US Cyber Command Begins A Strategic Review

The US Cyber Command is undergoing a significant review intended to update its organisation and  capabilities to make sure it  is positioned  to deal with threats in a highly dynamic environment. 

 The review, which US government officials are referring to as Cybercom 2.0, includes an expansion in size and scope with 14 new teams to be added over five years to the current 39 teams.

In particular, Cybercom's strategic focus will shift  from counter-terrorism and combating violent extremist organisations, to dealing with nation-state threats actors.

The outgoing commander General Paul Nakasone said, “As cyber threats to the nation have evolved, as technology has advanced at rapid pace, so too has Cyber National Mission Force, constantly evolving to meet the nation’s challenges in cyberspace, responding to major cyber-attacks, defending forward in every geographic theater, confronting and engaging the world’s most dangerous cyber actors, and defending the democratic processes of our nation.”

With hacktivist groups and cyber criminals increasingly exploit the Internet and social media for propaganda, fake news and offensive cyber activities, it seems the threat level can only escalate. 

Based on how the Ukraine war has reshaped how the military views the way cyber attacks are used during periods of armed conflict, Cybercom has shifted its focus toward nation state threats. Expanded operational size will provide Cybercom not only more capable teams to deploy quickly, but expand its global reach, able to operate in many different geographic areas simultaneously.  

Over the past two yeas, US agencies have been very active addressing some of the more state and non-state cyber threats the US faces and Cybercom has demonstrated a high level of capability in confronting adversaries in cyberspace.

With a larger team and stronger capabilities, US adversaries like China, Russia and Iran are likely to come under greater pressure from US offensive cyber activity than ever before and while the world may have suspected the United States conducts these types of offensive cyber missions, it is now public knowledge that it is doing so.

CyberCom:     CyberCom:     National Security Agency:     Oodaloop:       DefenseScoop:     

SSRN / Peter Patacsil:   

You Might Also Read: 

Cyber Operations In Wartime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Building A Cyber-Savvy Nation In The Face Of A Talent Shortage
Ten Ways To Elevate Public Sector Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

International Cybersecurity Forum (FIC)

International Cybersecurity Forum (FIC)

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.