US Cyber Command Begins A Strategic Review

The US Cyber Command is undergoing a significant review intended to update its organisation and  capabilities to make sure it  is positioned  to deal with threats in a highly dynamic environment. 

 The review, which US government officials are referring to as Cybercom 2.0, includes an expansion in size and scope with 14 new teams to be added over five years to the current 39 teams.

In particular, Cybercom's strategic focus will shift  from counter-terrorism and combating violent extremist organisations, to dealing with nation-state threats actors.

The outgoing commander General Paul Nakasone said, “As cyber threats to the nation have evolved, as technology has advanced at rapid pace, so too has Cyber National Mission Force, constantly evolving to meet the nation’s challenges in cyberspace, responding to major cyber-attacks, defending forward in every geographic theater, confronting and engaging the world’s most dangerous cyber actors, and defending the democratic processes of our nation.”

With hacktivist groups and cyber criminals increasingly exploit the Internet and social media for propaganda, fake news and offensive cyber activities, it seems the threat level can only escalate. 

Based on how the Ukraine war has reshaped how the military views the way cyber attacks are used during periods of armed conflict, Cybercom has shifted its focus toward nation state threats. Expanded operational size will provide Cybercom not only more capable teams to deploy quickly, but expand its global reach, able to operate in many different geographic areas simultaneously.  

Over the past two yeas, US agencies have been very active addressing some of the more state and non-state cyber threats the US faces and Cybercom has demonstrated a high level of capability in confronting adversaries in cyberspace.

With a larger team and stronger capabilities, US adversaries like China, Russia and Iran are likely to come under greater pressure from US offensive cyber activity than ever before and while the world may have suspected the United States conducts these types of offensive cyber missions, it is now public knowledge that it is doing so.

CyberCom:     CyberCom:     National Security Agency:     Oodaloop:       DefenseScoop:     

SSRN / Peter Patacsil:   

You Might Also Read: 

Cyber Operations In Wartime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Building A Cyber-Savvy Nation In The Face Of A Talent Shortage
Ten Ways To Elevate Public Sector Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.