US Department of Defense Strategy for Operating in Cyberspace
Download Your Copy
We respect your privacy, by clicking "Download Your Copy" you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts,
online learning opportunities and agree to our User Agreement. You have the right to object . In addition, you agree to having your details
further information on how we process and monitor your personal data click
You can unsubscribe at any time.
The Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity – the security of the technologies that we use each day. Moreover, the continuing growth of networked systems, devices, and platforms means that cyberspace is embedded into an increasing number of capabilities upon which DoD relies to complete its mission. Today, many foreign nations are working to exploit DoD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DoD’s information infrastructure. Moreover, non-state actors increasingly threaten to penetrate and disrupt DoD networks and systems. We recognize that there may be malicious activities on DoD networks and systems that we have not yet detected.