The Road to Cyber Power
|
|
|
- Prudence Marshall
- 10 years ago
- Views:
Transcription
1 0 Presentation to the Norman Forde Hampton Roads Chapter of the Association of Former Intelligence Officers The Road to Cyber Power Cyber Age, Cyberspace, Cyberpower, Cybersecurity, Commercial/Goverment Action Christopher Newport University October 28, 2009
2 1 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
3 2 Over the last 250 years, waves of creative destruction emerge around the convergence of new technologies and organizational innovations Textiles, Canals and Machinery Steam, Coal, Iron and Rail Steel, Chemicals and Electricity Oil, Auto and Electronics Info and Com. Technology Age of Nano-Bio Tech and Robotics Agricultural Revolution ( ) % of GDP 1771 Canal Mania Railway Mania The Gilded Age Roaring 20s Internet Craze Nano Nonsense FIRST WAVE SECOND WAVE THIRD WAVE FOURTH WAVE FIFTH WAVE SIXTH WAVE ? 58 years 44 years 45 years 53 years 49 years 50 years Adapted from The Economist, Carlota Perez These waves create new industries, transform the underlying social and political-military systems, and create new sources and centers of power
4 3 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
5 4 The number of users and methods used to access cyberspace have grown exponentially in size, scope and complexity Exponential Growth New Technologies Global Adoption Growth in the developed world exploded over the last 20 years and will accelerate as a result of new technologies and reduced prices fueling the adoption of ICT in the developing countries Internet Users in China < 1 million 1.6 billion Internet Users 11 million 3 billion Cell Phones $100 laptops Miniaturized Smart Devices 111m 660m Petabytes 1600 Exobytes Digital Data 300, million Ubiquitous Wireless Networks Internet Hosts IP v6 Internet Users in India 21m 400m By 2020, there will be almost 3 billion internet users, driving massive new investments in infrastructure, technology, and new security architectures
6 ICT has transformed business models and warfighting, improving productivity and driving economic growth Massive Investment Mission Enablement Growing Vulnerabilities Industry and government invest $4t in ICT goods and services every year These investments have transformed business models and military operations while exposing substantial vulnerabilities and risks Computers $400b Finance: $3.2t per day in foreign exchange Hackers steal 40 million credit card numbers Software Servers Network Equipment $360b $60b $100b Health: Electronic Health Records Energy: 300k kilometers of lines carrying 3.8 b kilowatts per year E-Commerce: $200b in on-line sales Air Transportation: 741 million passengers per year Hackers steal 8.3 million Health Records Electricity grid in U.S. penetrated by spies Hackers break into FAA Air Traffic Control Systems Semiconductors $260b Defense: Network-Centric Operations However, greater dependence on ICT creates new vulnerabilities and risks for individuals, industry and government 5
7 6 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
8 7 Both the current and former administrations understood the importance of cyber to the nation, as evidenced by robust policy and budget actions Enable the Economy Empower Society Enhance Security Digital Health Goal: Interoperable Electronic Medical Records Funding: $20-50b (5 years) Agencies: HHS, DoD, and DVA Intelligent Transportation Systems Goal: Smart Highways and Air Traffic Systems (NGATS) Funding: $20-30b (20 years) Agencies: DOT, NASA, DoD Rural Broadband Goal: Expand Broadband Infrastructure Funding: $7.2b Agencies: Commerce/NTIA and Agriculture/Rural Utilities Service Digital Education Goal: Improve Education through better Performance Data Funding:??? Agencies: Dept. of Education, State and Local, Private Mission Enablement Goal: Network-Centric Operations Funding: $20-30b Agencies: DISA, Services, UCC Network Defense Goal: Protect.mil and.gov networks Funding: $20-30b Agencies: DISA, DHS, Services, UCC (Cyber Command) Smart Energy Grid Goal: Improve efficiency through better data Funding: $10b (? Years) Agencies: Dept. of Energy, NERC, Utility Companies Digital Government Goal: Improve Transparency and Accountability Funding: $??b (? Years) Agencies: EOP, OMB, Agencies Network Exploitation Goal: Improve Intelligence Collection Funding: $??b Agencies: Intelligence Community, DoD CNCI Financial Reform Goal: Improve Transparency of Financial Markets and Protect Networks Funding:??? Agencies: Treasury, SEC,CFTC, Federal Reserve Digital Television Goal: Maximize Spectrum Improve TV Services Funding:??? Agencies: FCC, Commerce Network Attack Goal: Create new Military Capabilities Funding: $??b Agencies: Intelligence Community, UCC
9 8 Despite the convergence of interests, an inherent tension exists between all three in regards to the means of securing cyberspace Access and Inclusion Innovation and Growth Security and Safety Understanding and addressing these key tension is key to realizing the full benefits of cyber while managing the risks
10 9 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
11 10 Cybersecurity needs a multidisciplinary approach addressing all levels international, domestic, and organizational - and all sectors civil society, business and government POLICY & GOVERNANCE (legal, regulatory, policy, strategy, authorities) LEADERSHIP & CULTURE (communication, incentives, human capital, training) International PLANNING & OPERATIONS (planning, info. sharing/collab., operations, lessons learned) TECHNOLOGY & STANDARDS (R&D, architecture, standards, solutions) MANAGEMENT & BUDGETING (planning, programming, budgeting, performance) National Organizational/Agency
12 11 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action
13 12 Strategy: Cyber University will contain all the learning assets for staff who want to develop their cyber knowledge, skills, and abilities Cyber University is a tool to help develop staff, quickly and cost effectively, who are able to perform high-quality work for Booz Allen cyber clients Cyber University contains lists of all cyber related courses, cyber certifications (including preferred vendors), and universities with top cyber programs Learning roadmaps will be designed for key cyber roles so staff will have a clear path to follow to develop cyber skills Cyber University will track cyber certifications and will allow staff to show skill proficiency to quickly move through the roadmap
14 13 Navy: Is aligning commands, functions and people in an unprecedented manner to meet the mission requirements of Cyber, IO, Intel, Space, and NetOPS IOC after 1 Oct 09 Strategy in progress-governance for program, operations and people is a priority Over 3,000 people involved just at IOC Information Dominance Corps in design No major location migrations besides growth at TENTH Fleet build out at Ft Meade anticipated Navy Staff model will be function focused to break platform centric thinking/programming NAVCENT NAVEUR New Navy Cyber Forces l AIRFOR SUBFOR FLTCOM s NAVAF NAVSOUTH PACFLT NSW USFF TYCOM Embedded SME Support Man, Train, & Equip SURFOR M,T&E CNO NAVSOC N2/N6 DCNO Information Dominance DIRLAUTH NAVY Network Warfare Command OPCON New ADCON Fleet Operational Missions STRATCOM USCYBERCOM OPCON OPCON OPCON OPCON NCTAMS New NCDOC FLTCYBERCOM/ US TENTH FLT NIOCs/CTFs OPERATIONS NSA SCE NIOC SUITLAND (RDT&E) SPAWAR supporting Navy undertaking most wide reaching/and boldest alignment The Navy has taken the additional significant step to integrate the N2 (intelligence) and N6 (communications) staffs on the Navy Staff
15 14 USCYBERCOM Organization DISA Field Office (DFO) Director s s liaison to USCYBERCOM Forward-based at Fort Meade Target: 50% manning NLT 1 Oct 2009 DISA Support Element (DSE) Liaison between Joint Operations Center (JOC) and DISA Operations Shared Situational Awareness Embedded in JOC (24 x 7)
16 15 QUESTIONS? Shift Happens Video
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Dr. Starnes Walker Technical Director / CTO Fleet Cyber Command FLTCYBERCOM TENTH FLEET 1 Agenda Fleet Cyber Command (FCC) /10 th Fleet Introduction Technical
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
How To Build A Cybersecurity Company
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
DON Cybersecurity/Information Assurance Workforce Management
DON Cybersecurity/Information Assurance Workforce Management 23 March 2010 Chris Kelsall DON CIO, Director, Cyber/IT Workforce Steps to Transform IAWF Management Charter DON team to determine best approach
SolarWinds Federal Cybersecurity Survey Summary Report
SolarWinds Federal Cybersecurity Survey Summary Report March 26, 2014 2014 Market Connections, Inc. BACKGROUND AND APPROACH 2 Background and Approach SolarWinds and Market Connections worked together to
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
Improvements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
Cybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop
Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination
GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Service Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
Guiding principles for security in a networked society
ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in
Marine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
( Increased usage of IP addresses )
IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
Network Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Federal Cloud Computing Strategy
Federal Cloud Computing Strategy Vivek Kundra U. S. Chief Information Officer www.whitehouse.gov The Case for Change 90 Manufacturing Capacity Utilization 80 Manufacturing Average 79% 70 60 % Utilization
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
U. S. Fleet Cyber Command / TENTH Fleet. Strategic Plan 2015 2020
U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 2020 U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 2020 Foreword New warfighting platforms do not spring full-grown from their
11-09-2013. Cyberspace Strategic Impact Social Risk Management. Cyber Security and Cyber Defence. Cyber Defense: NATO Vision
Agenda Cyberspace Strategic Impact Social Risk Management Cyber and Cyber Defence Cyber Defense: NATO Vision Cyber Strategic Concept Conclusions Seminar Cyber : An Action to Establish the Cyber Center
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Industrial Internet & Advanced Manufacturing
Industrial Internet & Advanced Manufacturing Marco Annunziata, Chief Economist April 08, 2014 Imagination at work. The Future of Work Advanced Manufacturing + The Industrial Internet + The Global Brain
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
AT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
The DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
Industrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,
Resilient and Secure Solutions for the Water/Wastewater Industry
Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011
China s Economic Espionage
China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada
Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada February 2010 Overview Canada is a world leader in many areas: energy, natural resources and the financial services
Comments :Incentives To Adopt Improved Cybersecurity Practices
Comments :Incentives To Adopt Improved Cybersecurity Practices 1. Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year
Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012
Development and Outlook of Internet of Things in China CATR of MIIT June 5, 2012 Contents I. Development of Internet of Things in China Main Contents II. Outlook of Internet of Things in China 2 IoT for
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
NICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
DISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
Compliance, audit, risk, security what s the difference and why do we need it?
Compliance, audit, risk, security what s the difference and why do we need it? Presented By: Sandy Bacik, Principal Consultant Agenda Defining compliance, audit, risk, and security What is the difference
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
