How To Support The Center For Cyber Conflict Studies At The Naval War College

Size: px
Start display at page:

Download "How To Support The Center For Cyber Conflict Studies At The Naval War College"

Transcription

1 The Naval War College Foundation Center for Cyber Conflict Studies The Campaign for Cybersecurity

2

3 contents Defending Cyberspace...page 2 Cyberspace... 4 What is Cyberspace... 6 Cybersecurity... 8 Averting a Cyber 9/ The U.S. Naval War College...12 The Center for Cyber Conflict Studies...14 The Naval War College Foundation...16

4 Defending Cyberspace A National Priority in a Digital World At times the world seems to be changing before our eyes and nowhere is that more evident than in the world of Cyber. The Naval War College, as it has throughout its history, sails at the nexus of strategy, tactics, and technology in ways that will allow us to better prepare ourselves for the immense challenges ahead in this brave new world of Cybersecurity. Admiral James G. Stavridis, USN (Ret.) Supreme Allied Commander Europe Dean, Fletcher School of Law & Diplomacy, Tufts University page 2

5

6 page 4 Cyberspace

7 cyberspace Imagine it. It makes modern communication possible. It connects our satellites, phones, and computers. It enables our electronics and appliances. It is critical to our manufacturing, distribution, and consumption. It is the basis of our banking and payments systems. It underpins our economy and infrastructure. It connects the global economy. It is the backbone of command and control for our national defense. It stores our wealth and treasure. It makes America function. It is becoming the dominant platform for life in this century. It is Cyberspace. Imagine America without it. Imagine our vulnerability with it. Cyberspace has long since become far more than the technology that gave rise to it. People, technology, and process are inextricably intertwined in a manner that yields both the engine of global transformation we have come to cherish and the flawed enterprise that imperils our secrets, wealth, and treasure. Chris Inglis, The U.S. Naval Academy Robert and Mary M. Looker Distinguished Visiting Professor for Cyber Operations Deputy Director NSA page 5

8 What is Cyberspace? If you use a keyboard, you are an operator in Cyberspace. VADM Jan Tighe Commander, U.S. Fleet Cyber Command Commander, U.S. TENTH Fleet page 6

9 Cyberspace is the world of inter-connected computer networks that store and move data, melding people, technology and process into a global web that is, quite simply, the online universe of our digital world. Cyberspace is unregulated. It has no natural or defensible borders. It crosses nations and the globe with no sovereign territory. Cyberspace has created great benefits to humanity on an unprecedented scale in human history. Interconnectedness and openness have created mass efficiencies and value creation around the global economy. Yet the open architecture of Cyberspace risks massive disruption to our modern life. Openness is exploitable and increasingly exploited by actors possessing little more than access to the internet. We Americans have become reliant on Cyberspace for the conduct of our daily lives. Cyberspace is vulnerable, and so are we as individuals, organizations, and a nation. Defending and securing Cyberspace is a national priority in a globally connected world. All of us have a stake in Cybersecurity for the digital and physical world in which we reside. Cyberspace is becoming the dominant platform for life in the 21st Century. Peter Singer, Senior Fellow, New America Foundation page 7

10 Cybersecurity What is it? Why does it matter? page 8

11 C Cybersecurity is a recently invented word. Yet its importance is timeless in the Cyber Age. Cybersecurity is the protection of computer equipment, software, and networks in Cyberspace from unauthorized access, manipulation, and destruction. Cybersecurity seeks to maintain the confidentiality and integrity of data while allowing authorized access whenever and wherever desired. Cybersecurity is vitally important in a digitally dependent and dangerous world. The harsh reality of our times is that Cyberspace is increasingly under attack. Cyber attacks are often anonymous by unauthorized parties seeking access to private and public data networks. Cyberspace is threatened by so-called bad actors, a Cyber term for those who violate the trust and privacy of secured networks through Cyber attacks, including: hostile governments and proxies; state sponsored and non-state terror groups; criminal organizations and networks; activists, hactivists, and individuals. Their motives to act badly, with ill and malicious intent, are varied: Some bad actors attack because they can. Most attack to disrupt and gain an advantage, whether political, economic or commercial. All attackers violate property, privacy, and security. Bad actors have an asymmetric advantage in Cyberspace: they seek and gain unauthorized access at low cost for potentially high benefits with surprisingly low risk of discovery or punishment. The risk-reward equation for bad Cyber actors is in their favor, as are the odds of success: Bad actors only have to gain access once. Cybersecurity has to deny access every time. Cyber attacks can be initiated from anywhere in the world with a computer device and the Internet. Military assets are not needed in their assault. Attacks often come without warning and always at the speed of light. The damage to physical assets and infrastructure can be devastating with a computer command click. Public and private networks are equally vulnerable. Governments, companies, and individuals will spend billions of dollars to protect against Cyber intrusions. Even the most protected and prepared can only react once an attack has been detected. Globalization and Cyberspace are deeply intertwined. American society has steadily institutionalized, and lived by, openness to global commerce, finance, travel, and information flows. Cyberspace offers both new capabilities and new threats, leaving their targets without a traditional means of response, such as retaliatory force or criminal prosecution. In the Cyber Age, vast amounts of valuable information will be stolen. Financial assets will be compromised. Supply chains will be tainted. Value and property will be destroyed. Wealth will be illegally transferred from countries, companies, and individuals. While the risks in Cyberspace have become more apparent in recent times to a broader audience, Cybersecurity has traditionally been an obscure focus of professionals specializing in largely technical disciplines. Given the escalating risks and frequency of Cyber attacks broadly in our society and economy, Cybersecurity now matters to us all, across all disciplines, roles, and sectors. It will be inescapably and visibly a clear and present danger to our way of life. Cyber crime represents the greatest wealth transfer in history. General Keith Alexander, USA (Ret.) Commander, U.S. Cyber Command Director, National Security Agency Chief, Central Security Service page 9

12 Averting a Cyber 9/11 A Call to Arms Because Cyberspace is essential to modern society, no dimension of conflict or warfare remains untouched by Cyberspace. Peter Dombrowski Professor, U.S. Naval War College page 10

13 Cybersecurity will require a constant battle in Cyberspace against rapidly and persistently evolving threats. In a risk matrix involving terrorism, the stakes are particularly high. If we fail to protect our cyber networks, we risk potentially massive damage throughout our interconnected data networks, national economy, and infrastructure, including destruction, degradation, manipulation and neutralization of America s: Banking system, capital markets & exchanges National defense and military systems Supply chains of production, distribution, and commerce Satellite and communications systems Internet websites, , e-commerce Physical infrastructure (dams, chemical plants, water systems) Air transportation system Ground transportation and logistics networks Power grids and assets (nuclear, electrical, gas, oil, LNG) Electronic security systems of physical installations & homes Video surveillance systems in public and private security Hospital equipment and medical devices Homeland Security and law enforcement A digital attack on any one of these sectors could be the equivalent of a Cyber 9/11, as warned by the esteemed Chairmen of the 9/11 Commission in their capacity currently as Chairmen of the Bipartisan Policy Center s Homeland Security Project, where they warn: Attacks in the digital world can inflict serious damage in the physical world. We are constantly at war in the digital world. We must become vigilant and take action as a nation to develop a Cybersecurity strategy in the public and private sectors. Cybersecurity is critical to the stability of our economy, society, and national security. Cybersecurity will require a national effort with collaboration by all who have a stake in its continuity. This will require leadership by American business professionals, private individuals, academics, policy makers, government officials, our intelligence community and military leaders. Unlike other national interests, Cyberspace is too pervasive for any one individual, organization, sector, or government to serve as the guarantor of its security. The breadth and scope of Cybersecurity requires us all to be involved in partnerships, both public and private, to be effective in safeguarding our interests. We are at war in the digital world. And yet, because this war lacks attention -grabbing explosions and body bags, the American people remain largely unaware of the danger. That needs to change. Tom Kean and Lee Hamilton Chairman and Vice Chairman of the 9/11 Commission Co -Chairmen of the Homeland Security Project page 11

14 The U.S. Naval War College A Tradition of Leadership in National Security Change continual, unremitting change is the law of the universe. It is not enough for us to keep abreast of the times. This College must be in the very front rank of the advance guard of progress. The War College is a place of original research on all questions relating to war and to statesmanship connected with war, or the prevention of war. Rear Admiral Stephen B. Luce, U.S. Navy Address delivered at the U.S. Naval War College, 1903 page 12

15 NWC The Naval War College has been the home of strategic thought to the United States Navy for more than a century. For the past 130 years, this national academic and policy institution in Newport, Rhode Island has provided intellectual leadership to the U.S. Navy and the nation. The Naval War College provides direct support to the U.S. Navy and government agencies across the national security spectrum. Since its inception, war-gaming has been a core competency of the institution with evolving national security threats and requirements. The Naval War College is poised to serve as a national focal point for Cybersecurity policy and strategy formulation, as part of its continuous mission to remain at the vanguard of national security challenges. As a strategic and operational thought leader, the Naval War College can play an important role in developing a 21st century Cybersecurity strategy for America. Cyber is going to be foundational to the warfighting construct of the future. Admiral Michael S. Rogers, USN Commander, U.S. Cyber Command Director, National Security Agency Chief, Central Security Service page 13

16 page 14 The Center for Cyber Conflict Studies

17 NWC The Naval War College established the Center for Cyber Conflict Studies in 2011 as the foundation for all Cybersecurity initiatives. The Center will serve as an institutional nexus of research to advance national defense policies and strategy in addressing increasing Cybersecurity threats to the Navy, the nation, and our allies. The Naval War College is committed to equipping graduates with relevant knowledge to think and operate strategically in Cyber operations, whether in a battlefield capability or the dangerous current environment of continuous Cyber conflict. The Center will analyze policy and strategy developments across all national domains and will make recommendations on Cybersecurity measures with implications beyond military domains. The Center will serve as a convening authority for government, academic, policy, and business organizations to collaborate on Cybersecurity for our nation s security in all sectors of society: military, civilian, public and private. In practice, the Center will function as an intellectual and policy clearinghouse on major issues related to Cyberspace and the turbulence in security of networked technologies and organizations. The Center s academic faculty will conduct selective and original research to be shared with civilian and military agencies in the public and private sector. The Center will advance the Naval War College s mission to provide the Margin of Excellence in Cyber strategy relevant to government, military, intelligence, academia, and corporate organizations in this highly specialized, rapidly evolving, and vitally important domain of national Cybersecurity. The Naval War College is a uniquely experienced national asset capable of systematically evaluating the potential range of impact to American interests from Cyber attacks and threats. Few national institutions have the experience and ability to address potential systemic risk failures to our national infrastructure through Cyber attacks affecting the nation s capital markets, banking and payments systems, electrical and power grids, communication networks, aviation and transportation sectors, and hospitals and medical care centers, among other assets. The Naval War College has a long history of contingency planning through war-gaming exercises that have proven vitally important in our nation s history. War-gaming skills and technologies have strong potential application in evaluating Cyber attack scenarios and developing optimal strategies for managing and neutralizing threats. The Naval War College s expertise in Cybersecurity has evolved with U.S. Navy strategy in the Cyber Age. Since 2011, the year the Center was established, the U.S. Navy has prepared doctrinally to fight in the Fifth Domain of Engagement (Cyberspace) in addition to the traditional four domains of Air, Land, Sea, and Space. The U.S. Navy has integrated Cyber planning into the development, deployment, operation, and sustainability of naval operations for years. The collective expertise and experience of U.S. Navy Cyber defense measures will be an invaluable asset to the Center for Cyber Conflict Studies. The Center for Cyber Conflict Studies will further strengthen the role of the Naval War College as a strategic thought leader for the Navy and the nation in an era of escalating conflict in Cyberspace. The Naval War College will endeavor to remain at the forefront of national security policy and strategy in the 21st century with the establishment of the Center for Cyber Conflict Studies. We will continue to lead the way, as we have since our founding in RADM P. Gardner Howe, III, USN 55th President, U.S. Naval War College page 15

18 The Naval War College Foundation Providing the Margin of Excellence through Private Philanthropy The U.S. Naval Academy and the U.S. Naval War College have both greatly benefited from their respective Foundations support. Private philanthropy has clearly redefined our ability to achieve the Margin of Excellence possible for our future leaders of the nation. VADM Walter E. Ted Carter, USN 62nd Superintendent, U.S. Naval Academy 54th President, U.S. Naval War College page 16

19 NWCF The Naval War College Foundation is leading the campaign for private philanthropic support of the Center for Cyber Conflict Studies. The campaign will raise capital to endow and support specific academic initiatives not funded by the U.S. Navy or governmental sources. Corporations, foundations, and private individuals are filling the void where government funding is not available. The campaign is a critical factor in the success of the Center s mission in establishing Cybersecurity policy and strategy for the nation s security. A campaign to raise private monies for a national interest is not unique to the Naval War College Foundation. Many privately funded initiatives for ostensibly public purposes have successfully achieved their objectives in America s philanthropic history. Public-private partnerships range from supporting national assets such as the Smithsonian Museum to restoring the Washington Monument with private funding and numerous other philanthropic endeavors large and small for a public benefit. page 17

20 If Cybersecurity is a national interest, why is private philanthropy needed for the Center for Cyber Conflict Studies at the Naval War College? Prospective Donor page 18 page 18

21 As an academic institution, the Naval War College has similar requirements to the many publicly funded American universities in all fifty states that benefit from, and require, private endowments and foundations to support their full operations. As a military academic institution, the College shares in common with the U.S. military service academies a commitment to providing the Margin of Excellence through private foundation support. This model of public-private support has been essential to bridging the gap between baseline government funding and higher levels required for these institutions to achieve excellence on par with peer institutions. The Naval War College is prohibited by federal law from seeking external financial support. The Naval War College Foundation, as a separate, not-forprofit 501(c)3, solicits private funds to support and advance the work of the Naval War College. These private funds allow the Naval War College scholars to maintain academic independence and pursue innovative research unfettered by federal budget oversight. The impact of the Naval War College Foundation on campus, and throughout the U.S. Navy, is significant. Since its founding in 1969, the Naval War College Foundation has worked with private donors to establish endowments, to support named academic chairs and lecture series, and to establish awards and prizes in recognition of academic excellence and achievement in various disciplines. The Foundation also provides unrestricted funds to support components of education deemed critical, yet unfunded, by the federal government. In times of fiscal crises, the Foundation has been vital for support. In 2013, the federal budget standoff jeopardized the operations of the Naval War College. Through the support of private donors, the Naval War College Foundation was able to provide funding on short notice to ensure continuity of research, travel, and programmatic content. By contrast, many federally funded government initiatives were defunded and suspended. Patriotic philanthropy has supported the Naval War College for five decades. The Foundation s donors directly impact the Margin of Excellence at the Naval War College. With federal budget dollars diminishing, private support is essential. Private philanthropy is particularly critical now given the immediacy of the Cybersecurity threat facing our nation. Cybersecurity is vital to our national interests and will be so for the foreseeable future. The Center for Cyber Conflict Studies is leading the effort on behalf of the nation to develop timely strategies for prevention of Cyber attacks that could cripple our national infrastructure. Philanthropic support is critical to the success of this public good for America. We invite you to join us in this campaign of patriotic philanthropy to support the Naval War College s leadership in Cybersecurity for the nation. Supporting the Naval War College has been an honor for our family and a priority in our philanthropic budget. The Center for Cyber Conflict Studies is among the highest impact initiatives we could support with clear benefit to the nation. Philip M. Bilden Trustee, Naval War College Foundation Chairman, Center for Cyber Conflict Studies Task Force page 19

22

23

24 Naval War College Foundation, Inc. 686 Cushing Road Newport, Rhode Island

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Cyber Information-Sharing Models: An Overview

Cyber Information-Sharing Models: An Overview PARTNERSHIP Cyber Information-Sharing Models: An Overview October 2012. The MITRE Corporation. All rights reserved. Approved for Public Release. Case Number 11-4486. Distribution Unlimited. Table of Contents

More information

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP) A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives: TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

More information

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

Homeland Security Presidential Directive/HSPD-5 1

Homeland Security Presidential Directive/HSPD-5 1 For Immediate Release Office of the Press Secretary February 28, 2003 Homeland Security Presidential Directive/HSPD-5 1 Subject: Management of Domestic Incidents Purpose (1) To enhance the ability of the

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Cyber Security for audit committees

Cyber Security for audit committees AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting

More information

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote

More information

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Notes abstracted from Desmond Ball, China s Cyber Warfare Capabilities, Security Challenges, Vol. 7, No. 2, Winter 2011, pp. 81-103).

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS Presentation to the Cyber Security & Critical Infrastructure Protection Symposium March 20, 2013 PREPARED REMARKS BARBARA ALEXANDER, DIRECTOR OF CYBER INTELLIGENCE TASC INFRASTRUCTURE PROTECTION AND SECURITY

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Boeing is working with industry to establish a unified cyber strategy and deliver cyber security solutions to airlines worldwide.

Boeing is working with industry to establish a unified cyber strategy and deliver cyber security solutions to airlines worldwide. Boeing is working with industry to establish a unified cyber strategy and deliver cyber security solutions to airlines worldwide. 24 Securing Airline Information on the Ground and in the Air The ability

More information

Cybersecurity Workforce Opportunities

Cybersecurity Workforce Opportunities Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator The Cybersecurity Need Growing Exponentially

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

Cyber Adversary Characterization. Know thy enemy!

Cyber Adversary Characterization. Know thy enemy! Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE JULY 2011 CONTENTS INTRODUCTION 1 STRATEGIC CONTEXT 2 FIVE STRATEGIC INITIATIVES Strategic Initiative 1: Treat cyberspace as an operational domain

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education ANSER and AMERICAN MILITARY UNIVERSITY Homeland Security Education AGENDA Introduction Program Administration: AMU Content Administration: ANSER Homeland Security Courses Academic Degree Integration Options

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

NATIONAL DEFENSE AND SECURITY ECONOMICS

NATIONAL DEFENSE AND SECURITY ECONOMICS NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions

More information

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015 UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

More information