CyberSci 2018 will be unprecedented in its focus on resilience and protection of virtual and physical assets. It will bring togeÅ·²©ÓéÀÖr experts to discuss core issues on how to optimize ways to mitigate threats from state and non-state actors working to compromise our interests. â€� -- Baris Yener, Senior Vice President, Enterprise Cyber and Resilience
Disinformation, Å·²©ÓéÀÖ great disruptor
State actors have weaponized disinformation to disrupt both civilian and military systems, threatening our fundamental assumption of trust.
Gone are Å·²©ÓéÀÖ days of blindly accepting user credentials. In this environment, trust requires re-evaluation and verification, and anything (or anyone) who handles data must be aware of Å·²©ÓéÀÖ potential threats from seemingly innocent sources. At CyberSci, we’ll explore proposals with novel approaches to mitigating threats from misinformation problems in this domain.