Understand Cyber Security
Understand Cyber Security
Find out what you're up against and why it matters.  
Understand Dominance
Understand Dominance
Learn how to dominate; control your fate.
Achieve Cyber Dominance
Achieve Cyber Dominance
Cyber Security + Dominance = Cyber Dominance

Core Concepts

Cyber Security Fundamentals

Cyber Creativity

General Dominance Theory

Cyber Dominance Theory

Understand Dominance. Understand Cyber.

Cyber
Cyber Dominance
Dominance
The Do’s and Don’ts of Cyber Leadership

The Do’s and Don’ts of Cyber Leadership

Cyber Warfare: The Human Dimension with Meaghan Murray

Cyber Warfare: The Human Dimension with Meaghan Murray

Ukraine as a NATO Centre of Excellence: Information Warfare

Ukraine as a NATO Centre of Excellence: Information Warfare

Achieve Cyber Dominance: The Six Critical Controls

Achieve Cyber Dominance: The Six Critical Controls

Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

How to Encrypt Your Email for Free

How to Encrypt Your Email for Free

Humans vs Cyber Security Tools.  Which one serves the other?

Humans vs Cyber Security Tools. Which one serves the other?

General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

CyberDominance.com Launches Cyber Perception Center

CyberDominance.com Launches Cyber Perception Center

Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Achieving Cyber Dominance

Affect Reality
Control your assets and your networks; be able to change when you need to change.
Collect Information
Collect information about your cyber reality; monitor your assets, networks, and adversaries.
Synthesize Information
Transform information into knowledge of where you stand and your adversary's actions and plans.
Deny Adversary: Affect Reality
Your adversary wants to be able to affect and use the Cyber Domain.  Don't let him.
Deny Adversary: Collect Information
Your adversary is more effective when they know what your are doing now and what you will do next.
Deny Adversary: Synthesize Information
Ensure your adversary can't transform the information he collects into actionable knowledge.

Some Numbers

99
Millions of Identity Theft Victims Each Year
99
Social security numbers stolen from IRS in 2015
99
Average Ransomware Demand in Dollars
99
Millions of Dollars Paid by Ransomware Victims in Q1, 2016

Latest Articles

The Do’s and Don’ts of Cyber Leadership
December 3, 2018
When leading elite cyber operators, there are some things you should do - and some things you should never do.  Here are some of the basics.
Cyber Warfare: The Human Dimension with Meaghan Murray
November 26, 2018
An Econ major’s approach to, and experience thriving in, the world’s most elite cyber unit.  Identify, win trust, and lead the highly-technical workforce without being technical.
Ukraine as a NATO Centre of Excellence: Information Warfare
November 13, 2018
In response to Russia’s increasingly aggressive actions, NATO ought to expedite the Ukraine’s application for member status and, simultaneously, the Ukraine ought to open up an Information Warfare Centre of Excellence in the Ukraine.
Achieve Cyber Dominance: The Six Critical Controls
November 5, 2018
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls of Cyber Dominance Theory.

Contact Us

  • Email: inquiry@cyberdominance.com