NEWPORT, R.I. - The Naval War College's Dr. Chris C. Demchak, spoke at the International Institute for Strategic Studies in London on July 15, 2010, on “The Assertion of Sovereignty in Cyberspace: Formation of Cyber Commands.”
Audio of the remarks are available online HERE
This discussion was moderated by Nigel Inkster, Director of Transnational Threats and Political Risk.
Dr Chris C. Demchak received her PhD from Berkeley in political science with a focus on organization theory, security, and surprise in complex technical systems across nations. She also holds two masters degrees, respectively, in economic development (Princeton) and energy engineering (Berkeley).
She has published numerous articles on societal security difficulties with large-scale information systems to include cyberwar and cyber privacy, security institutions and new military models, as well as a book entitled Military Organizations, Complex. An early member of the Intelligence and Security Informatics (ISI) research field, Dr. Demchak has taught courses on, among others, the emerging global information systems, and the worldwide diffusion of defense technologies to include the use of game-based simulations in security analysis.
A former US Army Reserve officer, Dr. Demchak has recently completed a book length manuscript entitled Cyberpower, Disruption, and Resilience: Lessons of History and Complexity for Strategy in Globalized Cybered Conflicts now under contract at an established academic press, as well as co-editing and contributing to a forthcoming volume of research entitled Designing Resilience.
Dr. Demchak moved to take a position with the Strategic Research Department of the US Naval War College in July 2009. She is currently working on a book manuscript entitled tentatively Cybercommands: National Responses to Uncertainty and Cybered Conflict. Her research focus is the evolution in organizations, tools, social integrations, and range of choices emerging in westernized nations’ cybersecurity/deterrence strategies, creations or adaptations of cybercommands or equivalents, and institutionalized organizational learning after experiences with cybered confrontations or attacks.
Source: The International Institute for Strategic Studies