Critical Infrastructure in a CyberPhysicalHuman World
|
|
- Scarlett Caldwell
- 8 years ago
- Views:
Transcription
1 Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited The MITRE Corporation. All rights reserved.
2 Chris Folk, MBA, Director, National Protection Division- The MITRE Corporation 2 MITRE is: A private, independent, not-for-profit organization, chartered to work in the public interest MITRE manages and operates 7 FFRDCs to include the Homeland Security Systems Engineering and Development Institute (HSSEDI) for DHS Primary contributor to a number of Homeland Security related cybersecurity thought leadership, strategies and publications, including: Enabling Distributed Security in Cyberspace - Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action, published by DHS in 2011; The PROTeX series; 2012 and 2013 ; The Security Implications of the Internet of Things (AFCEA) 2015; MITRE Blog series on The CyberPhysicalHuman World of Homeland Security MITRE 2015; a Comprehensive and sustained National Education and Awareness Campaign for Cybersecurity (AFCEA) 2015 Advisor to Washington Cyber Roundtable, member AFCEA Cyber Committee; lead for Corporate Critical Infrastructure Security & Resilience (CISR) Strategy, lead for civil cybersecurity programs. Speaks regularly at national and international cyber and homeland security events.
3 Welcome to a Cyberphysicalhuman world! 3
4 Many Definitions Internet-of-things (IOT) NSTAC: An expansion of the global infrastructure through existing and evolving interoperable information and communication technologies. It incorporates the interconnection of physical and virtual systems to enable new and autonomous capabilities. IEEE: The IOT is a selfconfiguring and adaptive system consisting of networks of sensors and smart objects whose purpose is to interconnect all things, including every day and industrial objects, in such a way as to make them intelligent, programmable and more capable of interacting with humans. IETF: The IOT refers to the networked interconnection of everyday objects. An "IoT" means "a world-wide network of interconnected objects uniquely addressable, based on standard communication protocols" Gartner: The IOT is the network of physical objects that contains embedded technology to communicate and sense or interact with the object s internal state or the external environment Industrial Internet (II) GE: New ways of connecting the world s myriad of machines, facilities, fleets and networks with advanced, sensors, controls and software applications; harnessing the power of physics-based analytics, predictive algorithms, automation and deep domain expertise in material science, electrical engineering and other key disciplines required to understand how machines and larger systems operate; and connecting people, whether they be at work in industrial facilities, offices, hospitals or on the move at any time to support more intelligent design, operations, maintenance as well as higher quality service and safety. Internet-of-everything (IOE) CISCO: Brings together people, process, data, and things to make networked connections more relevant and valuable than ever before-turning information into actions that create new capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries. Allseen Alliance: The IOE is based on the idea that devices, objects and systems can be connected in simple, transparent ways to enable seamless sharing of information across all of them. Cyber physical systems (CPS) NIST: Cyber-Physical Systems or smart systems are coengineered interacting networks of physical and computational components. These systems will provide the foundation of our critical infrastructure, form the basis of emerging and future smart services, and improve our quality of life in many areas. 4
5 5 Common Themes Smart, connected systems used by people and organizations to operate and manage their lives and business Integration of the physical and computational in order to monitor and control physical processes
6 Why should we care? 6 IDC predicts by 2020 More data and information at risk for compromise Gartner predicts govt. and industry will, fail to protect 75% of sensitive data Cyber attacks can have physical impacts
7 7 What should we do? Resilient Infrastructure Traditional confidentiality, availability and integrity concerns are still important. We must also consider safety and reliability in an integrated, holistic way to develop resilient infrastructure Worry less about definitions, worry more about functions and uses. Are you using your smart phone to order take-out food? Are you using your smart phone to control your home security system? Are you using your smart phone to manage and monitor physical infrastructure? We need more rigorous design, development and assurance regimes for devices that can put human health and safety, national security, and critical infrastructure at risk
8 8 What should we do? Resilient Regions Foundational Precepts Every region should understand its own resilience Resilience includes three main areas: planning, preparedness, and prevention; mitigation during events; and response and recovery. Resilience should be addressed in a comprehensive cyberphysical manner. What Regions are Looking For Stakeholder information sharing opportunities Situational awareness for major incidents Regional Decision Support tools Regional Integrated Cyber- Physical Risk Assessments
Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )
Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket
More informationEL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
More informationStandard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014
Standard for an Architectural Framework for the Internet of Things IEEE P2413 Chuck Adams Past-President IEEE Standards Association Distinguished Standards Strategist Huawei Technologies IEEE GlobeCom
More informationAutonomic IoT Systems Realizing Self-* Properties in IoT Systems
Autonomic IoT Systems Realizing Self-* Properties in IoT Systems Noor Bajunaid nbajunai@masonlive.gmu.edu CS 788 Fall 2015 1 IoT and CPS The internet of things is known as giving any object the ability
More informationNational Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
More informationNational Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair Victoria.yan@nist.gov 1 The National Institute of Standards
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
More informationCybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com jrobles@coqui.net 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
More informationCyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
More informationCybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
More informationCybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards
More informationRISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0%
RISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0% Overview The economic competiveness and societal well-being of the United States depend on the affordability, availability, quality, and reliability
More informationThe Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
More informationNIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
More informationCyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
More informationSome Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More informationSystems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things
Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Mac Devine CTO, IBM Cloud Services Division IBM Distinguished Engineer wdevine@us.ibm.com twitter: mac_devine Forecast for
More informationDepartment of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
More informationCyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record
Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationEffective Information Sharing and Analysis Process
Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting
More informationTHE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG DATA ANALYTICS SCOPING REPORT July 20, 2015 DRAFT THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationAttn: Cybersecurity RFC 2015, Request for Comment on Stakeholder Engagement on Cybersecurity in the Digital Ecosystem
May 27, 2015 Allan Friedman National Telecommunications and Information Administration U.S. Department of Commerce 1401 Constitution Ave, NW Room 4725 Attn: Cybersecurity RFC 2015 Washington, DC 20230
More informationTestimony of. Wm. Douglas Johnson. American Bankers Association. Subcommittee on Information Technology
Testimony of Wm. Douglas Johnson On behalf of the American Bankers Association before the Subcommittee on Information Technology of the Committee on Oversight and Government Reform United States House
More informationPreventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
More informationFFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
More informationAvailable online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7
Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 38 (2015 ) 3 7 The Fourth International Conference on Through-life Engineering Services Industrial big data analytics and cyber-physical
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationCybersecurity for Medical Devices
Cybersecurity for Medical Devices Suzanne O Shea Kathleen Rice January 29, 2015 Why Is This Important? Security Risks in the Sensors of Implantable Medical Devices Over the last year, we ve seen an uptick
More informationCyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
More informationcyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman
More informationCreating business outcomes for Building Operators with the Internet of Things
Creating business outcomes for Building Operators with the Internet of Things Vertical case studies from Dubai Siemens Building Technologies IoT World Forum 2015, Dubai siemens.com Siemens Digitalization
More informationAT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
More informationWireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids
Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu 06/26/2014 Outline Background
More informationReport: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationIT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities
IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services
More information2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1
2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow JOIN THE CYBERSECURITY EDUCATION AND FRAMEWORK AWARENESS CAMPAIGN
More informationIndustrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
More informationCapabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
More informationFFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
More informationStandardizing the Internet of Things; Boiling the Ocean
Standardizing the Internet of Things; Boiling the Ocean Jim Sinopoli, PE, LEED AP Smart Buildings LLC By now, we all know the basics of the Internet of Things (IoT). Everything will be connected to every
More informationBig Data Driven Knowledge Discovery for Autonomic Future Internet
Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,
More informationCybersecurity. Franck Greverie. Analyst Day Paris, 28 May 2015
Cybersecurity Franck Greverie Analyst Day Paris, 28 May 2015 Disclaimer This presentation does not contain or constitute an offer of securities for sale or an invitation or inducement to invest in securities
More informationLessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
More informationWhat is Management Responsible For?
What is Management Responsible For? Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf & Company, P.C Regional
More informationCloud Executive Perspective January 2015 CLOUD EXECUTIVE PERSPECTIVE. Cloud Computing. Changing the Role and Relevance of IT Teams.
Cloud Executive Perspective January 2015 CLOUD EXECUTIVE PERSPECTIVE Cloud Computing Changing the Role and Relevance of IT Teams January 2015 1 Empowering IT to Meet Today s Priorities The Internet of
More informationThe Aviation Information Sharing and Analysis Center (A-ISAC)
The Aviation Information Sharing and Analysis Center (A-ISAC) Faye Francy Aviation ISAC March 2015 The Threat A National Security Issue Rapidly escalating cyber threats Executive action Executive Order
More informationCybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
More informationTHE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE. NSTAC Report to the President on the Internet of Things
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC Report to the President on the Internet of Things November 19, 2014 TABLE OF CONTENTS EXECUTIVE SUMMARY... ES-1 1.0 INTRODUCTION...
More informationCYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
More informationTestimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
More informationISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
More informationOperational security for online services overview
Operational security for online services overview Microsoft Trustworthy Computing October 21, 2013 Trustworthy Computing Operational security for online services overview Legal disclaimer This document
More informationHow To Be Prepared For A Cybercrime
Cybersecurity and the Internet of Things June 2015 What is the Internet of Things? Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The
More informationConnected Manufacturing
Connected Manufacturing The Internet of Things: Connecting the Unconnected Robert Dean, Executive Director, Business Transformation, Manufacturing Industry May 14, 2015 The Internet of Everything (IoE)
More informationPACB One-Day Cybersecurity Workshop
PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance
More informationExamining the Evolving Cyber Insurance Marketplace
Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,
More informationCombining the Virtual and Physical Worlds
Combining the Virtual and Physical Worlds Innovation at Siemens Press and analyst event,, Corporate Technology siemens.com/innovation Siemens solutions combine Digitalization with Automation and Electrification
More informationNSTAC Report to the President on the Internet of Things DATE: TBD DRAFT
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC Report to the President on the Internet of Things DATE: TBD DRAFT TABLE OF CONTENTS EXECUTIVE SUMMARY... ES-1 1.0 INTRODUCTION...
More informationCaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationIndustrial Internet of Things - Transformation of Products to Services and new Business Models. Frank Schinzel Managing Director Accenture Digital
Industrial Internet of Things - Transformation of Products to Services and new Business Models Frank Schinzel Managing Director Accenture Digital Everyday physical objects are becoming uniquely identifiable
More informationCritical Infrastructure
Critical Infrastructure Long-term Trends and Drivers and Their Implications for Emergency Management June 2011 Overview The state and nature of infrastructure is likely to change over the next several
More informationCyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
More informationApril 10, 2009. Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms.
William B. Nelson President & CEO FS-ISAC 20496 Partridge Place Leesburg, VA 20175 703-777-2803 (Direct) 509-278-2412 (Fax) bnelson@fsisac.us www.fsisac.com April 10, 2009 Ms. Melissa Hathaway Acting Senior
More informationTestimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
More informationADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D Eric Lightner Director Federal Smart Grid Task Force July 2015 2 OE Mission The Office of Electricity
More informationInternet of Things Value Proposition for Europe
Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationCybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
More informationStatement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T. United States House of Representatives
Statement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T Hearing: DHS s Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure United States House
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary
More informationHow SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
More informationEngineering Update November 2014
November 2014 PURPOSE AND AUDIENCE This document provides an update to Engineering: The First Steps published in July 2014. This document has the same audiences: Members: What is happening in the engineering-related
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationhigh performance solutions for a connected world
GE Intelligent Platforms delivers high performance solutions for a connected world Mark Pipher GM, Real Time Operational Intelligence Sources: 1. Wall Street Journal, 11/2/11; 2. More than 50 billion connected
More informationDHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response
February 2015 DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response Cyber Security Advisor Program Office of Cybersecurity & Communications National Protection
More informationTestimony of. Cita M. Furlani Director
Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce Joint Hearing Before the United States House
More informationPrivacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
More informationThe Internet of Everything Global Private Sector Economic Analysis
The Internet of Everything Global Private Sector Economic Analysis Value at Stake is the potential bottom-line value that can be created, or that will migrate among companies and industries, based on their
More informationNATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security
1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West
More informationWhere We Are Today The Current Landscape of Identity Management Duane Blackburn, MITRE Corporation 18 September 2012
BIOMETRIC CONSORTIUM CONFERENCE AFCEA IDENTITY MANAGEMENT FOCUS SESSIONS Where We Are Today The Current Landscape of Identity Management Duane Blackburn, MITRE Corporation 18 September 2012 Approved for
More informationFactories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation
Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation Directorate General for Communication Networks, Content and Technology FoF PPP in Work Programme 2016-2017 FoF-11-2016:
More informationAGENDA ITEM: B2. RSSB Board Meeting Final: 08 May 2014 Page 1 of 3. November 2011
MEETING: RSSB Board Meeting DATE: 08 May 2014 SUBJECT: Cyber security SPONSORS: Anson Jack and Gareth Llewellyn AUTHORS: Tom Lee and Peter Gibbons 1. Purpose 1.1 This paper has been prepared jointly by
More informationTestimony of. Kevin Stine. Leader, Security Outreach and Integration Group. Computer Security Division. Information Technology Laboratory
Testimony of Kevin Stine Leader, Security Outreach and Integration Group Computer Security Division Information Technology Laboratory National Institute of Standards and Technology United States Department
More informationChanging Legal Landscape in Cybersecurity: Implications for Business
Changing Legal Landscape in Cybersecurity: Implications for Business Presented to Greater Wilmington Cyber Security Group Presented by William R. Denny, Potter Anderson & Corroon LLP May 8, 2014 Topics
More informationTransformational Smart Cities: cyber security and resilience
We protect the world s people and information Transformational Smart Cities: cyber security and resilience Towards the century of smart cities Executive Report Overview Giampiero Nanni Public Sector Strategy
More informationThe Internet of Things:
The Internet of Things: What Does it Take to Make the Internet of Everything Real? Kip Compton, VP Internet of Things (IoT) Systems and Software Group @kipcompton www.linkedin.com/in/kipcompton/en Are
More informationFull-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
More informationNational Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009
National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in
More information