Robert F. Brammer, Ph.D. President and CEO, Brammer Technology, LLC ACSC Strategic Consultant

Size: px
Start display at page:

Download "Robert F. Brammer, Ph.D. President and CEO, Brammer Technology, LLC ACSC Strategic Consultant"

Transcription

1 Launch Conference September 20, 2011 William H. Guenther President and Founder, Mass Insight Global Partnerships Robert F. Brammer, Ph.D. President and CEO, Brammer Technology, LLC ACSC Strategic Consultant An Initiative of 18 Tremont Street, Suite 930 Boston, MA

2 The New England Goal The New England region is committed to be a global leader in confronting current and future cyber security challenges and to reinvigorate Route 128 to be the national cyber security beltway. From the White Paper Executive Summary produced on behalf of the ACSC and the five university members of the Massachusetts Green High Performance Computing Center (Boston University, Harvard, MIT, Northeastern, UMass) Advanced Cyber Security Center 2

3 New England Cyber Security: The Benchmarks First Adopter for Leading Edge Security Practices and Technology: Industry, Universities, Government National/Global Player in R+D and Education The leading university research center A major corporate IT/cyber security R+D and industry location The #1 choice for students based on academic programs and industry internships/work-study Advanced Cyber Security Center 3

4 IT-Cyber Security in New England: An Economic Opportunity and a Challenge Global cyber security business grows: an $80 billion market by 2017, estimated by Global Industry Analysts MA ITCD* the state s major sector: 300,000 jobs, 10% of employment, GSP 15%. With a strong security group led by RSA. Global IT/security users headquartered in New England: Financial services, defense, utilities, healthcare, universities Leading national research universities in all aspects of cyber security (although assets are fragmented and Carnegie-Mellon has the brand) The bottom line: In the 1970s, Silicon Valley and Route 128 were the same size. Time to choose opportunities to leap frog. *IT, Communications, Defense sector Advanced Cyber Security Center 4

5 The Economic Development Strategy: Build up talent/r&d clusters, jobs follow* Talent clusters are concentrated geographic pools of talent focused on a particular technology or specialized discipline (e.g. Route 128=networking engineers). Proximity still matters Critical mass is important Clusters need stars and supporting talent fueled by higher education Networking/connecting mechanisms are critical to develop a mature cluster * Assuming competitive costs and attractive business climate. Advanced Cyber Security Center 5

6 Flagship R&D Centers: A Pre-Competitive Paradigm Industry-University-Government Partnerships Networking, bundling, brokering talent and ideas. Bridging space for the three partners. Advanced Cyber Security Center 6

7 Industry-University-Government Partnerships The Innovation Timeline 6 MOS-2 YRS 2-7 YRS 7-20 YRS Commercial Development Technology Development & Demonstration Projects Discovery Short-term Funding: Industry IP: Proprietary Mid-range Multi-party, pre-competitive Funding: Government and Industry IP: Open or shared Long-term Funding: Government and Philanthropic IP: Nonproprietary Advanced Cyber Security Center 7

8 The Advanced Cyber Security Center The Advanced Cyber Security Center is a cross-sector collaboration organized to help protect the region s organizations from the rapidly evolving advanced and persistent cyber threats and to support New England s role as a center for cyber security R+D, education, talent and jobs. Advanced Cyber Security Center 8

9 Advanced cyber threats: Collaboration is key - no single organization can respond effectively Attacks are increasingly sophisticated The APT* will customize their malware to target each specific organization Malware is continually updated to ensure that it cannot be easily detected (Mandiant 2010) 56% of breaches require months to years to contain. (Verizon 2010 Data Breach Report) Interviews with ACSC Members Unlike most firms, we re configured so we can see where traffic is coming from and we re seeing a lot more attacks in the last six months that look like they re coming from state-sponsors. We watch these attackers and we know them. Some are very fast moving If you lose track of them in your system you can lose them for months, if not forever. Current solutions are not adequate 16% of breaches are discovered via active, deliberate detection. (Verizon) Only 24% of APT malware is detected by an anti-virus solution. (Mandiant 2010) There are plenty of security solutions available. The problem is that they all focus on one thing. To deal with today s attackers, It s imperative to look across the stack & connect the dots This is hard. We need to figure out how to do it. We are not keeping pace with attacker innovations. Organizations want to increase the sophistication of their employees & solutions the value of monitoring (perhaps we should say mining ) logs cannot be overstated. The signs are there; we just need to get better at recognizing them. (Verizon 2010 Data Breach Report) We contract out & have a pretty rich array of security services. What we need is to cultivate the investigative mindset of our staff. That will be key to improving our ability to detect and block. We are in reactive mode. We need to think much more creatively and develop proactive approaches Breaches are not acceptable. We need to anticipate the attacker and there s no reason why we can t. APT : Advanced Persistent Threat is the label applied to the most serious and complex cyber attackers. They are professionals and may be state-sponsored. 9

10 A New Hybrid Paradigm: ACSC and Existing Collaborations Actionable US CERT NCFTA DoD DC3 ISACs (esp. FS) Gap in addressing present and future APT with actionable guidance Legend Cross-sector Sector-specific Academic APT Focus BITS SANS (ISC) NSTAC CSOOnline DarkReading Financial Services Technology Consortium Informational Computer Security Research Center Vulnerability Databases: MITRE Open Source NIST CyLab (Carnegie Mellon) Dartmouth Johns Hopkins Purdue University of Texas, Austin Time Horizon Known threats RT / Unfolding Threats New, emerging threats Advanced Cyber Security Center Mass Insight Global Partnerships * ACSC Business Plan 10

11 ACSC: Strengthening short term defenses & longer term capability The ACSC will deliver actionable intelligence to bolster an organization s defenses in the short term and generate new defensive strategies and R+D in the longer term. What Near Term Results Medium Term Results Longer Term Results Front Line Analytics Identify new attack vectors Create new threat indicators New Predictive Analytics Development Predictive analytics to anticipate attack innovations Research & Development Develop longer term innovations & defensive capability How Baseline current organizational capability for assessing attacking Evaluate data from attacks & breaches Examine malware Apply predictive analytic techniques to anticipate new attack approaches (forensics, financial modeling etc.) Leverage results of analytics to develop new approaches, technical solutions to deterrence Who ACSC Staff Lead + Support Member front line staff ACSC Staff Lead + Support Data modeling experts Strategic Staff Research Collaborators Data & Information Sharing Advanced Cyber Security Center 11

12 ACSC: Serving the Whole Organization Executive Management Cultivating and delivering organizational success Operating Divisions and Business Line Managers Growing lines of business Recognition of the cyber threat and how to protect the business Technical Development and Systems Teams Understanding best practices for building secure systems Developing new solutions that improve business systems and security Chief Information Security Officer & Security Team Designing, implementing & assessing enterprise information security strategy approaches Establishing trusted connections with leading security experts in the region Leveraging the full breadth of the ACSC Risk Officers Balancing probabilities Improving understanding of the risks and mitigation approaches posed by the advanced cyber threat Operations & Systems Security Experts the front line staff Identifying new techniques Cultivating the talents and skills Marketing & Communications Reinforcing the Brand Demonstrating the commitment to protecting customers Leadership in a nascent area that will grow in importance Human Resources Delivering on the current and future talent needs Improving the strength of cyber security talent Mass Insight Global Partnerships * ACSC Business Plan Advanced Cyber Security Center 12

13 ACSC: Regional and National Networks Regional Leadership National Outreach National Cyber Security Framework Connecting to the national security resources: Department of Homeland Security Office of the Director of National Intelligence Department of Defense DoJ/ FBI Broader Business Community Expanding awareness Sharing insights Advanced Cyber Security Center Hosted by MITRE Collaborating to combat the most advanced cyber threats: Expanding organizational capability Improving defenses Addressing gaps in cyber security Defense Financial Services Utilities Education Government, Healthcare FFRDCs & Research Centers & Hanscom Air Force Base Educational Institutions Links to Other Regions Cultivating the next generation of talent Designing breakthroughs in solutions and approaches Security Collaboratives and academic centers Professional Services Industry Suppliers Technology Community Fostering innovation Mass Insight Global Partnerships * ACSC Business Plan Advanced Cyber Security Center 13

14 ACSC Members and Partners Charter Members: Blue Cross Blue Shield of Massachusetts Commonwealth of Massachusetts CSC Draper Laboratory Federal Reserve Bank of Boston Fidelity Investments Foley Hoag John Hancock Financial Services Liberty Mutual Group MIT Lincoln Laboratory Northeast Utilities* NSTAR Electric & Gas Corporation* Partners HealthCare System Inc. RSA/EMC Corporation State Street Corporation The MITRE Corporation University of Massachusetts Veracode *Founding member. Membership pending merger completion. Special Members: Lincoln Laboratory, M.I.T. Federal Reserve Bank of Boston Higher Education Partners: Babson College Boston University Brandeis University Harvard University Middlesex Community College MIT Northeastern University Tufts University University of Massachusetts Worcester Polytechnic Institute Advanced Cyber Security Center 14

15 ACSC Governance & Organization: Phase I Launch Strategic Advisory Board Steering Committee Oversight and strategic direction Meet 4x annually Program priorities Operating direction ACSC members, IT executives Mass Insight and Staff Policy/Legal Work Group Establish legal entity and agreements Leaders in shaping national policies to improve defenses and support collaborations Release policy recommendations to be shared in DC Jack Goldsmith, Harvard University Law School; Michele Whitham, Foley Hoag (co-chairs) Threat Evaluation/Data Sharing Work Group Assessments and reports from Technical Staff collaborations Improve staff skills Introduction of new tools and services to aid in threat evaluation and response strategies External communication of results to business community and government partners Matt Richard, Bruce Bakis, The MITRE Corporation (co-chairs) Industry-Education Work Group Ongoing review of federal and industry priorities, funding and collaborative R+D project opportunities Develop internships and co-op/work-study programs linked to ACSC objectives Promote new graduate degree programs in cyber security Plan conferences to organize New England s industry-university-government assets Tom Quinn, State Street Corporation; Mel Bernstein, Northeastern University (co-chairs) Advanced Cyber Security Center 15

16 ACSC: Side-by-side and online collaboration Notional rendering of expanded ACSC facility ACSC Cyber Security Operations Center ACSC Cyber Threat Information Sharing Portal Advanced Cyber Security Center 16

17 ACSC: From planning, pilot to launch 2010: Industry-research-Commonwealth charter members organize Small-scale technical group pilot hosted by MITRE Mass Insight/Steering Committee develop 3-year work plan Initial member funding 2011 Milestones - Work Groups Organized, Member Funding Committed: Threat evaluation/data sharing: Bi-weekly Cyber Tuesdays, TEMS, Web Portal initiated Policy/Legal: Participation Agreement, incorporation, initial research on information sharing, federal legislation Industry-University: Outreach, Academic Resource Guide, Strategic Consultant/R+D Planning Process with MGHPCC Strategic Advisory Board: Charter members recruited Advanced Cyber Security Center 17

18 ACSC: Funding and Development Phase I/2011: Initial funding from 16 charter members Commit targeted industry research funds in pools for initial prime the pump R+D projects Phase II/2012: Expand membership to 30 Hire executive director Continued Mass Insight support for development, policy, partnerships Phase III/2013: Significantly expand scale and funding through federal grants and contracts Advanced Cyber Security Center 18

19 Industry-University Collaborations: Fall 2011 Strategic Planning Goals: Establish large scale vision, focus, training for R+D and education collaborations Kick off prime the pump initial industry funded research planning projects Identify federal, industry priorities and funding opportunities Implement collaborative mechanisms Prioritize steps for 2012 Advanced Cyber Security Center 19

20 The Advanced Threats and the R&D Opportunity UNIVERSITY ASSETS ACSC and Partners INDUSTRY NEEDS FEDERAL PRIORITIES Advanced Cyber Security Center 20

21 ACSC Platform: Industry-University Collaboration Opportunities Education and Talent Development Undergraduate, Graduate, Professional: Internship programs Adjunct faculty positions Lecture series rotating locations, industry and university lecturers Curriculum planning Endowed professorships (education emphasis) Research: Member-funded individual projects (e.g., post-doctoral project) Member-funded multi-year projects (e.g., Ph.D. program) ACSC proposals for federal or foundation research grants Visiting scholar programs (e.g., sabbaticals) Endowed professorships (research emphasis) Advanced Cyber Security Center 21

22 ACSC Platform: Industry-University Collaboration Opportunities Government policy, regulation: Thought leadership papers, policy forums, op-ed pieces Background for New England delegation Special events: Cyber competitions at the college and high-school levels Tech transfer-university research leader roundtable co-hosted by MTTC and the ACSC Media communications Advanced Cyber Security Center 22

23 5 Areas for Possible ACSC-funded Projects: Federal Cyber Security R&D Plan and Industry Needs 1. Integration of Cyber Security Risk Frameworks with Enterprise Risk Frameworks The need is for a common view of risks affecting the enterprise. Important for budgeting and resource allocation. 2. Big Data Management for Cyber Security Operations Current cyber security tools do not scale well to the enterprise level for our major partners. Need scalable systems to enable real-time analysis and decision-making to address advanced cyber threats. 3. Automation Processes and Technology for Cyber Security Information Sharing Efficient sharing of large-scale cyber security information requires efficient standardization and technology to promote collaborative analysis and actions. 4. Security and Privacy for Mobile Devices There are growing uses of mobile hand-held devices in the markets for many of our members, and growing use implies growing threats. Need high levels of security and privacy for these devices. 5. Optimization of Enterprise Security Architectures Placement and configuration of firewalls, IDS/IPS s, etc. are among the factors determining the costeffectiveness of a given security architecture. How can such factors be optimized within the enterprise to get the most value from the security budget? Based on member interviews. Advanced Cyber Security Center 23

24 ACSC Resources Advanced Cyber Security Center: Conference papers and related publications: Advanced Cyber Security Center 24

Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC

Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC CSF Conference June 25, 2012 An Initiative of 18 Tremont Street,

More information

The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation

The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium Bruce J. Bakis, The MITRE Corporation Outline Essence Goals Member value proposition Organization Milestones Sharing

More information

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA TITLE HERE Subtitle here Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA The New England goal and opportunity The Goal: The New England region is committed to be a global

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

University-Industry Work Group: Education

University-Industry Work Group: Education University-Industry Work Group: Education Tanya Zlateva Director, Center for Reliable Information Systems and Cyber Security (RISCS) Associate Dean for Academic Programs, Metropolitan College (MET) Boston

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and Statement of William D. Green Executive Chairman of the Board, Accenture and Member, Committee on Research Universities Board on Higher Education and Workforce Policy and Global Affairs National Research

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation 2015 State of the Internal Audit Profession Study Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation 68% of companies have gone through or

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue

Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue Solution Brief Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue Federal Security Monitoring

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

VIRGINIA CYBER SECURITY COMMISSION November 7, 2014

VIRGINIA CYBER SECURITY COMMISSION November 7, 2014 VIRGINIA CYBER SECURITY COMMISSION November 7, 2014 1 Mission Statement The mission of the Virginia Cyber Security Partnership is to establish and maintain a trusted community of public and private sector

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Raytheon Cybersecurity and Small Business Engagement. Raytheon Jeff Jacoby

Raytheon Cybersecurity and Small Business Engagement. Raytheon Jeff Jacoby Raytheon Cybersecurity and Small Business Engagement Raytheon Jeff Jacoby Raytheon Cybersecurity and Small Business Engagement DHS Cyber SBIR Workshop July 26, 2012 Jeff Jacoby Director, Cyber Enterprise

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management

MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management MassMutual Cyber Security University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management Position Title: Threat Intelligence Intern Job Location: Boston, MA Timeframe:

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

The Emergence of Security Business Intelligence: Risk

The Emergence of Security Business Intelligence: Risk The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

How To Understand And Manage Cybersecurity Risk

How To Understand And Manage Cybersecurity Risk White Paper A Framework to Gauge Cyber Defenses NIST s Cybersecurity Framework Helps Critical Infrastructure Owners to Cost-Effectively Defend National & Economic Security of the U.S. Executive Summary

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

The Future of the Advanced SOC

The Future of the Advanced SOC The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why

More information

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and

More information

Overcoming Five Critical Cybersecurity Gaps

Overcoming Five Critical Cybersecurity Gaps Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY BIG DATA CHANGING THE REALM OF POSSIBILITY IN SECURITY Shaun McLagan General Manager, RSA Australia and New Zealand 1 Things have changed #2 Buzz word 2012 Big Data only behind something called Fiscal

More information

Cyber Security Risk Management

Cyber Security Risk Management Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of

More information

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

The 5 Cybersecurity Concerns You Can t Overlook

The 5 Cybersecurity Concerns You Can t Overlook The 5 Cybersecurity Concerns You Can t Overlook and how to address them 2014 SimSpace Corporation The 5 Cybersecurity Concerns You Can t Overlook CONCERN 1 You don t know how good your cybersecurity team

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Nine Cyber Security Trends for 2016

Nine Cyber Security Trends for 2016 Nine Cyber Security Trends for 2016 12-17-15 Boxborough, MA 2016 will see an increasing number of attacks and the emergence of new targets; the complexity and sophistication of attacks, initiated by increasingly

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Founding Executive San Francisco Bay Area Learning Hub

Founding Executive San Francisco Bay Area Learning Hub Founding Executive San Francisco Bay Area Learning Hub Executive Summary Northeastern University seeks an entrepreneurial, innovative, and dynamic leader to serve as the Founding Executive of its first

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Big Data Analytics: Driving Value Beyond the Hype

Big Data Analytics: Driving Value Beyond the Hype Transportation Challenges and Opportunities: A Colloquia Series Fresh Approaches to Emerging Issues Big Data Analytics: Driving Value Beyond the Hype OCTOBER 2, 2012 CAMBRIDGE, MASSACHUSETTS WE ARE IN

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com

More information

The Next Generation Security Operations Center

The Next Generation Security Operations Center The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

Data Security as a BDM Best Practice

Data Security as a BDM Best Practice Data Security as a BDM Best Practice David Loshin, President, Knowledge Integrity Robert Shields, CISSP, Director, PMM Data Security Group May 23, 2016 About the Speaker David Loshin President, Knowledge

More information

Cyber Intelligence Workforce

Cyber Intelligence Workforce Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture Managed Security Services Leverage our experienced security operations team to improve your cyber security posture Our approach to Managed Security Services Enterprises spend millions on technology to

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Strategic Plan Overview

Strategic Plan Overview College of Business Administration Strategic Plan Overview Mission: The mission of the College of Business Administration at SDSU is to maintain a challenging learning environment that fosters excellence

More information

SUSTAINING COMPETITIVE DIFFERENTIATION

SUSTAINING COMPETITIVE DIFFERENTIATION SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

Attack Intelligence: Why It Matters

Attack Intelligence: Why It Matters Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,

More information

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY CYBER HYGIENE AND ORGANIZATIONAL PLANNING ARE AT LEAST AS INTEGRAL TO SECURING INFORMATION NETWORKS AS FIREWALLS AND ANTIVIRUS SOFTWARE Cybersecurity

More information

PROPOSAL TO ESTABLISH A SCHOOL OF CONSTRUCTION

PROPOSAL TO ESTABLISH A SCHOOL OF CONSTRUCTION PROPOSAL TO ESTABLISH A SCHOOL OF CONSTRUCTION Background: The proposed School of Construction is an outgrowth of discussions over more than two years between faculty in the Department of Building Construction

More information

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

Addressing Skill Aging and Mismatch in Modern Economy

Addressing Skill Aging and Mismatch in Modern Economy 1 Addressing Skill Aging and Mismatch in Modern Economy Yi Deng, Ph.D., Dean College of Computing and Informatics UNC Charlotte Yi.deng@uncc.edu http://cci.uncc.edu 2 A Bit of History AT&T CEO, 1950s:

More information

Begin Your BI Journey

Begin Your BI Journey Begin Your BI Journey As part of long-term strategy, healthcare entities seek opportunities for continuous improvement in order to meet the changing needs of their patients while also maintaining compliance

More information