The document discusses cyber defense preparedness and surviving cyber war. It outlines 5 levels of cyber defense conditions ranging from travel warnings to nation-state attacks intended to destroy infrastructure. It also discusses the threat hierarchy from information warfare to cybercrime and hacktivism. Recommendations are made to appoint a cyber security commander and implement defense in depth to survive cyber attacks.