What Does a Cyber Secure Navy Look Like?

Size: px
Start display at page:

Download "What Does a Cyber Secure Navy Look Like?"

Transcription

1 What Does a Cyber Secure Navy Look Like? Cyber Protection, Prioritization, and Plan May 2010 Brian D. Shaw DASN C4I / IO / Space Director of Cyber Warfare [email protected] [email protected] [email protected] (w) (c)

2 Is it really that bad? If the nation went to war today, in a cyber war we would lose. (Mike McConnell, former Director of National Intelligence, Feb 10) Cyber Shockwave We re not prepared! (Feb 10) Very tough to identify WHO is attacking internet anonymity President has little to no overall authority to direct industry actions Essentially impossible to prosecute cyber crime, as international borders hinder virtual legal reciprocity and enforcement There is no cyberwar but we need to focus on cybersecurity. (Howard Schmidt, Cyber-Security Coordinator (Mar 10) OUR collective mission / focus Collaboratively enable information dominance 2

3 Who s in Charge? Where? POTUS (Cyber Security Coordinator, et al) SECDEF / SECSTATE Congress STRATCOM USCYBERCOM FLTCYBERCOM Navy, Army, AF, Marine Corps Federal, Industry, Consumers Authority and Enforcement are KEY! Re: CIP is 85% industry - No direct federal control, so what then? Note - see the glossary for the many acronyms, while defense centric, we need a common cyber taxonomy / lexicon 3

4 Strategic Cyber Elements (1) Collaborate on DoN enterprise IA / cyber strategy and vision policy mapped to prioritized capabilities with assigned resources (2) Update DoN overall enterprise risk assessment (ERA) accounts for both significant threat vectors & vulnerability consequences (3) Prioritize enterprise level mitigations from the ERA Navy specific items complement and weighted within the existing CNCI 12 (4) Align and synchronize resources and cyber capabilities across DoN organizations and tier 1 tier 3 architecture perspectives (5) Address pervasive lack of basic cyber hygiene enterprise wide within our total claimancy s people, processes and products (technology) (6) Reduce complexity - Build a trusted cyber infrastructure on top of the existing IA/CND infrastructure, as an integrated SoS - with enforced CM (7) Better integrate / leverage education and IO / CNO thus optimize our overall cyber package and ensure synchronization and RESILIENCY! Top down approach to a balanced, prioritized cyber execution plan 4

5 What cyber variables can we affect? Effective as-is, or have a lower added ROI - Prosecution/enforcement need near real-time forensics, global reciprocity - Offensive tools good now, controlled use, escalation - Try to fix all issues/problems as many are intractable, givens, etc. - Continue to emphasize perimeter defense as they are already in! BEST potential impact and long term effectiveness - Improve education and training yet use checks / balances - Enterprise risk management using both threats & consequences - Effective IA/Cyber Management enforceable CM & a trust model - Proactive, dynamic CND/ IA defense DCD, as the best offense - Define & enforce network policy / SOPs cut off those not in compliance Continue to finesse the first set / Go full force on the last! 5

6 Integrated CND & IA as a SoS (all defensive protections must themselves act as one system) It s all about TRUST need a common enterprise trust model Some HAP/TSM is needed, but where to put which EAL devices? Need a common top-down, enforced IA/Cyber architecture/model Need an alternative to commercial ISP leverage existing dark fiber? Effective / secure enterprise access control is everything: IA&A implementation focus = authorization based access control complemented by ABAC, RBAC, even RAdAC as an end-state Proactive/Dynamic Defensive I&W - Detect abnormal patterns, characteristics, attributes, unusual requests. - Provide auto alerts; divert questionable actions; "wraps" issues/problems (This is the catch all capability, as we can t protect everything near 99%) Life cycle education and training must parallel acquisition Integrated Computer Security Operations Centers (eg: GNOSC, etc) Centralized V&V / assessment collection and reporting (NCDOC / NIOC) Institutionalize Dynamic Cyber Enterprise Management (DCEM) Protect the Cyber C 3 Crown Jewels! 6

7 Dynamic Cyber Enterprise Management 1 - Institutionalize enforceable configuration management - Established baselines, manage dynamic settings C.I.s - Properly configured/ccb (servers, routers, firewalls, etc) - Patches, updates, IAVA delta / increment change mgmt - Verification / Auditing / Certification & Accreditation (C&A) 2a - Continuous monitoring & reporting - Automatic reports/alerts fed to users & central repository - Integrated with NetOps and Infocon (IPS-like actions) 2b - Intuitive situational awareness automated dashboard - Must have an enterprise network picture can t manage unknowns 3 - Life cycle best practices/sops institutionalize rigor NSA IAD poor IA management factors (CM, monitoring, follow SOPs) = 80% NCDOC lack of IA accountability (poor CM, inadequate IAVA, misuse) = 90% Verizon Data Breach Report implementing known fixes and capabilities = 87% Effective, enforceable DCEM / enterprise cyber hygiene 7

8 CNE / CNA Provide near-real time OPSEC to IA Effectively leverage the black side Intel into secret (& below) protections Establish Cyber War Reserve Modes Isolated networks, C 2 order wire, mil using dark fiber, etc Fusion of diverse data, into KM we can use in all of cyber All sensors, CNE/A effects, OpSec, Intel, etc = improved CND/IA Can t easily / rapidly tell WHO the bad actors are Need cyber detection / forensic capabilities (Service's responsibility) Offensive uses best done by STRATCOM / USCYBERCOM / C10F Cyber War / ROE undefined, unclear if win-lose / lose-lose Offensive cyber methods / tools / activities require authorized and skilled subject matter experts 8

9 Key Tactical Thrusts Organize DoN cyber security approach / governance - RACI Update ERA, prioritize mitigations and resources Begin Dynamic Cyber Enterprise Management asap Top-down enforcement of IA / Cyber architecture Secure enterprise access control / Cyber IFF Overall Dynamic Cyber Defense (DCD) approach Proactive / dynamic defensive I&W monitor abnormal behavior Virtual storefront reacts quickly to predictive IO/IA I&W IA/CND treated as an integrated SoS with lead/lag feedback Common enterprise trust model Reduce complexity - IA Building blocks / APLs with pedigrees Integrate into an enterprise cyber security model / framework Execute lifecycle awareness, education, and training 95% security incident reduction High ROI Activities that get us all moving quickly 9

10 So what can WE collectively DO? NAVY way forward Sync with DOD cyber strategy / USCYBERCOM / other agencies Support OPNAV N2N6 cyber roadmap & C10F requirements Streamline acquisition process tie to CNO priorities = value / affordability Facilitate Collective / Collaborative Governance Integrated DON efforts: Plans / Policy, Operations, Acquisition, R&D, etc Overall execution coordination / cooperation between government, industry, academia, others key cyber stakeholders Cooperatively ACT on key tactical thrusts affordably! Focus on: highest ERA ROI items, reduce complexity, enforce resiliency Do the basics well & first - otherwise new toys matter little Enforce critical areas (like CM, hygiene...) and fix what ails us now Leverage the bleeding edge - let CNCI lead/sponsor COMMS, collaboration, alerts at cyber speed! 10

11 Information Dominance: The ability to seize and control the information domain high ground when, where and however required for decisive competitive advantage across the range of Navy missions... Questions? Comments? Suggestions? 11

12 Glossary APL/PPL approved/preferred product list ACL access control list CA certification authority C&A certification & accreditation CCB configuration control board CI configuration item CIP critical infrastructure protection CNCI Comprehensive National Cybersecurity Initiative CND/CNO computer network defense/operations CSIS Center for Strategic and International Studies DCD dynamic cyber defense DCEM dynamic cyber enterprise management EAL evaluation assurance level ERA enterprise risk assessment HAP high assurance platform HBSS host based security system IAD Information Assurance Directorate NSA) IAVA information assurance vulnerability alert IA&A identification, authentication and authorization (access control) IDS/IPS intrusion detection/ protection system IOS internetwork operating system (OS for routers) ITMC IT Management Council I&W indications and warnings KM knowledge management NIAP National IA Partnership SANS storage area network systems TSM trusted security module VM virtual machine V&V verification and validation ZBAC authorization-based access control 12

13 Back Ups 13

14 Trace Requirements to the top President's Cyber Plan 1 - Ensure accountability in federal agencies, cyber security will be designated as a key management priority. 2 - Work with ALL the key players, including state and local governments and the private sector. 3 - Strengthen the public-private partnerships. 4 - Continue to invest in the cutting-edge research and development necessary for the innovation and discovery. 5 - Begin a national campaign to promote cyber security awareness and digital literacy. DOD / DON cyber approach, must be global, as is the cyber landscape! 14

15 NSPD-54/HSPD-23: CNCI 12 Initiatives Comprehensive National Cyber Security Initiative Focus Area 2 Focus Area 1 Deploy Trusted TrustedInternet Deploy Passive Passive Pursue Pursue Deployment of of Coordinate and and Sensors Connections SensorsAcross Intrusion Prevention Redirect Redirect R&D R&D Federal Federal Systems Systems Systems Systems Efforts Efforts Establish a front line of defense Connect Connect Current Current Develop Develop Gov t-wide Increase Increase Security Security Expand Centers Centers to to Enhance Enhance Counterintelligence of of the the Classified Expand Education Situational Awareness Plan Plan for for Cyberspace Networks Networks Resolve to secure cyberspace / set conditions for long-term success Focus Area 3 Define Define and and Develop Develop Enduring Enduring Lead Lead Ahead Ahead Technologies, Strategies & Programs Define Define and and Develop Develop Enduring Enduring Deterrence Strategies & Programs Manage Manage Global Global Supply Supply Chain Chain Risk Risk Define Define Federal Federal Role Role for for Cybersecurity in in Critical Critical Infrastructure Domains Domains Shape future environment / secure U.S. advantage / address new threats Agency Cyber efforts must leverage the Federal Investments The HARD part is implementing enterprise integration, interoperability and controlling emergent behavior - that can affect most focus areas 15

16 LOCAL ENCLAVE DoD CND (and Cyber ) Defense in Depth CND SP CND SP - Incident Response / Management - Incident Response / Management - Prometheus - Prometheus - Threat Analysis - Threat Analysis - Compliance Scans - Compliance Scans - IAVM Management - IAVM Management Incident Response Incident Response IDS IDS NUDOP NUDOP DNS Blackholes DNS Blackholes PROMETHEUS PROMETHEUS HOST HOST Firewalls Firewalls Standard IP Blocks Standard IP Blocks ACLs ACLs LAN (POP/HUB) LAN (POP/HUB) NET Cool / INMS View NET Cool / INMS View IAP Monitoring IAP Monitoring Site Compliance Scans PKI Threat Analysis Site Compliance Scans PKI Threat Analysis NMCI NIPRNET IDS Feeds AV IAVM Implementation NMCI NIPRNET IDS Feeds AV IAVM Implementation TRICKLER / SIPRNET Firewall PPS Policy TRICKLER / Threat Assessment Alert Filtering SIPRNET Firewall PPS Policy CENTAUR Threat Assessment Alert Filtering CENTAUR Vulnerability Scanning CND Data Strategy PKI System Patching Vulnerability Scanning Metrics CND Data Strategy PKI System Patching Metrics NET Cool View CDS DITSCAP/DIACAP NET Cool View CDS ACLs DITSCAP/DIACAP NET Cool Data ACLs Vulnerability In-Line Filtering NET Cool Data Remediation Vulnerability In-Line Filtering Standard IP Block Lists Standard IP Block Lists IPS Remediation IPS CENTRIXS Monitoring Firewalls AV CENTRIXS Monitoring Firewalls AV In-Line Virus Scanning In-Line Virus Scanning CONOPS DITSCAP/DIACAP DNS Blackholing CONOPS DITSCAP/DIACAP DNS Blackholing CARS IASM DRRS-N RNOSC CARS IASM DRRS-N RNOSC IAVM Vulnerability Remediation HBSS Compliance IAVM Vulnerability Remediation Content Filtering HBSS Content Filtering SCCVI- Anti-virus Compliance ENMS SCCVI- Anti-virus PKI SCRI CARS Tier 3 SIM ENMS PKI SCRI CARS Tier 3 SIM WIDS IAVM Compliance WIDS IAVM Compliance TMAT IWCE TMAT HBSS CAC/PKI Wireless Mapping IWCE WAN SA HBSS CAC/PKI Wireless Mapping SLIDR WAN SA Deep Packet Inspection SLIDR Deep Packet Inspection SCCVI-SCRI WIDS SCCVI-SCRI WIDS NET Cool Data Standardized Configurations NET Cool Data Navy DMZ Standardized Configurations Navy DMZ DAR POR Management Enclave DMZ DAR POR Management Enclave DMZ Insider Threat Insider Threat SIPR NAC SIPR NAC TMAT TMAT PKI PKI TIER III WAN (Enclave) WAN (Enclave) Incident Handling Incident Handling NMCI SIPRNET IDS Feeds NMCI SIPRNET IDS Feeds TIER II GIAP GIAP IP Sonar IP Sonar Navy GIG (NCDOC) Navy GIG (NCDOC) Global CND UDOP Global CND UDOP Functional NIC Functional NIC Multi-Layer Protocol Multi-Layer Defense Protocol Defense In-Line Filtering In-Line Filtering Deep Packet Inspection Deep Packet Inspection CND POR CND POR Honey Grid Honey Grid Enterprise Enterprise DMZ DMZ Operational Operational Funded and Funded and Rolling Out Rolling Out Proposed or In Proposed or In Development Development DAPE DAPE TIER I DoD GIG (JTF-GNO) DoD GIG (JTF-GNO) Cyber = mostly Life-cycle education and and proactive, dynamic defense. (From NCDOC briefs) Secure Locally Defend Globally The smart integration and collaboration between MANY needed IO & IA functions Tutelage Tutelage 16

17 Integration of Cyber Security and Defense Capabilities Insider Threat Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM Threat Stolen Credentials Spear Phishing Zero Day Exploits Soft Cert Searches Web Based Attacks Social Engineering Compromised Password Files Known Trojans and Malware Commonly Known Vulnerabilities Indiscriminant Recon Threat CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM New/Custom Trojans CARS initiative Mobius to Prometheus Cyber Tactical Teams Enhanced Compliance LE/CI integration Threat Analysis Process Improvements CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM Where, lack of IA CM is pervasive and undermines it all Tactical Sensor Pilot HBSS Pilot SCCVI/SCRI Enhanced Collaboration IDS to IPS Transition CARS initiative Mobius to Prometheus Cyber Tactical Teams Enhanced Compliance LE/CI integration Threat Analysis Process Improvements CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM HBSS Deployment Content Filtering Joint Data Strategy NMIMC Integration SLIDR Pilot Insider Threat Tool Pilot OCRS / IAVA Spiral Tactical Sensor Pilot HBSS Pilot SCCVI/SCRI Enhanced Collaboration IDS to IPS Transition CARS initiative Mobius to Prometheus Cyber Tactical Teams Enhanced Compliance LE/CI integration Threat Analysis Process Improvements CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM 2003 / Synchronized cyber capabilities to to narrow the Threat Vectors (From NCDOC briefs) 17

18 SO what are were trying to institute? An integrated Cyber System using dynamic lead & lag feedback Establish proactive, dynamic CND / IA Defense = dynamic cyber defense (DCD) Cyber I&W Virtual Storefront NMS / Security Management tools Defensive assessments Incident results SA ****** (Sensors, CNA/E inputs OpSec, Intel, etc ) Users & CoC threats IA & CND threats V&V / C&A Defensive I&W Forensics Red Teams Upfront/Early feedback (leading indicators) Change soft settings (takes seconds to minutes) Upgrades Changes (developed & installed) (takes days to months / years) After-the-fact feedback (lagging indicators) 18

19 Building a Trusted Cyber Infrastructure an adequately assured, affordable, net-centric environment Focus on a few core capabilities & devices = PC, routers, IA suite, Servers, & SANS all with access control Standard IA/CND suite FW, A/V, IDS/IPS, CDS,, etc Treat as a SoS : with high EAL WAN Router IA Suite Core Router IAW: NNE 2016 / NGEN vision Assured IOS Various EAL EAL 4-5 EAL 4 Security Monitor HW / FW Secure OS kernel Secure Virtual Machine Strict access / ZBAC EAL 6 Servers Distribution Router ALL OSes (MS, Mac, Unix) SANS EAL 5 6 Data centric security Defensive I&W Strict access / ZBAC Network Devices PC End user devices Make IT security a commodity: Use IA building blocks = APLs/PPLs NIAP Interoperability and Compose-ability are built in upfront and help dramatically reduce complexity and ambiguity Thus.establishing known risks & pedigrees: Reduces attack surface, impacts & TOC EAL 3-4 Secure OS TSM HBSS ZBAC Eval Assur Level (EAL):

Joint Information Environment Single Security Architecture (JIE SSA)

Joint Information Environment Single Security Architecture (JIE SSA) Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Can We Become Resilient to Cyber Attacks?

Can We Become Resilient to Cyber Attacks? Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Improvements Needed With Host-Based Intrusion Detection Systems

Improvements Needed With Host-Based Intrusion Detection Systems Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Cyber Education triangle clarifying the fog of cyber security through targeted training

Cyber Education triangle clarifying the fog of cyber security through targeted training Cyber Education triangle clarifying the fog of cyber security through targeted training Curriculum & Resources Linked / leveraged (on-line, companies, colleges, etc) MS / BS Cyber CISSP / GISP / CISO /

More information

Operationally Focused CYBER Training Framework

Operationally Focused CYBER Training Framework Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel ARF, ARCAT, and Summary Results Lt Col Joseph L. Wolfkiel Enterprise-Level Assessment and Reporting The Concept Assessment Results Format (ARF) Assessment Summary Results (ASR) The Assessment Results Consumer

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

DoD IA Training Products, Tools Integration, and Operationalization

DoD IA Training Products, Tools Integration, and Operationalization Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/ An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at

More information

A Comprehensive Cyber Compliance Model for Tactical Systems

A Comprehensive Cyber Compliance Model for Tactical Systems A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

DISA Testing Services for the Enterprise. Luanne Overstreet

DISA Testing Services for the Enterprise. Luanne Overstreet DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information

More information

Meeting Cyber Security Challenges

Meeting Cyber Security Challenges Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions

AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions DISA s Computer Network Defense Service Provider Program (CNDSP) 7 May 2012 AGENDA CNDSP Program CNDSP is a Team Sport DISA s CNDSP Program Detect Protect Respond CNDSP Contacts Questions CNDSP Program

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI 1 Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI Tom Lerach Head of IA, HP DoD Rajat Bhargava StillSecure October 2009 Agenda endpoint compliance with NMCI

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Separating Signal from Noise: Taking Threat Intelligence to the Next Level SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Combating Spear-phishing:

Combating Spear-phishing: Combating Spear-phishing: Convergence of Intel, Ops, Forensics, and Vulnerability Management Mr. Billy Rodriguez, GCIH Chief Intrusion Prevention Section Mr. Jacob Stauffer, GCFA, GREM Chief Intrusion

More information

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,

More information

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond

More information

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Glasnost or Tyranny? You Can Have Secure and Open Networks! AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR

More information

A Combat Support Agency

A Combat Support Agency Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Infrastructure Development Forecast to Industry

Infrastructure Development Forecast to Industry Infrastructure Development Forecast to Industry Mr. Jack Wilmer Executive, Infrastructure Directorate 2 November 2015 51 Infrastructure Development Mission & Vision Mission Vision Slogan Enabled by We

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

Network Management and Defense Telos offers a full range of managed services for:

Network Management and Defense Telos offers a full range of managed services for: Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:

More information

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era Ted Gruenloh Director of Operations Sentinel IPS * Agenda! Review of the current Network Security

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Cybersecurity: An Innovative Approach to Advanced Persistent Threats Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Breaking the Cyber Attack Lifecycle

Breaking the Cyber Attack Lifecycle Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com

More information

2012 Data Breach Investigations Report

2012 Data Breach Investigations Report 2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information

More information

Cybersecurity: What CFO s Need to Know

Cybersecurity: What CFO s Need to Know Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

All Information is derived from Mandiant consulting in a non-classified environment.

All Information is derived from Mandiant consulting in a non-classified environment. Disclaimer: All Information is derived from Mandiant consulting in a non-classified environment. Case Studies are representative of industry trends and have been derived from multiple client engagements.

More information

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats

More information

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles

More information

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon

More information

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES Application Vulnerability Scanning. A web-based application service hosted by Verizon Business to provide customers

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Some Thoughts on the Future of Cyber-security

Some Thoughts on the Future of Cyber-security Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions

More information

Start building a trusted environment now... (before it s too late) IT Decision Makers

Start building a trusted environment now... (before it s too late) IT Decision Makers YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

National Cyber Security Strategies: United States

National Cyber Security Strategies: United States National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

New possibilities in latest OfficeScan and OfficeScan plug-in architecture New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping

More information

Advanced Threats: The New World Order

Advanced Threats: The New World Order Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC

More information