Cybersecurity Challenges and Research Direction NSF Research Activities in C
|
|
|
- Jocelyn Tate
- 10 years ago
- Views:
Transcription
1 Cybersecurity Challenges and Research Direction NSF Research Activities in C Trustworthy Computing Prof. Ty Znati, Division Director Computer and Network Systems Computer and Information Science and Engineering National Science Foundation Trust in the Information Society Leon, Spain 10 th and 11 th of February 2010
2 The security threat Outline NSF activities in security research Towards a Science of Security Reliability, Privacy and Usability CNCI: A multi U.S. Agency security initiative that seeks Other Related Funding Opportunities at NSF International Collaboration Concluding Remarks
3 From a Network of Networks to a Complex Social technical Machine Our systems have evolved into a complex ensemble of ubiquitous and pervasive devices and people networked together, communicating spontaneously with each other and with their environments, creating content and sharing knowledge, over heterogeneous communications networks and physical substrates
4 The Threat Our nations face serious cyber threats upon our national infrastructures A massive cyber attack upon our Nation s critical infrastructures is plausible and would have staggering adverse consequences. Technology convergence, innovation, and even rapid obsolescence open up new cyber vulnerabilities faster than old vulnerabilities can be closed. Globalization of information technology despite its benefits also has adversely affected our technical leadership and competitiveness.
5 Never Ending Race! Cyber attacks a on our nation s critical infrastructures are increasing and having cascading effects There is the real specter of cyber terrorism on our nation Estonia and Taiwan cases are but forewarnings Botnets are the attack du jour, but other kinds of crippling attacks are predicted On-line crime is reputed to cost $200B/year Ubiquitous/Pervasive it i computing despite its many advantages poses a threat to citizens privacy The future of electronic voting and, even, Internet voting poses threats to our nation s democratic institutions
6 Cornflicker Botnet Cumulative Infections 31 January 2009, SRI International The Conficker Worm A Global Pandemic Artist illustration Over 10,000,000 IPs affected worldwide Command and control mechanism identified and shut down by the Conficker Cabal New versions of malware released on the Internet SRI NSF project identified new versions and new threats 6
7 Without trust in cyber space our critical infrastructures t and privacy are at significant risk
8 Future Global Networks It is not just a technology that connects computers together, but a complex structure deeply embedded in the larger social, economical, legal and political context Different contexts will stress the network in different ways The Challenge is how to avoid banking in un-necessary cultural norms in the design process, while meeting the wide range of functional and performance requirements!
9 Fundamental Challenge As critical as networks are to our lives and diverse sectors of our society, we have little rigorous knowledge when it comes to understanding their complex structure, dynamics and holistic behaviors. A key factor is the interdependence among the physical, informational and social networks Is there a science for understanding the complexity of our networks such that we can engineer them to have predictable (adaptable) behavior?
10 Science Implications Taming complexity for a deeper understanding of both the interactions and inter dependence between the different layers and their components
11 What Makes Things Complex? Complex has many common associations Something is complex if our powers of logic struggle to see through h it if it has many factors, variables and potential outcomes, if it admits no simple formula exposition, must be examined from multiple and complementary angles and points of view Richness of Structure Richness of Behavior Richness of Detail Delicate Relationships
12 Complicated and Complex Systems Complicated Systems A complicated system is one that is composed of a large number of parts, and whose behavior can be entirely understood by reducing it to its parts. Complex Systems A complexsystem consists of a large number of components whose interactions lead to rich dynamics with patterns and fluctuations on many scales of space and time.
13 Complex Systems Characteristics A unique property characterizes complex systems the phenomenon of emergence Non linear interactions among system components that lead to unanticipated, emergent behaviors This property makes it hard to design and control complex systems with strategies derived from simple deduction or linear reasoning
14 Curse of Complexity Unintended and unanticipated consequences of changes in complex systems lead dto unexpected tdfil failures Oscillations, Instabilities Complex systems exhibit various degrees of resolution in their structure and components This makes it difficult to study complex systems using traditional methods Difficult to capture essential relationships between entities Limited ability to reason about the overall behavior
15 Classical Approach to Science Evaluation Modeling Experimentation Do it Over Again Observations Understanding d Refinement Inferences Patterns Assumes some level of specification
16 Knowledge and Abstraction Complexity brings about a marked shift in our concerns with knowledge, our perceptions of problems and attempts at their solutions Hard to determine what can be known and how knowledge can be achieved in the presence of emergent behaviors If abstraction forming is a basic tool for coping with large scale system design, is it still possible to capture global behavior under uncertainty?
17 Toward a Theoretical Foundation To what extent does there exist a structure that gives rise to the properties of large scale complex systems? Are there universal laws that govern the structure and consequently the behavior of complex networked systems? Can a theory be developed to assess the vulnerabilities and fragilities inherent in complex networked systems to better understand their behaviors? How can this knowledge be used to design, organize, build, and manage complex networked systems?
18 Models for Complex Socio Technical Networks Needed are models that capture the interplay between the dynamics of the network (behavior) and the evolution of the network (structure) Network Behavior: Dynamics ON Networks Network Evolution: Dynamics OF Networks
19 National Science Foundation Office of Inspector General National Science Board Office of the Director Administrative Offices CISE Directorate for Biological Sciences Directorate for Computer & Information Science & Engineering Directorate for Education & Human Resources Directorate for Engineering Directorate for Mathematical & Physical Sciences Directorate for Social, Behavioral & Economic Sciences Office Cyberinfrastructure Office of International Science & Engineering Directorate for Geosciences Office of Polar Programs
20 CISE Organization CISE Office of the Assistant Director Dr. Jeanette Wing Assistant Director Dr. Deborah Crawford Deputy AD CCF Computing and Communications Foundations Division i i Director Dr. Sampath Kannan CNS Computer and Network Systems Division i i Director Dr. Ty Znati IIS Information and Intelligent Systems Division i i Director Dr. Haym Hirsh NSF provides 87% of all Federal support for basic research in computer science
21 NSF Mission in CyberSecurity Support leading edge fundamental research on computer based systems and networks that Function as intended, especially in the face of cyber events Process, store and communicate sensitive information according to specified policies Address the concerns of individuals and society about privacy and usability Educate the next workforce and inform the public Systems of national significance, e.g., in critical infrastructures, finance, elections, healthcare, national defense, national scale l databases, air traffic control, and systems important to individuals, e.g., automobiles, office systems, homes Collaborative activities addressing the full scope of dependable systems (reliability, safety, security, etc.) and other research areas (e.g., confidentiality and usability of research data)
22 NSF s Role in Cybersecurity Research and Education Goals Exercise leadership in science and technology to build trust incyber space Create a technological future for cyber space that benefits and advances society for generations to come Strategy Fund foundational, long term open (unclassified) research in cybersecurity Ensure scientific and technical excellence Balance portfolio of theoretical and experimental research Education and training of next generation scientists in cybersecurity
23 FY09: Cyber Trust has Transitioned into Trustworthy Computing (TC) Trustworthy = Reliability + Security + Privacy + Usability Deeper and broader than Cyber Trust Five areas, with particular focus on research that cuts across privacy and usability Fundamentals: new models that are analyzable, cryptography, composability (even though security is not a composable property), new ways to analyze systems Privacy: definition of privacy, threats, metrics, security, regulation, database inferencing, tradeoff with other requirements Usability: for lay users and security administrators Security Architecture: Putting point solutions together, towards a future secure Internet (which includes the network, hosts and applications) Evaluation: experimental, testbed design and deployment
24 Is There a Science of Security? Are there impossibility results? Are there powerful models (like Shannon s binary symmetric channel) so that realistic security and privacy properties can be computed? Possibilities include: Control Theory for security Kirchoff like laws to capture normal behavior of routers and other devices Is there a theory that enables: Secure systems to be composed from insecure components, or even Secure systems to be composed from secure components? Metrics: Is there a theory such that systems can be ordered (or even partially ordered) with respect to their security or privacy? Can entire systems (hosts, networks) and their defenses be formally verified with respect to realistic security objectives and threats? Are there security related hypotheses that can be validated experimentally? What kind of an instrument (testbed) is needed to validate such hypotheses? NSF/IARPA/NSA organized a workshop on SOS, Nov. 2008
25 Research Directions in Trustworthy Anticipate and understand future cyber threats arising from advances in Pervasive computing g( (espp privacy, y,p provenance, attestation) Service oriented architectures (esp composable, provable trusts, policies) Cross enterprise (and cross coalition) sharing and interoperation Research into the foundations of trust The limits of what can and cannot be known about trust Is there a Science of Security? And similarly for Privacy. Covert channels and information hiding affecting security and trust Cryptography research concentrates on faster provably secure algorithms Special economic and societal impact Anonymity, anti spam, anti spyware, competitiveness, critical infrastructures Towards an overarching security architecture that integrates the many but specific solutions NSF PIs have developed Go beyond our current band aid approach to security Test beds and Methodology for Experimentation and Evaluation Continued joint development of research testbeds including DETER, ORBIT, Repository of anonymized sharable test data based on actual events/behaviors Open source software and wide distribution of benchmark results
26 Comprehensive National Cyber Security Initiative CNCI is a multi U.S. US agency initiative towards securing critical infrastructures Much of it is short term term to shore up current critical systems Grass Roots research directed effort that morphed into CNCI Leap Ahead that is looking out 10 years Organized workshops Many took place and others are in planning stages Interest especially in the intersection of security, policy and economics Industry and international participation sought An education effort with the goal of more security experts at many different levels
27 CNCI: Key Questions to Guide Research 1. How do we optimize/derive identity management and authentication procedures while balancing requirements forprivacy including anonymity on the digital infrastructure? 2. Who is responsible/accountable for the protection of rights and property given the dichotomy between the conduit and the information that flows on it fall under different regulatory/ compliance regimes? 3. How do we reach a vision for a future (trusted, resilient, survivable ) architecture? 4. How do you get industry buy in and connect them to the research agenda? 5. There has been a great deal of research on fail safe, self healing, software networks what is the status and can it be leveraged now for some of the transformation initiatives (e.g., Smartgrid, Nextgen FAA, Health IT)? 6. How can the U.S. collaborate with its allies towards a cooperate cyber defense architecture t and to mitigate t attacks
28 Other Related Funding Opportunities at NSF
29 Scope NetSE Broad Agenda Workshops GENI Future Activities NetSE Program Time
30 NetSE Context Network Design and Architecture Network Foundation People and Information FIND SING NGNI Network Science and Engineering
31 NetSE Program Scope NetSE program encourages researchers to engage gg in integrative thinking to advance, seed and sustain the transformation of networking research to enable the socio technical networks of the future. The focus is on innovative research that address new or as yet unsolved critical network challenges that by their nature require expertise and synergy from different disciplines Computing and other relevant fields such as engineering, mathematics, economics, and the social sciences.
32 Future Internet Architectures Funding opportunity for collaborative, multi disciplinary, fundamental and possibly radical innovationsin networking, leading to the architecture of a Future Internet that is trustworthy, economically viable ibl and preserving of our social norms and values Trust, broadly defined, is a mandatory requirement Expect to fund 2 4 projects at $3M/year for 3 Expect to fund 2 4 projects at $3M/year for 3 years
33 Cyber-Enabled Discovery and Innovation (CDI) Five year initiative Cross NSF Paradigm changing trans disciplinary projects Innovation in computational models, methods and tools
34 CDI s Themes CDI Project Types 1. From Data to Knowledge Enhancing human cognition and generating new knowledge from a wealth of heterogeneous data 2. Understanding Complexity in Natural, Built, and Social Systems Discovering fundamental insights on systems composed of multiple interacting elements 3. Building Virtual Organizations Enhancing discovery and innovation by bringing people and resources together across institutional, geographical and cultural boundaries
35 Expeditions in Computing Program 35 2/18/2010
36 Expeditions In Computing Goals Promote bold, ambitious, transformative research that explores new scientific frontiers which promise disruptive innovations to help define the future of computing Catalyze far-reaching research in the computing and information fields motivated by hard, emerging g problems and/or compelling applications that benefit society Inspire current and future generations of Americans (esp., underrepresented d groups) to pursue CISE careers Stimulate significant research and education outcomes that promise scientific, economic, and/or societal benefits through effective knowledge transfer
37 Global Collaboration Global collaboration among scientists, engineers, educators, industry and governments can speed the transformation of new knowledge into new products, processes and services, and in their wake produce new jobs, create wealth, and improve the standard of living and quality of life worldwide. Arden L. Bement, Jr. NSF Director Cancun, Mexico August 2005
38 Opportunities and Needs for International Cooperation Much attack activity is indiscriminant significant utility in sharing information via distributed sensors With caveat that even so, perspectives are not homogeneous Non-local defenses require international coordination Whether proactive (e.g., anti-spoofing) or reactive Incident response & forensics require international ti coordination Some facets of organized cybercrime appear to have national components NSF (with DHS) is collaborating with the EC (and other bodies on the design of a Future Internet) NSF offers supplements to U.S. PIs
39 International Research Partnerships International ti lresearch hcollaboration Current tstatet In general, we have authorization to encourage, enable joint research; but there is no demand that we do so. Is it Time to Revisit International Collaboration? Allow researchers from each side to participate in research projects Allow for joint projects whereby US and European researchers Should funding be set aside for these activities Should specific calls? How to overcome the red tape?
40 Geographical Dispersion an Issue? Difficult to establish mutual regard and common ground, increased misunderstanding Delays in project schedule and poor monitoring of progress may be problematic Information and awareness distributed unevenly
41 Concluding Remarks Our complex, socio technical networks of the future are too important to be left to random developments Sound Theoretical Foundation Best way to predict the future is to invent it! Science to engineer networks with predictable behavior Science of security to enable a Paradigm Shift True experimentation is needed. Shared experimental infrastructure to enable, understanding, implementation and deployment of socio technical networked systems of the future International collaboration is a must! Industry and Academia
42 Thank You! Acknowledgement: J. Wing, NSF NeTS and NetSE Teams, NSF Trustworthy Computing Team, CISE GENI Team and TwC PIs.
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
US Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21) Goal Develop and deploy comprehensive, integrated, sustainable, and secure cyberinfrastructure (CI) to accelerate research
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009
National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43%
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43% Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Division of Behavioral and Cognitive Sciences STRATEGIC PLAN
Division of Behavioral and Cognitive Sciences STRATEGIC PLAN NATIONAL SCIENCE FOUNDATION Directorate for Social, Behavioral, and Economic Sciences November 2011 National Science Foundation Directorate
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
Big Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
Nokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Cyber and Operational Solutions for a Connected Industrial Era
Cyber and Operational Solutions for a Connected Industrial Era OPERATIONAL & SECURITY CHALLENGES IN A HYPER-CONNECTED INDUSTRIAL WORLD In face of increasing operational challenges and cyber threats, and
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities
IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
National and Transnational Security Implications of Big Data in the Life Sciences
Prepared by the American Association for the Advancement of Science in conjunction with the Federal Bureau of Investigation and the United Nations Interregional Crime and Justice Research Institute National
REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY
102 S Hall Rd Berkeley, CA 94720 510-664-7506 [email protected] REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY The University of California, Berkeley Center for Long-Term Cybersecurity (CLTC)
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development
Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC) 3 12 February 2015 Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching,
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Cybersecurity as a Risk Factor in doing business
Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86.
ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Services Competitive Product Strategy Leadership Innovation Award and Leadership Award
2013 2014 2014 Global Governmental 2013 North American Online Voting SSL Certificate and Election Modernization Services Competitive Product Strategy Leadership Innovation Award and Leadership Award Frost
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
Northrop Grumman White Paper
Northrop Grumman White Paper A Distributed Core Network for the FirstNet Nationwide Network State Connectivity to the Core Network April 2014 Provided by: Northrop Grumman Corporation Information Systems
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
The Massachusetts Open Cloud (MOC)
The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
Modalities for Cyber Security and Privacy Resilience: The NIST Approach
Modalities for Cyber Security and Privacy Resilience: The NIST Approach ABSTRACT Janine S. Hiller Virginia Tech [email protected] Roberta S. Russell Virginia Tech [email protected] Cybersecurity was a major
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Re: Big Data: A Tool for Inclusion or Exclusion? Workshop Project No. P145406
October 30, 2014 Federal Trade Commission Office of the Secretary Room H 113 (Annex X) 600 Pennsylvania Avenue NW Washington, DC 20580 Re: Big Data: A Tool for Inclusion or Exclusion? Workshop Project
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Cisco Remote Management Services for Financial Services
Cisco Remote Management Services for Financial Services The global financial services industry continues to evolve to adjust to a shifting market landscape and increased customer expectations. With demand
Workshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel [email protected] WG2 : network information & cybersecurity International
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
UK s new Research Institute investigates the science of cybersecurity
UK s new Research Institute investigates the science of cybersecurity Government Communications Headquarters (GCHQ) How do we know when we are secure enough? How do we decide how best to spend our precious
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
