DHS S&T Cyber Security Division (CSD) Overview
|
|
|
- Robyn Houston
- 10 years ago
- Views:
Transcription
1 Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview NDIA Executive Briefing Crystal City, VA February 17, 2011 Douglas Maughan, Ph.D. Division Director Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) /
2 S&T Mission Conduct, stimulate, and enable research, development, test, evaluation and timely transition of homeland security capabilities to federal, state and local operational end-users. 17 February
3 DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology solutions for the Homeland Security Enterprise 17 February
4 S&T Goals 17 February
5 17 February
6 R&D Execution Model Post R&D Customers * NCSD * NCS * USSS * National Documents Customers Other Sectors e.g., Banking & Finance Prioritized Requirements Pre R&D Critical Critical Infrastructure Infrastructure Providers Providers Outreach Venture Community & Industry Experiments and Exercises R&D Coordination Government & Industry Workshops CIP Sector Roadmaps DNSSEC R&D SPRI Solicitation Preparation CI / KR Energy, B&F, O&G Cyber Forensics HOST Education / Competitions Supporting Programs BAAs SBIRs DETER PREDICT 17 February
7 Sample Product List Ironkey Secure USB Standard Issue to S&T employees from S&T CIO Coverity Open Source Hardening (SCAN) Analyzes 150+ open source software packages daily (later) USURF Cyber Exercise Planning tool Recently used in MA & WA state cyber exercises Secure64 DNSSEC Automation Several commercial customers; Government pilots underway HBGary Memory and Malware Analysis pilot deployments as part of Cyber Forensics program 17 February
8 Sample Product List - 2 Grammatech Binary Analysis tools Used by several Intel agencies; commercially available Telcordia Automated Vulnerability Analysis In use by DOD, SEC GMU Network Topology Analysis (Cauldron) In use at FAA, several commercial customers Stanford Anti-Phishing Technologies Open source; most browsers have included Stanford R&D Secure Decisions Data Visualization Pilot with DHS/NCSD/US-CERT in progress 17 February
9 Cyber Security Program Areas Internet Infrastructure Security Critical Infrastructure / Key Resources (CI/KR) National Research Infrastructure Cyber Forensics Homeland Open Security Technology (HOST) Identity Management / Data Privacy Internet Measurement and Attack Modeling Software Assurance - Tools and Infrastructure Next Generation Technologies Exp Deployments, Outreach, Education/Competitions Comp. National Cybersecurity Initiative (CNCI) Small Business Innovative Research (SBIR) 17 February
10 Internet Infrastructure Security DNSSEC Domain Name System Security Working with OMB, GSA, NIST to ensure USG is leading the global deployment efforts Working with vendor community to ensure solutions SPRI Secure Protocols for Routing Infrastructure Working with global registries to deploy Public Key Infrastructure (PKI) between ICANN/IANA and registry and between registry and ISPs/customers Working with industry to develop solutions for our current routing security problems and future technologies 17 February
11 Critical Infrastructure / Key Resources - 1 LOGIIC Linking Oil & Gas Industry to Improve Cybersecurity A collaboration of oil and natural gas companies and DHS S&T to facilitate cooperative research, development, testing, and evaluation procedures to improve cyber security in Industrial Automation and Control Systems Consortium under the Automation Federation TCIPG Trustworthy Computing Infrastructure for the Power Grid Partnership with DOE funded at UIUC with several partner universities and industry participation Drive the design of an adaptive, resilient, and trustworthy cyber infrastructure for transmission & distribution of electric power, including new resilient smart power grid DECIDE (Distributed Environment for Critical Infrastructure Decisionmaking Exercises) Provide a dedicated exercise capability to foster an effective, practiced business continuity effort to deal with increasingly sophisticated cyber threats Enterprises initiate their own exercises, define their own scenarios, protect their proprietary data, and learn vital lessons to enhance business continuity The Financial Services Sector Coordinating Council R&D Committee has organized a user-group of subject matter experts paid by their respective financial institutions to support the project over the next two years. 17 February 2011
12 Critical Infrastructure / Key Resources - 2 MOU between DHS S&T, NIST, and FS Sector Coord Council (FSSCC) in coordination with WH Framework for publicprivate collaboration on R&D projects for the FS Initial projects High Assurance Domains (e.g., DNSSEC) Identity Management 17 February
13 National Research Infrastructure DETER - Researcher and vendor-neutral experimental infrastructure that is open to a wide community of users to support the development and demonstration of next-generation cyber defense technologies Over 170 users from 14 countries (and growing) PREDICT Repository of network data for use by the U.S.- based cyber security research community Privacy Impact Assessment (PIA) completed Over 140 datasets and growing; Over 100 active users (and growing) End Goal: Improve the quality of defensive cyber security technologies 17 February
14 Cyber Forensics Initial requirements working group held Nov 2008; second meeting held Oct 2010 Attendees from USSS, CBP, ICE, FLETC, FBI, NIJ, NIST Initial list of projects Mobile device forensic tools GPS forensics tools LE First responder field analysis kit Combined High-speed data capture and deep packet inspection Live stream capture for gaming systems Memory analysis and malware tools Information Clearing House S&T initiated 6 projects in FY09; More in FY11 17 February
15 Homeland Open Security Technology (HOST) Promote the development and implementation of open source solutions within US Federal, state and municipal government agencies 17 February
16 HOST Program Areas Information Portal Federal Government Open Source Census GovernmentForge Open Source Software Repository Documentation Standards, Best Practices Community Outreach New open source IDS/IPS OISF and Suricata Information Assurance / Security US Government security evaluation processes (OpenSSL) S&T initiated HOST in FY09/10 17 February
17 Identity Management 17 February
18 Case Study Case Study Report Published on Credentialing Challenges Multiple stove-piped credentials Multi-jurisdictional response to large-scale disasters Lack of trust and interoperability Too many credentials! Insecure physical and logical access 17 February
19 Internet Measurement / Attack Modeling Technologies for the protection of key infrastructure via development of, and integration between, reliable capabilities such as: Geographic mapping of Internet resources, (e.g., IPV4 or IPV6 addresses, hosts, routers, DNS servers, either wired or wireless), to GPS-compatible locations (latitude/longitude). Logically and/or physically connected maps of Internet resources (IP addresses, hosts, routers, DNS servers and possibly other wired or wireless devices). Detailed maps depicting ISP peering relationships, and matching IP address interfaces to physical routers. 17 February
20 Internet Measurement / Attack Modeling Monitoring and archiving of BGP route information. Development of systems achieving improvement to the security and resiliency of our nation s cyber infrastructure. Monitoring and measurement applied to detection and mitigation of attacks on routing infrastructure, and supporting the development and deployment of secure routing protocols. Monitoring and measurement contributing to understanding of Domain Naming System (DNS) behavior, both in terms of its changing role in distributed Internet scale malware activities, such as botnets, and DNS s behavior as a system under change through DNSSEC and other potential changes affecting the root level. 17 February
21 RouteViews Data in Real-Time You can receive updates and routing tables in real-time Updates: TCP port Tables: TCP port February
22 AMITE: New Results IP hitlist evaluation and Conclusions address visualization improvements AS-to-org. mapping 17 February
23 Software Assurance SBIR Phase I Awards See for abstracts Software Assurance Analysis and Visual Analytics Applied Visions, Inc. (NY) Eliminating barriers to code quality and security with increased timeliness and accuracy of analysis Coverity, Inc. (CA) Run Time Tools Output Integration Framework Data Access Technologies, Inc. (VA) Concolic Testing with Metronome Grammatech, Inc. (NY) CodeSonar with Metronome Grammatech, Inc. (NY) Concurrency vulnerabilities: Combining dynamic and static analyses for detection and remediation SureLogic, Inc. (PA) Virtualization and Static Analysis to Detect Memory Overwriting Vulnerabilities Zephyr Software, LLC (VA) 17 February
24 Coverity: scan.coverity.com Give open source community access to entire toolset Open-source developers register their project. Coverity automatically downloads and runs tool over it. Developers get back bugs in coverity s bug database Big success: Roughly 500 projects registered 4,700+ defects actually patched. Some really crucial bugs found; dozens of security patches (e.g., X, ethereal) 17 February
25 Software Analysis Tools Open Source and potentially commercial SWAMP Conceptual Architecture Software Assurance MarketPlace (SWAMP) Other Resources (e.g., High Performance Computing Clusters) Open Source Software (for starters) and potentially all government funded software 17 February
26 Next Generation Technologies R&D funding model that delivers both near-term and mediumterm solutions: To develop new and enhanced technologies for the detection of, prevention of, and response to cyber attacks on the nation s critical information infrastructure. To perform research and development (R&D) aimed at improving the security of existing deployed technologies and to ensure the security of new emerging systems; To facilitate the transfer of these technologies into the national infrastructure as a matter of urgency. TTAs 2, 3, 4, 5, and 8 17 February
27 Experimental Deployments NCSD / US-CERT Botnet Detection and Mitigation technology from Univ of Michigan Data Visualization technology from Secure Decisions (NY) DHS S&T CIO Secure Wireless Access Prototype from BAE Systems (VA) 50 user deployment within S&T; FLETC pilot; Working with CIO/CISO SCADA system event detection technology from Digital Bond (FL) Deployment on S&T Plum Island system DOD Research and Engineering Network (DREN) Botnet Detection and Mitigation technology from Georgia Tech (GA) and Milcord (MA) Regional Technology Integration Initiative (S&T IGD partner) City of Seattle and surrounding cities Botnet Detection and Mitigation technology from Univ of Michigan 17 February
28 Outreach and Partnership Building System Integrator Forum held twice in WDC Assist DHS S&T-funded researchers in transferring technology to larger, established security technology companies Information Technology Security Entrepreneurs Forum (ITSEF) held four times at Stanford in Palo Alto, CA Partner with the venture capital community to assist entrepreneurs and small business better understand both the government marketplace and the venture community Next one in March 2011; Another one in WDC in October 2011 Infosec Technology Transition Council (ITTC) Held tri-annually in Menlo Park, CA Attendees include venture capitalists, industry, law enforcement, academia, and government 17 February
29 Our Education Problem Problem: The U.S. is not producing enough computer scientists and CS degrees CS/CE enrollments are down 50% from 5 years ago 1 CS jobs are growing faster than the national average 2 Taulbee Survey, CRA BLS Computer Science/STEM have been the basis for American growth for 60 years The gap in production of CS threatens continued growth and also national security Defense, DHS, CNCI and industry all need more CS and CE competencies now 1 Taulbee Survey , Computer Research Association, May 2008 Computing Research News, Vol. 20/No. 3 2 Nicholas Terrell, Bureau of Labor Statistics, STEM Occupations, Occupational Outlook Quarterly, Spring February
30 National Initiative for Cybersecurity Education (NICE) National Cybersecurity Awareness (Lead: DHS). Public service campaigns to promote cybersecurity and responsible use of the Internet Formal Cybersecurity Education (Co-Leads: DoEd and OSTP). Education programs encompassing K-12, higher education, and vocational programs related to cybersecurity Federal Cybersecurity Workforce Structure (Lead: OPM). Defining government cybersecurity jobs and skills and competencies required. New strategies to ensure federal agencies attract, recruit, and retain skilled employees to accomplish cybersecurity missions. Cybersecurity Workforce Training and Professional Development (Tri-Leads: DoD, ODNI, DHS). Cybersecurity training and professional development required for federal government civilian, military, and contractor personnel. 17 February
31 CCDC Mission The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide institutions with an information assurance or computer security curriculum a controlled, competitive environment to assess a student's depth of understanding and operational competency in managing the challenges inherent in protecting a corporate network infrastructure and business information systems. CCDC Events are designed to: Build a meaningful mechanism by which institutions of higher education may evaluate their current educational programs Provide an educational venue in which students are able to apply the theory and practical skills they have learned in their course work Foster a spirit of teamwork, ethical behavior, and effective communication both within and across teams Create interest and awareness among participating institutions and students 17 February
32 U.S. Cyber Challenge DC3 Digital Forensics Challenge An Air Force Association national high school cyber defense competition CyberPatriot Defense Competition A Department of Defense Cyber Crime Center competition focusing on cyber investigation and forensics Netwars Capture-the-Flag Competition A SANS Institute challenge testing mastery of vulnerabilities 17 February
33 33 12 CNCI Projects Establish a front line of defense Reduce the Number of Trusted Internet Connections Deploy Passive Sensors Across Federal Systems Pursue Deployment of Automated Defense Systems Coordinate and Redirect R&D Efforts Resolve to secure cyberspace / set conditions for long-term success Connect Current Centers to Enhance Situational Awareness Develop Gov t-wide Counterintelligence Plan for Cyber Increase Security of the Classified Networks Expand Education Shape future environment / secure U.S. advantage / address new threats Define and Develop Enduring Leap Ahead Technologies, Strategies & Programs Define and Develop Enduring Deterrence Strategies & Programs Manage Global Supply Chain Risk Cyber Security in Critical Infrastructure Domains CNCI = Comprehensive National Cyber Initiative 17 February
34 Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes
35 NCLY Summit Topics R&D Themes Cyber economics Digital provenance Hardware enabled trust Tailored Trustworthy Spaces Moving target defense Nature-inspired cyber defense Expectation: Agencies will be using these topic areas in future solicitations (FY11 and beyond) 17 February
36 Transition to Practice Program Activities Technology Discovery Test and Evaluation / Experimental Deployment Transition / Adoption / Commercialization 17 February
37 Small Business Innovative Research (SBIR) FY04 Cross-Domain Attack Correlation Technologies (2) Real-Time Malicious Code Identification (2) Advanced SCADA and Related Distributed Control Systems (5) FY05 Hardware-assisted System Security Monitoring (4) FY06 Network-based Boundary Controllers (3) Botnet Detection and Mitigation (4) FY07 Secure and Reliable Wireless Communication for Control Systems (2) FY09 Software Testing and Vulnerability Analysis (3) FY10 Large-Scale Network Survivability, Rapid Recovery, and Reconstitution 17 February
38 Small Business Innovative Research (SBIR) Important program for creating new innovation and accelerating transition into the marketplace Since 2004, DHS S&T Cyber Security has had: 47 Phase I efforts 22 Phase II efforts 8 efforts currently in progress 8 commercial products available Three acquisitions Komoku, Inc. (MD) acquired by Microsoft in March 2008 Endeavor Systems (VA) acquired by McAfee in January 2009 Solidcore (CA) acquired by McAfee in June February
39 Timeline of Past Research Reports President s Commission on CIP (PCCIP) NRC CSTB Trust in Cyberspace I3P R&D Agenda National Strategy to Secure Cyberspace Computing Research Association 4 Challenges NIAC Hardening the Internet PITAC - Cyber Security: A Crisis of Prioritization IRC Hard Problems List NSTC Federal Plan for CSIA R&D NRC CSTB Toward a Safer and More Secure Cyberspace All documents available at 17 February
40 A Roadmap for Cybersecurity Research Scalable Trustrworthy Systems Enterprise Level Metrics System Evaluation Lifecycle Combatting Insider Threats Combatting Malware and Botnets Global-Scale Identity Management Survivability of Time-Critical Systems Situational Understanding and Attack Attribution Information Provenance Privacy-Aware Security Usable Security 17 February
41 DHS S&T Roadmap Content What is the problem being addressed? What are the potential threats? Who are the potential beneficiaries? What are their respective needs? What is the current state of practice? What is the status of current research? What are the research gaps? What challenges must be addressed? What resources are needed? How do we test & evaluate solutions? What are the measures of success? 17 February
42 Technical Topic Areas (TTAs) TTA-1 Software Assurance DHS, FSSCC TTA-2 Enterprise-level Security Metrics DHS, FSSCC TTA-3 Usable Security DHS, FSSCC TTA-4 Insider Threat DHS, FSSCC TTA-5 Resilient Systems and Networks DHS, FSSCC TTA-6 Modeling of Internet Attacks DHS TTA-7 Network Mapping and Measurement DHS TTA-8 Incident Response Communities DHS TTA-9 Cyber Economics CNCI TTA-10 Digital Provenance CNCI TTA-11 Hardware-enabled Trust CNCI TTA-12 Moving Target Defense CNCI TTA-13 Nature-inspired Cyber Health CNCI TTA-14 Software Assurance MarketPlace S&T (SWAMP) 17 February
43 BAA Program / Proposal Structure NOTE: Deployment Phase = Test, Evaluation, and Pilot deployment in (DHS) customer environments Type I (New Technologies) New technologies with an applied research phase, a development phase, and a deployment phase (optional) Funding not to exceed 36 months (including deployment phase) Type II (Prototype Technologies) More mature prototype technologies with a development phase and a deployment phase (optional) Funding not to exceed 24 months (including deployment phase) Type III (Mature Technologies) Mature technology with a deployment phase only. Funding not to exceed 12 months 17 February
44 DHS S&T BAA Schedule White Paper Registration Feb 16, 2011 White Papers Due March 1, 2011 Proposal Notification April 12, 2011 Full Proposals Due May 26, 2011 Funding Notification July 18, 2011 Contract Awards NLT Oct 31, 2011 Over $40M funded over 36 months 17 February
45 Summary DHS S&T continues with an aggressive cyber security research agenda Working with the community to solve the cyber security problems of our current (and future) infrastructure Outreach to communities outside of the Federal government, i.e., building public-private partnerships is essential Working with academe and industry to improve research tools and datasets Looking at future R&D agendas with the most impact for the nation, including education Need to continue strong emphasis on technology transfer and experimental deployments 17 February
46 Douglas Maughan, Ph.D. Division Director Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) / For more information, visit 17 February
DHS S&T Cyber Security Division (CSD) Overview
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview BAA 11-XX Industry Day WDC November 17, 2010 Douglas Maughan, Ph.D. Division Director Cyber Security
Cyber Security Division Overview
Homeland Security Advanced Research Projects Agency Cyber Security Division Overview Douglas Maughan, Ph.D. Director October 9, 2012 http://www.cyber.st.dhs.gov Environment: Greater Use of Technology,
DHS S&T Cyber Security R&D Program
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA [email protected]
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
An Update from Washington Cybersecurity / R&D
Homeland Security Advanced Research Projects Agency An Update from Washington Cybersecurity / R&D Douglas Maughan, Ph.D. Division Director October 30, 2012 http://www.cyber.st.dhs.gov Environment: Greater
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Cyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Homeland Open Security Technology HOST Program
Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
How To Transition Research Into Practice
2013 IEEE. Appears in IEEE Security & Privacy Magazine, Vol. 11, No. 2, March- April 2013, pp. 14-23. (https://ieeexplore.ieee.org/xpl/articledetails.jsp?tp=&arnumber=6493323) Crossing the Valley of Death
DHS S&T Cyber Security R&D Programs
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security R&D Programs Ann Cox, PhD Program Manager October 24, 2014 http://www.dhs.gov/cyber-research Presentation Outline Threat Space
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
National Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
Cyber Security Division FY 2012 Annual Report
Cyber Security Division FY 2012 Annual Report Cyber Security Divison FY 2012 Annual Report LETTER FROM THE DIRECTOR Douglas Maughan, Ph.D. Cyber adversaries continue to present a full spectrum of threats
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
DHS S&T Cyber Security Division (CSD) Strategic Vision
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) Strategic Vision Douglas Maughan Division Director December 16, 2014 http://www.dhs.gov/cyber-research Presentation
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
US Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
Cybersecurity Resources
Assessment Resources Cybersecurity Resources Cyber Resiliency Review (CRR) is a DHS assessment tool that measures the implementation of key cybersecurity capacities and capabilities. The goal of the CRR
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503. October 30, 2015
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 October 30, 2015 Executive Summary Strengthening the cybersecurity of Federal networks, systems, and data is one
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
NICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
Participants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
Code Dx: Visual analytics for triage of source code vulnerabilities
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Code Dx: Visual analytics for triage of source code vulnerabilities Secure Decisions, a division of Applied Visions, Inc. Anita D Amico Ken Prole September
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
Network Security Deployment Obligation and Expenditure Report
Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
Network Security Deployment (NSD)
Network Security Deployment (NSD) National Cybersecurity Protection System (NCPS) 11 July 2012 What is the NCPS? National Cybersecurity Protection System (NCPS) is the program of record within the Department
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
Shaping the Future of Cybersecurity Education
Shaping the Future of Cybersecurity Education Is N.I.C.E. NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) February 2011 THEPRESENT Comprehensive National Cybersecurity Initiative Training the existing
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
US-CERT Overview & Cyber Threats
US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
GAO Information Security Issues
GAO Information Security Issues Presented to: Federal Audit Executive Council April 18, 2012 1 Agenda Snapshots of Federal Information Security Highlights of Selected GAO Reports GAO Focus Areas List of
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
DHS S&T Cyber Security Division (CSD) PREDICT Overview
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) PREDICT Overview Douglas Maughan Division Director November 2, 2015 http://www.dhs.gov/cyber-research DHS S&T Research
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Homeland Open Security Technology (HOST)
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING Homeland Open Security Technology (HOST) Daniel Massey Program Manager CSD September 16, 2013 Connecting GovIT with Open Security Solutions
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Doug Pearson Director, REN-ISAC [email protected] Copyright Trustees of Indiana University 2003. Permission is granted
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust
Session ID: PNG-F01 Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust Michael E. Smith Senior Cyber Policy Advisor to the Assistant Secretary, Office of Electricity Delivery
EINSTEIN 3 - Accelerated (E 3 A)
for EINSTEIN 3 - Accelerated (E 3 A) April 19, 2013 DHS/PIA/NPPD-027 Contact Point Brendan Goode Director, Network Security Deployment Office of Cybersecurity & Communications National Protection and Programs
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
How To Improve Federal Network Security
Department of Federal Network Trusted Internet Connections (TIC) Update for the Information and Privacy Advisory Board July 29, 2009 Federal Network (FNS) Federal Network Branch Branch Vision: To be the
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?
Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,
