The Road to Cyber Power
|
|
- Prudence Marshall
- 8 years ago
- Views:
Transcription
1 0 Presentation to the Norman Forde Hampton Roads Chapter of the Association of Former Intelligence Officers The Road to Cyber Power Cyber Age, Cyberspace, Cyberpower, Cybersecurity, Commercial/Goverment Action Christopher Newport University October 28, 2009
2 1 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
3 2 Over the last 250 years, waves of creative destruction emerge around the convergence of new technologies and organizational innovations Textiles, Canals and Machinery Steam, Coal, Iron and Rail Steel, Chemicals and Electricity Oil, Auto and Electronics Info and Com. Technology Age of Nano-Bio Tech and Robotics Agricultural Revolution ( ) % of GDP 1771 Canal Mania Railway Mania The Gilded Age Roaring 20s Internet Craze Nano Nonsense FIRST WAVE SECOND WAVE THIRD WAVE FOURTH WAVE FIFTH WAVE SIXTH WAVE ? 58 years 44 years 45 years 53 years 49 years 50 years Adapted from The Economist, Carlota Perez These waves create new industries, transform the underlying social and political-military systems, and create new sources and centers of power
4 3 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
5 4 The number of users and methods used to access cyberspace have grown exponentially in size, scope and complexity Exponential Growth New Technologies Global Adoption Growth in the developed world exploded over the last 20 years and will accelerate as a result of new technologies and reduced prices fueling the adoption of ICT in the developing countries Internet Users in China < 1 million 1.6 billion Internet Users 11 million 3 billion Cell Phones $100 laptops Miniaturized Smart Devices 111m 660m Petabytes 1600 Exobytes Digital Data 300, million Ubiquitous Wireless Networks Internet Hosts IP v6 Internet Users in India 21m 400m By 2020, there will be almost 3 billion internet users, driving massive new investments in infrastructure, technology, and new security architectures
6 ICT has transformed business models and warfighting, improving productivity and driving economic growth Massive Investment Mission Enablement Growing Vulnerabilities Industry and government invest $4t in ICT goods and services every year These investments have transformed business models and military operations while exposing substantial vulnerabilities and risks Computers $400b Finance: $3.2t per day in foreign exchange Hackers steal 40 million credit card numbers Software Servers Network Equipment $360b $60b $100b Health: Electronic Health Records Energy: 300k kilometers of lines carrying 3.8 b kilowatts per year E-Commerce: $200b in on-line sales Air Transportation: 741 million passengers per year Hackers steal 8.3 million Health Records Electricity grid in U.S. penetrated by spies Hackers break into FAA Air Traffic Control Systems Semiconductors $260b Defense: Network-Centric Operations However, greater dependence on ICT creates new vulnerabilities and risks for individuals, industry and government 5
7 6 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
8 7 Both the current and former administrations understood the importance of cyber to the nation, as evidenced by robust policy and budget actions Enable the Economy Empower Society Enhance Security Digital Health Goal: Interoperable Electronic Medical Records Funding: $20-50b (5 years) Agencies: HHS, DoD, and DVA Intelligent Transportation Systems Goal: Smart Highways and Air Traffic Systems (NGATS) Funding: $20-30b (20 years) Agencies: DOT, NASA, DoD Rural Broadband Goal: Expand Broadband Infrastructure Funding: $7.2b Agencies: Commerce/NTIA and Agriculture/Rural Utilities Service Digital Education Goal: Improve Education through better Performance Data Funding:??? Agencies: Dept. of Education, State and Local, Private Mission Enablement Goal: Network-Centric Operations Funding: $20-30b Agencies: DISA, Services, UCC Network Defense Goal: Protect.mil and.gov networks Funding: $20-30b Agencies: DISA, DHS, Services, UCC (Cyber Command) Smart Energy Grid Goal: Improve efficiency through better data Funding: $10b (? Years) Agencies: Dept. of Energy, NERC, Utility Companies Digital Government Goal: Improve Transparency and Accountability Funding: $??b (? Years) Agencies: EOP, OMB, Agencies Network Exploitation Goal: Improve Intelligence Collection Funding: $??b Agencies: Intelligence Community, DoD CNCI Financial Reform Goal: Improve Transparency of Financial Markets and Protect Networks Funding:??? Agencies: Treasury, SEC,CFTC, Federal Reserve Digital Television Goal: Maximize Spectrum Improve TV Services Funding:??? Agencies: FCC, Commerce Network Attack Goal: Create new Military Capabilities Funding: $??b Agencies: Intelligence Community, UCC
9 8 Despite the convergence of interests, an inherent tension exists between all three in regards to the means of securing cyberspace Access and Inclusion Innovation and Growth Security and Safety Understanding and addressing these key tension is key to realizing the full benefits of cyber while managing the risks
10 9 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
11 10 Cybersecurity needs a multidisciplinary approach addressing all levels international, domestic, and organizational - and all sectors civil society, business and government POLICY & GOVERNANCE (legal, regulatory, policy, strategy, authorities) LEADERSHIP & CULTURE (communication, incentives, human capital, training) International PLANNING & OPERATIONS (planning, info. sharing/collab., operations, lessons learned) TECHNOLOGY & STANDARDS (R&D, architecture, standards, solutions) MANAGEMENT & BUDGETING (planning, programming, budgeting, performance) National Organizational/Agency
12 11 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
13 12 Strategy: Cyber University will contain all the learning assets for staff who want to develop their cyber knowledge, skills, and abilities Cyber University is a tool to help develop staff, quickly and cost effectively, who are able to perform high-quality work for Booz Allen cyber clients Cyber University contains lists of all cyber related courses, cyber certifications (including preferred vendors), and universities with top cyber programs Learning roadmaps will be designed for key cyber roles so staff will have a clear path to follow to develop cyber skills Cyber University will track cyber certifications and will allow staff to show skill proficiency to quickly move through the roadmap
14 13 Navy: Is aligning commands, functions and people in an unprecedented manner to meet the mission requirements of Cyber, IO, Intel, Space, and NetOPS IOC after 1 Oct 09 Strategy in progress-governance for program, operations and people is a priority Over 3,000 people involved just at IOC Information Dominance Corps in design No major location migrations besides growth at TENTH Fleet build out at Ft Meade anticipated Navy Staff model will be function focused to break platform centric thinking/programming NAVCENT NAVEUR New Navy Cyber Forces l AIRFOR SUBFOR FLTCOM s NAVAF NAVSOUTH PACFLT NSW USFF TYCOM Embedded SME Support Man, Train, & Equip SURFOR M,T&E CNO NAVSOC N2/N6 DCNO Information Dominance DIRLAUTH NAVY Network Warfare Command OPCON New ADCON Fleet Operational Missions STRATCOM USCYBERCOM OPCON OPCON OPCON OPCON NCTAMS New NCDOC FLTCYBERCOM/ US TENTH FLT NIOCs/CTFs OPERATIONS NSA SCE NIOC SUITLAND (RDT&E) SPAWAR supporting Navy undertaking most wide reaching/and boldest alignment The Navy has taken the additional significant step to integrate the N2 (intelligence) and N6 (communications) staffs on the Navy Staff
15 14 USCYBERCOM Organization DISA Field Office (DFO) Director s s liaison to USCYBERCOM Forward-based at Fort Meade Target: 50% manning NLT 1 Oct 2009 DISA Support Element (DSE) Liaison between Joint Operations Center (JOC) and DISA Operations Shared Situational Awareness Embedded in JOC (24 x 7)
16 15 QUESTIONS? Shift Happens Video
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Dr. Starnes Walker Technical Director / CTO Fleet Cyber Command FLTCYBERCOM TENTH FLEET 1 Agenda Fleet Cyber Command (FCC) /10 th Fleet Introduction Technical
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationPrivacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
More informationArent Fox Telecommunications
Arent Fox Telecommunications Public Safety, Homeland Security and Defense Update August 2010 Vol. I The Arent Fox Telecommunications Group has a dedicated practice area focused on issues related to public
More informationGAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
More informationUpdate on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationStatement of James Sheaffer, President North American Public Sector, CSC
Statement of James Sheaffer, President North American Public Sector, CSC United States House of Representatives Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection,
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationTHE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationThe Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
More informationDISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationHow To Build A Cybersecurity Company
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
More informationTriangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
More informationSecurity Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
More informationBest of Breed Opinion
Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations (C&I) Division is part of one of
More informationDON Cybersecurity/Information Assurance Workforce Management
DON Cybersecurity/Information Assurance Workforce Management 23 March 2010 Chris Kelsall DON CIO, Director, Cyber/IT Workforce Steps to Transform IAWF Management Charter DON team to determine best approach
More informationSolarWinds Federal Cybersecurity Survey Summary Report
SolarWinds Federal Cybersecurity Survey Summary Report March 26, 2014 2014 Market Connections, Inc. BACKGROUND AND APPROACH 2 Background and Approach SolarWinds and Market Connections worked together to
More informationSecure SCADA Summit. Dan Mintz, CTO. Civil Health Services Group dmintz@csc.com. Twitter: technogeezer, December 2009
Secure SCADA Summit Dan Mintz, CTO Civil Health Services Group dmintz@csc.com Twitter: technogeezer, December 2009 For 50 years, CSC Has Helped Clients Ride Every Major Business- Driven Technology Wave
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationHow To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
More informationGOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationImprovements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
More informationCybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
More informationCyber Security Initiatives at the Federal Level & Technology Opportunities. Slide 1
Cyber Security Initiatives at the Federal Level & Technology Opportunities Slide 1 Assessing The Threat According to a hearing before the U.S.-China Economic and Security Review Commission: o Internet
More informationIntroduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
More informationDr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop
Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationGAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination
GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More information1. Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?
Name: Dong Liu Email: dongl@andrew.cmu.edu 1. Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why? In my opinion manufacturing
More informationPreface to the Fourth Edition
The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through
More informationDoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationService Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
More informationGuiding principles for security in a networked society
ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in
More informationMarine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
More informationArent Fox Telecommunications
Arent Fox Telecommunications Public Safety, Homeland Security and Defense Update September 2009 Vol. II The Arent Fox Telecommunications Group has a dedicated practice area focused on issues related to
More informationCyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
More informationfuture data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
More information( Increased usage of IP addresses )
IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems
More informationOperationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
More informationNetwork Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
More informationSTATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationFederal Cloud Computing Strategy
Federal Cloud Computing Strategy Vivek Kundra U. S. Chief Information Officer www.whitehouse.gov The Case for Change 90 Manufacturing Capacity Utilization 80 Manufacturing Average 79% 70 60 % Utilization
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
More informationAND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified
CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and
More informationToday s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
More informationU. S. Fleet Cyber Command / TENTH Fleet. Strategic Plan 2015 2020
U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 2020 U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 2020 Foreword New warfighting platforms do not spring full-grown from their
More information11-09-2013. Cyberspace Strategic Impact Social Risk Management. Cyber Security and Cyber Defence. Cyber Defense: NATO Vision
Agenda Cyberspace Strategic Impact Social Risk Management Cyber and Cyber Defence Cyber Defense: NATO Vision Cyber Strategic Concept Conclusions Seminar Cyber : An Action to Establish the Cyber Center
More informationSpace and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationThe Top Twenty Internet Security Vulnerabilities. and How To Get Rid Of Them
The Top Twenty Internet Security Vulnerabilities and How To Get Rid Of Them Agenda Technical Briefing on The Top 20 What damage and costs are enabled by these vulnerabilities? Best practice in eliminating
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationSTATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE
STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE BEFORE THE SENATE COMMITTEE ON APPROPRIATIONS CYBERSECURITY:
More informationCybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
More informationApril 10, 2009. Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms.
William B. Nelson President & CEO FS-ISAC 20496 Partridge Place Leesburg, VA 20175 703-777-2803 (Direct) 509-278-2412 (Fax) bnelson@fsisac.us www.fsisac.com April 10, 2009 Ms. Melissa Hathaway Acting Senior
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More informationPreventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
More informationProtect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies
Protect Your Assets Cyber Security Engineering Control Systems. Power Plants. Hurst Technologies Cyber Security The hackers are out there and the cyber security threats to your power plant are real. That
More informationHow SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
More informationSecuring the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationIndustrial Internet & Advanced Manufacturing
Industrial Internet & Advanced Manufacturing Marco Annunziata, Chief Economist April 08, 2014 Imagination at work. The Future of Work Advanced Manufacturing + The Industrial Internet + The Global Brain
More informationFlexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
More informationAT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
More informationCybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
More informationCYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security
More informationU.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO
U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW November 12, 2012 NASEO ISER Response: from site focused to system focused Emergency Preparedness, Response, and Restoration Analysis and
More informationThe DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
More informationIndustrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security Mike.spear@honeywell.com Responsible for the Global Delivery of Honeywell
More informationRay A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,
More informationResilient and Secure Solutions for the Water/Wastewater Industry
Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011
More informationChina s Economic Espionage
China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in
More informationOPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
More informationPowering Up the Network: A Report on Small Business Use of E-business Solutions in Canada
Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada February 2010 Overview Canada is a world leader in many areas: energy, natural resources and the financial services
More informationComments :Incentives To Adopt Improved Cybersecurity Practices
Comments :Incentives To Adopt Improved Cybersecurity Practices 1. Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?
More informationEvolution of Cyber Security and Cyber Threats with focus on Cloud Computing
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year
More informationSTATEMENT BY MR. CHRISTOPHER A. MILLER PROGRAM EXECUTIVE OFFICER DEFENSE HEALTHCARE MANAGEMENT SYSTEMS BEFORE THE
STATEMENT BY MR. CHRISTOPHER A. MILLER PROGRAM EXECUTIVE OFFICER DEFENSE HEALTHCARE MANAGEMENT SYSTEMS BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE INFORMATION TECHNOLOGY SUBCOMMITTEE AND
More informationDevelopment and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012
Development and Outlook of Internet of Things in China CATR of MIIT June 5, 2012 Contents I. Development of Internet of Things in China Main Contents II. Outlook of Internet of Things in China 2 IoT for
More informationRETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
More informationCYBER SECURITY. May 6, 2013
CYBER SECURITY May 6, 2013 Cyber Headlines: dramatic and numerous Burning up a generator on demand Staged cyber attack reveals vulnerability in power grid, CNN 09/26/2007 Georgia Takes a Beating in the
More informationNICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
More informationDISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
More informationRethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Rethinking Cyber Security We Now Have Years of Experience - Security
More informationWhat is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
More information(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
More informationBlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
More informationCompliance, audit, risk, security what s the difference and why do we need it?
Compliance, audit, risk, security what s the difference and why do we need it? Presented By: Sandy Bacik, Principal Consultant Agenda Defining compliance, audit, risk, and security What is the difference
More informationSubject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
More informationAPPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
More informationGlobal Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
More information