The prospect of cyberwar means the U.S. needs to 'rethink every aspect of defense,' says one summit presenter Government planning scenarios to prevent cyber-terrorist attacks, legal elements of cyber warfare and future cyber challenges will be among the key topics of discussion at a training conference titled the Cyber Warfare & Security Summit on June 25-27 in Arlington, Virginia.The speakers’ panel at the summit, presented by The Institute for Defense and Government Advancement (IDGA), will include:Brigadier Gen. Michael Stone of the Michigan National GuardMark J. Morrison, defense intelligence officer at the Cyber Directorate for Analysis, DIAKevin Highfield, U.S. Army electronic warfare analystScott Borg, CEO of the Cyber Consequences UnitRandy Bachman, cyber security technical lead at the Federal Communications CommissionCurtis Levinson, cyber defense subject matter expert and U.S. liaison to NATO, andRoger W. Kuhn, science adviser, Fleet Cyber Command/Commander, 10th Fleet.Day One of the summit will focus on what IDGA calls “The Human Capital Crisis in Cyber Security” — the competition among militaries around the globe to “recruit the best computer specialists.”“If the U.S. gets the best people for its Cyber and Strategic Commands and all other institutions currently working within the field, then the cyber threat can only be transformed to an economic advantage and to a cyber opportunity,” IDGA says. In addition to 20 keynote and training sessions, there are a number of topics related to the transformation of warfare from physical to cyber space. A presentation by Scott Borg is titled, “Replacing industrial defense thinking with cyber defense thinking.”In an interview with IDGA’s Chris Archer, Borg says the prospect of cyberwar means the U.S. needs to “rethink every aspect of defense.” Our current weapons and defense systems will still be needed, but the way we use them will become very different. As other cybersecurity experts have noted, Borg says, “A major cyber assault could completely bypass our military forces. It would not require incoming airplanes, missiles, ships, or troops. The attack could suddenly appear inside the computerized equipment of our major industries.”“The identity of the country or organization that was responsible could be impossible to determine quickly or with complete confidence. ]It] could cause almost any kind of damage that could be produced by the human operators of computerized equipment,” Borg says.The targets of such attacks have also been under discussion in the cybersecurity community and are the focus of about a half-dozen bills pending in Congress. Borg notes that a cyberattack “could physically destroy or sabotage electrical generation stations, refineries, pipelines, banking systems, railroad switches, flight control centers, chemical plants, hospital equipment, and water and sanitation facilities.”And the economic and physical damage, he says, “could surpass any other kind of assault, except for a nuclear one.”“Thousands of people could be killed immediately by explosions, leaks of toxic chemicals, airplane crashes, train crashes, and wrong medical treatments,” Borg says. “Hundreds of thousands could be caused to die over the months to come as a result of famine, disease, loss of heating or cooling, and the general deprivations and social breakdowns resulting from people no longer being supplied with the necessities of life.”The biggest challenge, Borg says, is keeping up with the rapidly evolving threats. “Extrapolating a past cyberattack trend into the future is of little use,” he says, adding that this makes government-mandated security standards of little use. “By the time cybersecurity standards have been defined and are being imposed, they will not only be obsolete; they will often be an impediment to implementing the security measures that are most necessary,” he says. Among other sessions: A data-driven approach to detecting advanced persistent threats; Enhancing the security of the network infrastructure; Convergence of cyber warfare and electronic warfare; The attribution problem with cyber attacks and; The challenge of international law frameworks in response to the threat of cyber warfare.To register, go to http://bit.ly/KIFNce. Related content feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Intrusion Detection Software Intrusion Detection Software feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe