Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Size: px
Start display at page:

Download "Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?"

Transcription

1 Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions, participants, coordination Dept of Homeland Security overview National Science Foundation overview Carl Landwehr Cyber Trust Coordinator National Science Foundation June 26, 2005 What is Critical Information Infrastructure? Critical: damage/outage would have severe impact Personal injury Economic loss Critical to whom? Information infrastructure: Computer and communication networks per se Control of national infrastructures for electric power, oil and gas, water, etc. Other networks, e.g. medical records, banking, voting Who conducts research related to CIIP in the U.S.? Universities Computer Sci. depts,, Elect. and Comp. Eng. depts,, etc. Non-profit research organizations Federally funded: MITRE, Aerospace, RAND, SEI, etc. Other: SRI, Applied Research Lab, JHU/APL, Industry Vendors: Telecomm, software, control (AT&T, Honeywell, Rockwell-Collins, Microsoft, HP, ) Integrators: Raytheon, Lockheed Martin, etc. Government Military/govt. labs: NRL, AFRL, NIST, NSA National Labs (DoE( DoE,, primarily): Sandia,, PNNL, LANL, LLNL, ANL, Who sponsors this research? Industry To suit their corporate needs Amounts and topics often not public Government In-house research Sponsored research NSF: National Science Foundation DHS: Dept of Homeland Security DOE: Dept of Energy DARPA: Defense Advanced Research Projects Agency ARDA: Advanced Research and Development Agency Dept of Justice, Treasury, Who coordinates the government-funded research? National Science and Technology Council (NSTC) Environment and Natural Resources Cabinet level office Science NSTC Dir. OSTP (Dr. Marburger) Technology Net & IT R&D Nanoscale S&T Aerospace Homeland Security Infrastructure Subcommittee CIIP Interagency Working Group PITAC Physical Structures and Systems Interagency Working Group

2 How are these research funds budgeted/reported? Networking and Information Technology Research and Development (NITRD) Program Co-Chairs: Chairs: Dr. Peter Freeman, NSF AD for CISE and Dr. Simon Szykman,, NCO Director FY06 requested budget (multi-agency) $2.2B Recent events: Feb., 2005, President s s Information Technology Advisory Committee PITAC issues report on Cybersecurity, emphasizing need for additional research funds and other recommendations May 2005: NSTC Dir. Dr. Marburger,, Testimony to House Science Committee NSTC Dir. Marburger Testimony May to House Science Committee Two important priorities for NITRD are information security and assurance and the management of enormous data flows. assuring the security, safety, and highly dependable performance of systems, networks, and software in critical applications and infrastructures is one of the most significant and difficult challenges in information technology R&D. CIIP [has] begun the process of defining our top cyber security R&D needs and mapping those against current activities. This is crucial if we are to better address the critically important issue of defining priorities. NSF to establish in FY 2005 a new Science and Technology Center devoted to cyber security R&D. Led by the University of California, Berkeley, the multi-institutional institutional collaborative effort will investigate key issues of computer trustworthiness in an era of increasing attacks at all levels on computer systems and information-based technologies. CIIP Interagency Working Group Includes over 20 organizations from over a dozen departments/agencies. Meets monthly, developing National Cyber Security R&D Plan, which includes: Discussion of threats and vulnerabilities Identification of broad cyber security research areas and topics within these categories Definition of area, description of current state-of of- the-art, and technical challenges Identification of interagency priorities Analysis of current R&D investments Recommendations regarding future investments and R&D investment policy guidance for decision-makers Note: initial (FY05) National CIP R&D Plan released jointly by DHS and OSTP in April (from Infrastructure subcommittee) Who coordinates the government-funded research? Infosec Research Council Charter Informally chartered, government sponsored, voluntary Goal Facilitate collaboration of the participating organizations Promote intelligent information security research investments. Provide a bimonthly forum to: Discuss critical information security issues, Convey member s research needs Describe current research initiatives and proposed courses of action for future research investments. Active topic Hard Problem List update Department of Homeland Security Overview DHS Cyber Security R&D Portfolio: Budget FY 2005 cyber security R&D budget: $18M Overall DHS S&T budget for 2005: $1.1B FY 2006 budget: $16.7M (President s s budget request) DHS S&T portfolio budgets developed through a formal strategic planning process DHS: Important R&D Areas Securing the Infrastructure Secure domain name system Secure routing protocols Cyber Security Functional Requirements Attack protection and prevention Secure process control systems (retrofit and future infrastructure) Attack detection, response, and recovery Situational awareness, indications & warning Secure software engineering & development Software assurance, code testing & analysis Lightweight, low-latency authentication Forensics, traceback, attribution Hardware/firmware security Domain-Specific Security Needs Wireless Internet protocol priority service Distributed & embedded Secure operating systems Other Needs Privacy computing platforms Foundations Red teaming for Cyber Security Enabling Metrics and testing Technologies for R&D Economic assessment Testbeds Long term goal of risk-based Modeling and simulation decision making Network mapping Security technology and policy management

3 DHS: Initial Research Priorities Securing infrastructural protocols: Securing the Domain Name System and Internet routing protocols. Cyber security testbeds: Large scale testbed network and software testing framework (DETER) Large-scale data sets for security testing (PREDICT): Supports development of cyber security metrics. Economic assessment activities: Along with metrics, will provide a foundation for risk- based cyber security decision making. Next-generation cyber security technologies. Execution of top priorities from IAIP Directorate. NSF Overview NSF Organization Directorate for Biological Sciences Directorate for Computer and Information Science and Engineering Directorate for Education & Human Resources Directorate for Engineering Office of Integrative Activities National Science Board Office of the Director Directorate for Mathematical & Physical Sciences Directorate for Social, Behavioral, & Economic Sciences Directorate for Geosciences Office of Polar Programs What NSF/CISE has been doing For many years: Investments in high ranking proposals addressing trust and security in computing FY 02: Trusted Computing program initiated FY 03: Increasing focus in specific research programs Trusted Computing Security-related related Network Research Data and Application Security Embedded and Hybrid Control Systems Security FY 04: Integrated CISE-wide emphasis on Cyber Trust Two Center-Scale Activities awarded: CIED and STIM Summary of FY04 awards available at: FY 05: Continuing Cyber Trust emphasis; awards due 8/2005 NSF/EHR activities Scholarship for Service (SFS) program Targeting education and capacity building Tuition reimbursement and job placement Curriculum development More than 70 active awards, $58M total; new awards for FY05 expected soon Advanced Technical Education program Targets 2-year 2 colleges; about 10 active awards, about $5M total NSF Science and Technology Center - TRUST Team for Research in Ubiquitous Secure Technology Recent 5-year, 5 roughly $18M award to U California Berkeley leading several other major research institutions: Cornell, Stanford, CMU, Vanderbilt And outreach partners: San Jose State, Smith College, Fisk University, Spelman College, California Community Colleges, Oakland City High Schools, Pittsburgh area schools. Industrial Partners: IBM, HP, Intel, Microsoft, Symantec, Cisco, ESCHER (Boeing, Lockheed Martin, Ford, GM, Raytheon), Qualcomm, Bellsouth, Tennessee Valley Authority Goal: develop new science and technology that will radically transform the ability of organizations (software vendors, operators, local and federal agencies) to design, build, and operate trustworthy information systems for our critical infrastructure. Cyber Trust Vision Society in which People can justifiably rely on computer-based systems to perform critical functions securely People can justifiably rely on systems to process and communicate sensitive information securely People can rely on a well-trained and diverse workforce to develop, configure, and operate essential computer-based systems Without fear of sudden disruption by cyber attacks

4 Critical Infrastructure, Cyber Security, and Cyber Trust Homeland Security NSF NSF Cyber Cyber Trust Trust Critical Infrastructure (CI) Systems with Cyber Security concerns Cyber aspects Important Non-CI of of CI CI Systems Cyber Systems Location of Cyber Trust research institutions (about 180 existing awards) US 5 Digit Zipcode Centers by COUNT attack - relative by solicitation area $M Forensics Recover from attacks Survive attacks Detect/understand att. Prevent attacks Build it right Know what to build FY04 Cyber Trust and related award Funding by Solicitation Area Multi / Inter disciplinary Applications Networks Foundations Systems CT-Fnd CT-Sys CT-Net CT-App CT-MI by discipline Cyber Trust Program FY05 Summary $M OS/FS/ Storage Sec Network security App, DB, Web sec Crypto theory and app Trust, Priv, Sec M&S Sec sys architecture Sec. sys development Discipline Sec test. & eval. Forensics FY05 submissions to Cyber Trust: # proposals # projects #awards Individual / small group ? Team ? Center-scale 16 11? Total funding available about $35M Less than 10% will make it through to award stage Results public by August 2005

5 How to apply for support for CISE US Japan collaboration support Thank you. 1. Have an existing NSF grant 2. Locate a Japanese collaborator 3. File a supplemental request under your existing grant 4. Wait for FY06 Carl Landwehr National Science Foundation Program Director, Cyber Trust CISE/CNS

NSF Cyber Trust Report

NSF Cyber Trust Report NSF Cyber Trust Report For US-Japan CIIP Experts Workshop, Sept 28-29 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation Homeland Security Critical Infrastructure

More information

NSF Activities in Cyber Trust

NSF Activities in Cyber Trust NSF Activities in Cyber Trust For ACM CCS Industry/Govt Track Oct. 26, 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation What s s the Problem? Today s s software-based

More information

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

US Federal Cyber Security Research Program. NITRD Program

US Federal Cyber Security Research Program. NITRD Program US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

More information

Government Perspectives on the Future of Advanced Networking Technologies

Government Perspectives on the Future of Advanced Networking Technologies Government Perspectives on the Future of Advanced Networking Technologies Combined briefings presented at: GLOBALCOMM GLOBALCOMM Government Summit and Innovations Summit June 5, 2006 June 7, 2006 Simon

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Industry involvement in education and research - TCIPG

Industry involvement in education and research - TCIPG 1 Industry involvement in education and research - TCIPG Peter W. Sauer and William H. Sanders (and the TCIPG team) IEEE/PES GM, Denver, CO July 29, 2015 Outline History and facts TCIPG Overview and Vision

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

Cyber Security Research and Development a Homeland Security Perspective

Cyber Security Research and Development a Homeland Security Perspective FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle

More information

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,

More information

Science or Security. George O. Strawn NSF & NITRD (retired)

Science or Security. George O. Strawn NSF & NITRD (retired) Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

TRUST:Team for Research in Ubiquitous Secure Technologies

TRUST:Team for Research in Ubiquitous Secure Technologies TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider

More information

Public-Private Cooperation in Cybersecurity Research Strategy Development across the Globe. A View from the U.S. Department of Homeland Security (DHS)

Public-Private Cooperation in Cybersecurity Research Strategy Development across the Globe. A View from the U.S. Department of Homeland Security (DHS) Public-Private Cooperation in Cybersecurity Research Strategy Development across the Globe A View from the U.S. Department of Homeland Security (DHS) Background Envision a future... in which universities

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

DHS S&T Cyber Security R&D Program

DHS S&T Cyber Security R&D Program Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA douglas.maughan@dhs.gov

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes

Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Dr. Jeannette Wing Assistant Director for Computer

More information

About the National Science and Technology Council

About the National Science and Technology Council About the National Science and Technology Council The National Science and Technology Council (NSTC) was established by Executive Order on November 23, 1993. This Cabinet-level Council is the principal

More information

RISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0%

RISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0% RISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0% Overview The economic competiveness and societal well-being of the United States depend on the affordability, availability, quality, and reliability

More information

DOE Cyber Security Policy Perspectives

DOE Cyber Security Policy Perspectives DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from

More information

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department Japan Computer Emergency Response Team Coordination Center 電子署名者 : Japan Computer Emergency Response Team Coordination Center DN : c=jp, st=tokyo, l=chiyoda-ku, email=office@jpcert.or.jp, o=japan Computer

More information

Refining Security: A Case Study of Public/Private Collaboration to Further PCS Security in the Energy Sector

Refining Security: A Case Study of Public/Private Collaboration to Further PCS Security in the Energy Sector Refining Security: A Case Study of Public/Private Collaboration to Further PCS Security in the Energy Sector Martha Austin, Executive Director The Institute for Information Infrastructure Protection (I3P)

More information

White House Response to the National Academy s Report on Strengthening Forensic Science in the United States

White House Response to the National Academy s Report on Strengthening Forensic Science in the United States White House Response to the National Academy s Report on Strengthening Forensic Science in the United States Mr. Rick Weiss Assistant Director, Strategic Communications and Senior Policy Analyst Office

More information

DHS S&T Cyber Security Division (CSD) Overview

DHS S&T Cyber Security Division (CSD) Overview Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview TCIPG Industry Workshop UIUC November 8, 2011 Greg Wigton Program Manager Cyber Security Division

More information

I3P SCADA Security Research Plan

I3P SCADA Security Research Plan I3P SCADA Security Research Plan Unifying Stakeholders and Security Programs to Address SCADA Vulnerability and Infrastructure Interdependency Ron Trellue, Team Lead Sandia National Laboratories 1 What

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western

More information

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment

More information

Testimony of. Before the. May 25, 2011

Testimony of. Before the. May 25, 2011 Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE

More information

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small

More information

CYBERINFRASTRUCTURE FRAMEWORK $143,060,000 FOR 21 ST CENTURY SCIENCE, ENGINEERING, +$14,100,000 / 10.9% AND EDUCATION (CIF21)

CYBERINFRASTRUCTURE FRAMEWORK $143,060,000 FOR 21 ST CENTURY SCIENCE, ENGINEERING, +$14,100,000 / 10.9% AND EDUCATION (CIF21) CYBERINFRASTRUCTURE FRAMEWORK $143,060,000 FOR 21 ST CENTURY SCIENCE, ENGINEERING, +$14,100,000 / 10.9% AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Symposium on the Interagency Strategic Plan for Big Data: Focus on R&D

Symposium on the Interagency Strategic Plan for Big Data: Focus on R&D Symposium on the Interagency Strategic Plan for Big Data: Focus on R&D NAS Board on Research Data and Information October 23, 2014 Big Data Senior Steering Group (BDSSG) Allen Dearry, NIH, Co-Chair Suzi

More information

The Cyber Security Crisis

The Cyber Security Crisis The Cyber Security Crisis Eugene H. Spafford Professor & Executive Director CERIAS http://www.cerias.purdue.edu/ The State of Cybersecurity Overwhelming vulnerabilities About 4000 in each of 2003, 2004

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong

More information

DHS, National Cyber Security Division Overview

DHS, National Cyber Security Division Overview DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined

More information

CS/ITP Concurrent Degree (CSEN-BS/ITP-MS)

CS/ITP Concurrent Degree (CSEN-BS/ITP-MS) CS/ITP Concurrent Degree (CSEN-BS/ITP-MS) The Bachelor of Science degree is from the Department of Computer Science (CS) and the Master of Science degree is from the Interdisciplinary Telecom Program (ITP).

More information

National Communications System. December 6, 2007

National Communications System. December 6, 2007 1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy June

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43%

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43% CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43% Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,

More information

Next Generation Internet (NGI) Initiative. George Strawn (NSF) Co-chair Large Scale Networking WG CIC R&D Subcommittee

Next Generation Internet (NGI) Initiative. George Strawn (NSF) Co-chair Large Scale Networking WG CIC R&D Subcommittee Next Generation Internet (NGI) Initiative George Strawn (NSF) Co-chair Large Scale Networking WG CIC R&D Subcommittee Vision for NGI Allow researchers to live in the future, developing and experiencing

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

Cyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu

Cyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu Cyber Security Education: My Personal Thoughts Bharat Doshi bharat.doshi@jhuapl.edu Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014 NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission

More information

IEEE-Northwest Energy Systems Symposium (NWESS)

IEEE-Northwest Energy Systems Symposium (NWESS) IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

TESTIMONY OF DR. GREGORY D. HAGER JOHNS HOPKINS UNIVERSITY

TESTIMONY OF DR. GREGORY D. HAGER JOHNS HOPKINS UNIVERSITY TESTIMONY OF DR. GREGORY D. HAGER JOHNS HOPKINS UNIVERSITY BEFORE THE HOUSE COMMITTEE ON SCIENCE, SPACE AND TECHNOLOGY SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HEARING ON A REVIEW OF THE NETWORKING AND

More information

Facilitated Self-Evaluation v1.0

Facilitated Self-Evaluation v1.0 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21270 Updated February 24, 2005 CRS Report for Congress Received through the CRS Web Homeland Security Research and Development Funding, Organization, and Oversight Summary Genevieve J. Knezo

More information

Testimony of. Cita M. Furlani Director

Testimony of. Cita M. Furlani Director Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce Joint Hearing Before the United States House

More information

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Discover Viterbi: Cyber Security Engineering & Informatics Programs Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts

More information

Cyber Security for Advanced Manufacturing Next Steps

Cyber Security for Advanced Manufacturing Next Steps Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. michael.mcgrath@anser.org NDIA White

More information

Cybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG Center Overview

Cybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG Center Overview Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG Center Overview TCIPG Summary Extend and integrate previously

More information

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman

More information

New Era in Cyber Security. Technology Development

New Era in Cyber Security. Technology Development New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security

More information

Cyber Security for the Advanced Manufacturing Enterprise

Cyber Security for the Advanced Manufacturing Enterprise Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER michael.mcgrath@anser.org

More information

Research and Development Trends in Critical Infrastructure Protection in the U.S.

Research and Development Trends in Critical Infrastructure Protection in the U.S. 1 Research and Development Trends in Critical Infrastructure Protection in the U.S. AKIHIRO FUJII Information and Communications Research Unit 1 Introduction Evaluating the risks that face the infrastructures

More information

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Doug Pearson Director, REN-ISAC ren-isac@iu.edu Copyright Trustees of Indiana University 2003. Permission is granted

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 1353 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Friday, the third day of January, two thousand and fourteen An

More information

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education

More information

Big Data R&D Initiative

Big Data R&D Initiative Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

Security Research at the Center for Advanced Technology in Telecommunications

Security Research at the Center for Advanced Technology in Telecommunications Security Research at the Center for Advanced Technology in Telecommunications Highlights NSA Center of Excellence in IA Education, 2002- NSF/NSA Cyber Corps Program (ASPIRE), 2002- NY State funded Cybercrime

More information

ARC INDUSTRY FORUM 2015

ARC INDUSTRY FORUM 2015 ARC INDUSTRY FORUM PRESENTATION TOPIC: MANAGING INDUSTRIAL CYBER SECURITY RISK Tyler Williams Manager, Industrial Cyber Security Shell Global Solutions tyler.williams@shell.com 1 THE TRADITIONAL APPROACH

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

A New Standards Project on Avoiding Programming Language Vulnerabilities

A New Standards Project on Avoiding Programming Language Vulnerabilities A New Standards Project on Avoiding Programming Language Vulnerabilities Jim Moore Liaison Representative from IEEE Computer Society to ISO/IEC JTC 1/SC 7 Liaison Representative between ISO/IEC JTC 1/SC

More information

NGI, SECURITY, and YOU. Bob Aiken. NGI Project Leader DOE aiken@er.doe.gov

NGI, SECURITY, and YOU. Bob Aiken. NGI Project Leader DOE aiken@er.doe.gov NGI, SECURITY, and YOU Bob Aiken NGI Project Leader DOE aiken@er.doe.gov Security Workshop October 1997 Points to Remember Dynamic Adaptable Virtual Networks and Computational GRIDS are the Future!! The

More information

Toward Curricular Guidance in the Cyber Sciences

Toward Curricular Guidance in the Cyber Sciences Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O

More information

Clean-slate Internet Reinvention Initiative. CIRI GENI Global Environment for Network Investigation

Clean-slate Internet Reinvention Initiative. CIRI GENI Global Environment for Network Investigation Clean-slate Internet Reinvention Initiative CIRI GENI Global Environment for Network Investigation Imagine Global Network Infrastructure that Is worthy of our society s trust Even for managing and operating

More information

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH SANS ICS Security Summit March 18, 2014 Jason D. Christopher Nadya Bartol Ed Goff Agenda Background Use of Existing Tools: C2M2 Case

More information

Moraine Valley Community College. Strategic Technology Priorities and Goals

Moraine Valley Community College. Strategic Technology Priorities and Goals Moraine Valley Community College Strategic Technology Priorities and Goals FY 2016-2019 Letter from the President Moraine Valley Community College s mission of providing a learning-centered environment

More information

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State Agenda Item 2 USM Cyber Security Landscape and Contributions to the State BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION INFORMATION OR DISCUSSION TOPIC: USM Cyber Security Landscape and Contributions to

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

National Center for Risk and Economic Analysis of Terrorism Events

National Center for Risk and Economic Analysis of Terrorism Events National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,

More information

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP) A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant

More information

Participants: Introduction:

Participants: Introduction: National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

National Science Foundation Models for Funding Undergraduate Research

National Science Foundation Models for Funding Undergraduate Research National Science Foundation Models for Funding Undergraduate Research First Australian Summit on the Integration of Research, Teaching, and Learning November 2009 NSF Strategic Goals Discovery Advance

More information

Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF)

Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF) Designing & Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson Lesson 1 June, 2015 1 About the Class This course covers the essential elements for planning, building

More information

National Cybersecurity & Communications Integration Center (NCCIC)

National Cybersecurity & Communications Integration Center (NCCIC) National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

More information

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015 Agenda Agenda Introductions Agenda Introductions Discussion of the current state of Cybersecurity for Controls

More information