DoD Software Assurance (SwA) Overview
|
|
|
- Curtis Barrett
- 10 years ago
- Views:
Transcription
1 DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19,
2 Outline Current Assurance Outlook DoD Trusted Defense Systems & Networks Strategy What is Software Assurance? SwA integrated into the DoD System Lifecycle SwA as a Systems Engineering Discipline SwA Analysis and Test Resources DoD SwA R&D Strategy Proposed DoD Enterprise Assurance Approach Challenge to Industry May 19,
3 Current Assurance Outlook Threat: Nation-state, terrorist, criminal, or rogue developer who: Exploits vulnerabilities remotely Gains control of systems through supply chain opportunities Vulnerabilities All systems, networks, and applications (Hardware & Software) Intentionally implanted (i.e. malicious code insertion) Unintentional vulnerabilities maliciously exploited (e.g., poor quality or fragile software) Traditional Consequences: Loss of critical data and technology Emerging Consequences: Exploitation of manufacturing and supply chain, and of software vulnerabilities in sustainment Either can result in corruption; loss of confidence in critical warfighting capability Today s acquisition environment drives the increased emphasis: Then Stand-alone systems >>> Some software functions >>> Known supply base >>> CPI (technologies) >>> Now Networked systems Software-intensive and critical functions in Software Prime Integrator, hundreds of suppliers CPI and critical components May 19,
4 Trusted Defense Systems and Networks Strategy Program Protection Plan Drivers/Enablers National Cybersecurity Strategies Globalization Challenges Prioritize by Mission Dependence Comprehensi ve Program Protection Planning USD(AT&L) Download: Increasing System Complexity Pervasive Networks & SW-intensive Systems Enhance R&D for Vulnerability Detection and Response Partner with Industry Report on Trusted Defense Systems Intellectual Property Protection Delivering Trusted Systems USD(AT&L) ASD(NII)/DoD CIO Executive Summary: May 19,
5 What is Software Assurance? Software Assurance. The level of confidence that software functions as intended and is free of vulnerabilities, either intentionally or unintentionally designed or inserted as part of the software throughout the lifecycle. Reference: DoD Instruction , Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) Our objective is to establish software assurance as an accepted SE discipline within the Department. May 19,
6 Software Assurance Integrated into the DoD System Lifecycle MS A Dev t RFP Release Decision MS B MS C FRP Decision or FDD Review Strategic Guidance (OSD/JCS) Joint Concepts (COCOMs) CBA ICD MDD Materiel Solution Analysis Tech Maturation & Risk Reduction CDD Engineering & Manufacturing Development CPD Production and Deployment O&S Tailorable RFP Language is Available AoA Focus Scope of Protection Identify & mitigate sources of software vulnerabilities COTS known vulnerabilities Secure coding practices & automated code analysis tools Secure development environment and toolset SEP ASR SRR SFR PDR CDR PPP Software Assurance Assessment at SE Technical Reviews SEP PPP SEP PPP SwA blends into Engineering Process Processes, Tools, Techniques Requirements & Metrics System Architecture, SW Design, Coding Practice Test and Evaluation Prevent, Detect, Respond SEP PPP PPP SwA in each part of the lifecycle Chain of custody of knowledge, risks and products Engineering level traceability from MDD through disposal Pre-EMD Review Emphasizing Use of Affordable, Risk-based Countermeasures May 19,
7 Software Assurance as a Systems Engineering Discipline: Countermeasure Selection Development Process Apply assurance activities to the procedures and structure imposed on software development Operational System Incorporate countermeasures in the requirements, architecture, design, and acquisition of end-item software products and their interfaces Development Environment Apply assurance activities to the environment and tools for developing, testing, and integrating software code and interfaces Trends Increased use of automated tools for detection, analysis, and remediation Requirement to use SwA tools and methodology across DoD system life cycle Monitor and assess application of software assurance countermeasures Additional Guidance: May 19,
8 SwA Analysis and Test Resources State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation, August 2013 Approach SwA objectives (e.g., countering weaknesses) were organized and consolidated into categories that the DoD acquisition community can use State-of-the-art of SW analysis and test tools and techniques were organized into families SwA objectives were mapped to tools and techniques, providing a sound basis for a tool selection and use methodology by DoD programs Findings There is utility in grouping SwA tools and techniques into families Some tools are costly, and use of any tool or technique incurs program cost Policy, guidance and resources must evolve at pace with constantly changing threats No silver bullet tool or technique exists May 19,
9 DoD SwA R&D Strategy: Focus Areas Near and Long Term Goals Malicious Code Detection Measures of Effectiveness Designed-in Security Near Term Technical Goals Existing and evolutionary: Advanced passive monitoring Data collection across all system layers Near real-time detection and isolation of zero days Workforce education and training Method and Baseline: Effectiveness and cost Across the DoD lifecycle Across Government agencies and industry Advance security in design as early as possible: Reduction of costs and risk for development and sustainment Automated processes, dataintensive design and development Assurance result composability Revolutionary: Automated MoE Assessment and Reporting System: Co-develop System and Evidence for Assurance: Long Term Technical Goals Automated enterprise-wide detection coordination and correlation Threat vector prediction from behaviors, signatures and information external to code Automated trend analysis Community acceptance and standards that drive contracts Simultaneous development of systems and attestation evidence Fully integrated supply chain considerations Verification and Assurance scalable across system size, complexity and criticality Feedback across entire lifecycle May 19,
10 Proposed DoD Enterprise Assurance Approach Identify participating parties AT&L, CIO, Services, Agencies, Parties agree to: Establish a federation of SW and HW assurance capabilities to support DoD programs Bring to bear SW and HW assurance expertise, and capabilities in support of DoD needs Identify capability needs for SwA and HwA R&D program Identify needed improvements in SW and HW assurance tools and methodoligies Procure, manage, and distribute enterprise licenses for SW and HW assurance tools Enhance DoD SW and HW Assurance Infrastructure May 19,
11 System Security Engineering (SSE); Software Assurance Is a cross-cutting, multi-disciplinary area of interest Impacts not only security, but SW development, test, deployment, and operation techniques and practices Has tools and techniques that support cyber security, software design, software development techniques and practices, software test, and supply chain risk management Is a growing area of importance in industry Requires cooperative research, participation, innovation, and engagement Challenges are: Translating systems engineering requirements into SwA contract language Identifying effective contract language and verifying results Specifying metrics for security risks, vulnerability detection, and validated mitigation Training and educating the workforce Building efficacy/scalability of tools and techniques Integrating SwA capability into engineering disciplines May 19,
System Security Engineering and Comprehensive Program Protection
System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST
Software Engineering Framing DoD s Issues
Software Engineering Framing DoD s Issues Ms. Kristen Baldwin Director, Systems Analysis 15 September 2009 09/15/09 Page-1 DDR&E Organization WSARA 2009 - D,DT&E - D,SE - Dev Planning Director, Defense
DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO
DoD Software Assurance Initiative Mitchell Komaroff, OASD (NII)/DCIO Agenda Background Software Assurance Definition and Strategy Guiding Principles for SwA DoD SwA Strategy Elements Industry Outreach
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17th Annual NDIA Systems
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection Kristen Baldwin Principal Deputy, DASD, Systems Engineering United States Department of
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
WORKFORCE COMPOSITION CPR. Verification and Validation Summit 2010
WORKFORCE COMPOSITION CPR PEO IEW&S Organizational Assessment VCSA Brief Date 2010 October 13, 2010 This briefing is UNCLASSIFIED/FOUO PREDECISIONAL LIMITED DISTRIBUTION AS OF: 11 Sep 2010 Verification
Trusted Systems and Networks (TSN) Analysis
Trusted Systems and Networks (TSN) Analysis JUNE 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington, D.C. Deputy Assistant
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
System Security Engineering and Program Protection Integration into SE
System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17
How To Protect Your Data From Being Hacked
Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER [email protected]
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing
Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing Mr. David S. Lane Assistant Director BMDS Acquisition Security Missile Defense Agency 13-14 August
Supply Chain Attack Patterns: Framework and Catalog
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE FOR RESEARCH AND ENGINEERING OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING Supply Chain Attack Patterns: Framework and Catalog
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations
Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
SYSTEMS SECURITY ENGINEERING
SYSTEMS SECURITY ENGINEERING Mission Statement Integrating Security into Every Solution We Deliver Reducing Risk and Providing Fully Reliable and Trusted Solutions Utilizing Best Practices and Rigorous
Achieving True Risk Reduction through Effective Risk Management
Achieving True Risk Reduction through Effective Pete Nolte Deputy Director, Major Program Support Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative
Establishing the Technical FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative Aileen G. Sedmak, Zachary S. Taylor, and Lt Col William A. Riski, USAF (Ret.) Several government
How To Become A Senior Contracting Official
Program Management Specific Functional Requirements for Key Leadership Positions (Attributes and Demonstrated Experience Beyond Level III Certification) Education: o Advanced Degree Preferably in a technical,
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Ideas for a More Proactive Role for Parts Management and DMSMS in Acquisition
Ideas for a More Proactive Role for Parts Management and DMSMS in Acquisition Presented to the Parts Standardization Management Committee April 28, 2015 Objective To identify ideas for how parts management
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
Supply Chain Attack Framework and Attack Patterns
MTR140021 MITRE TECHNICAL REPORT Supply Chain Attack Framework and Attack Patterns Sponsor: DASD SE Dept. No.: Z610 Contract No.: W15P7T-13-C-F600 Project No.: 0713D050-AA The views, opinions and/or findings
UNITED STATES AIR FORCE. Air Force Product Support Enterprise Vision
UNITED STATES AIR FORCE Air Force Product Support Enterprise Vision July 2013 Foreword Product Support is a set of functions and products that enables operational capability and readiness of systems, subsystems,
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
How To Ensure Your Software Is Secure
Software Assurance Countermeasures in Program Protection Planning MARCH 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington,
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield
Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the
NDIA Manufacturing Council: DoD Systems Engineering / Manufacturing Update
NDIA Manufacturing Council: DoD / Manufacturing Update 12 May 2010 Nicholas Torelli Director, Mission Assurance Office of the Secretary of Defense 05/12/2010 Page-1 DISTRIBUTION STATEMENT A -- Cleared
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 16 R-1 Line #145
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Interim DoDI 5000.02 -- The Cliff Notes Version --
Interim DoDI 5000.02 -- The Cliff Notes Version -- A Quick Glance at New Guidance -- 17 December 2013 -- Defense Acquisition University/Midwest Region [email protected] 17 Jan 2014, v 1.0 The New Department
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Dr. David Burns Director for Science and Technology Advanced Technology Missile Defense Agency
Dr. David Burns Director for Science and Technology Missile Defense Agency DISTRIBUTION STATEMENT A. ; Distribution is UNLIMITED. 13-MDA-7174 Modeling and Today s Ballistic Missile Defense System 13-MDA-7174
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Dependable (Safe/Reliable) Systems. ARO Reliability Workshop Software Intensive Systems
Dependable (Safe/Reliable) Systems Composing, Analyzing and Validating s to Assess / Develop / Validate Methods and Supporting Tools for the Creation of Dependable Systems ARO Reliability Workshop Intensive
Software Assurance in Acquisition and Contract Language
Software Assurance in Acquisition and Contract Language Acquisition & Outsourcing, Volume I Version 1.1, July 31, 2009 Software Assurance (SwA) Pocket Guide Resources This is a resource for getting started
Cyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White
Notional Supply Chain Risk Management Practices for Federal Information Systems
NISTIR 7622 Notional Supply Chain Risk Management Practices for Federal Information Systems Jon Boyens Celia Paulsen Nadya Bartol Rama Moorthy Stephanie Shankles http://dx.doi.org/10.6028/nist.ir.7622
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Software Assurance: Enabling Security Automation and Software Supply Chain Risk Management. Commerce. National Defense. Today Everything s Connected
Software Assurance: Enabling Security Automation and Software Supply Chain Risk Interdependencies Between Physical & Cyber Infrastructures: Convergence of Safety, Security and Dependability Considerations
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
An Introduction to the ECSS Software Standards
An Introduction to the ECSS Software Standards Abstract This introduces the background, context, and rationale for the creation of the ECSS standards system presented in this course. Addresses the concept
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Reducing risks in the Software Acquisition Life Cycle
Reducing risks in the Software Acquisition Life Cycle Stan Wisseman 6 December 2007 Agenda Buyers vs. Sellers Need for enhancing acquisition process with SwA considerations DHS SwA Initiative Overview
The Software Development Life Cycle: An Overview. Last Time. Session 8: Security and Evaluation. Information Systems Security Engineering
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time Brief review of the testing process Dynamic Testing
Adding a Security Assurance Dimension to Supply Chain Practices
Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
IoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]
Manufacturing Readiness Level (MRL) Deskbook Version 2.0 May, 2011
Manufacturing Readiness Level (MRL) Deskbook Version 2.0 May, 2011 Prepared by the OSD Manufacturing Technology Program In collaboration with The Joint Service/Industry MRL Working Group This document
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Security Risk Management For Health IT Systems and Networks
Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND
Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before
Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)
Workforce Management: Introducing a Policy Rules Engine to Industrial Security Adrian Fielding, Honeywell Damian Vassallo, RightCrowd
2015 Honeywell Users Group Europe, Middle East and Africa Workforce Management: Introducing a Policy Rules Engine to Industrial Security Adrian Fielding, Honeywell Damian Vassallo, RightCrowd Integrated
Managing Security Risk In a World of Complex Systems and IT Infrastructures
Object Management Group Technical Meeting Managing Security Risk In a World of Complex Systems and IT Infrastructures NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Classes of Vulnerabilities A 2013
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES
RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
AF Life Cycle Management Center
AF Life Cycle Management Center Aircraft Cybersecurity Risk Management Framework Harrell J. Van Norman Cybersecurity Tech Expert Engineering Directorate AFMC/AFLCMC/EZAS [email protected]
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
DEPARTMENT OF THE NAVY NAVAL AIR SYSTEMS COMMAND RADM WILLIAM A. MOFFETT BUILDING 47123 BUSE ROAD, BLDG 2272 PATUXENT RIVER, MARYLAND 20670-1547
DEPARTMENT OF THE NAVY NAVAL AIR SYSTEMS COMMAND RADM WILLIAM A. MOFFETT BUILDING 47123 BUSE ROAD, BLDG 2272 PATUXENT RIVER, MARYLAND 20670-1547 IN REPLY REFER TO NAVAIRINST 4355.19E AIR-4.0/5.0/6.0 FEB
Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain
GSAW 2004 Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain Richard J. Adams and Suellen Eslinger Software Acquisition and Process Office
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
Supply Chain Risk Management Practices for Federal Information Systems and Organizations
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 (Second Draft) NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations Jon Boyens
The Impacts Of Agile Development On The System Engineering Process
The Impacts Of Agile elopment On The System Engineering Process 17 th Annual Systems Engineering Conference October 27-30, 2014 Springfield, Virginia Discussion Topics Background What Is Agile elopment
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
ICT Supply Chain Risk Management
ICT Supply Chain Risk Management Celia Paulsen Computer Security Division IT Laboratory Manager s Forum June 4, 2013 General Problem Definition Scope of Supplier Expansion and Foreign Involvement graphic
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
