U.S. FLEET CYBER COMMAND U.S. TENTH FLEET
|
|
|
- Alvin Peters
- 9 years ago
- Views:
Transcription
1 U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Dr. Starnes Walker Technical Director / CTO Fleet Cyber Command FLTCYBERCOM TENTH FLEET 1
2 Agenda Fleet Cyber Command (FCC) /10 th Fleet Introduction Technical Director/CTO Role Key Initiatives & Challenges Unclassified
3 USCYBERCOM COMUSSTRATCOM will establish USCYBERCOM DIRNSA is also 4-star Commander, U.S. Cyber Command IOC: Upon CDR confirmation at Ft. Meade, MD FOC: 1 OCT 10 Services will create a component JFCC-NW, JTF-GNO dissolved by FOC *Source: 23Jun09 SECDEF Letter Unclassified
4 FCC/C10F Mission Establish Fleet Cyber Command to serve as the Naval component Commander to USCYBERCOM Central operational authority for Navy networks, cryptology/sigint, IO, cyber, EW and space in support of forces afloat and ashore Delineate FLTCYBERCOM s mission: Directs cyberspace operations, to deter and defeat aggression Ensure freedom of action and achieve military objectives in and through cyberspace Organize and direct Navy cryptologic operations worldwide Integrate Information Operations and Space planning and operations Unclassified
5 Navy Cyberspace C2 Relationships CNO STRATCOM FLTCOMs ADCON COCOM NSW NAVSOUTH NAVCENT NAVAF NAVEUR PACFLT USFF USCYBERCOM OPCON NSA TYCOMs SUBFOR AIRFOR SURFOR CYBERFOR FLTCYBERCOM C10F SCC Service Employment NCDOC NNWC s NCWDG NAVSOC NCTAMS Unclassified
6 FCC/C10F Lines of Operation Lines of Operation Operate - Achieve and sustain the ability to navigate and maneuver freely in cyberspace and the RF spectrum Defend - Actively assuring Navy s ability to Command and Control its operational forces in any environment Exploit/Attack - On command, and in coordination with Joint and Navy commanders, conduct operations to achieve effects in and through cyberspace Aligned with USCYBERCOM Unclassified
7 FCC/C10F Operating Authorities STRATCOM Title 50 Authority NSA USCYBERCOM Title 10 Authority FLTCYBERCOM C10F DEFENSE NETWORKS TASK FORCE COMMANDS R&D Intelligence Warfighter Title 50 USC Analyze network activity of target users and/or computers Analyze network activity of target groups Provide alerts when target users/computers are active Track network usage Determine associations of groups & individuals FCC/C10F Commander Coordination Title 10 USC Deny network and/or computer use Degrade network and/or computer use Redirect network traffic Disrupt Destroy Title 14 Authority Unclassified
8 FCC/C10F Global Operations Elmendorf Bremerton Beale AFB Hickam AFB San Diego NCTAMSPAC Pearl Harbor, HI PMRF Kauai Great Lakes Fallon Yuma Corpus Christi Columbus Newport Washington Quantico Norfolk Millington Jacksonville Puerto Rico Pensacola San Antonio London Rota Sigonella Vaihingen Wiesbaden Cairo Naples Capodichino Souda Bay Bahrain Chinhae Yokosuka Sasebo Okinawa Misawa Atsugi Guam Singapore DISA Interface IT21 Diego Garcia NMCI ONENET Excepted/Legacy Navy Sensor Unclassified
9 Technical Director & CTO Role Senior Executive Service career official Serves as the senior Research Development, Test and Evaluation (RDT&E) Executive providing the Commander with advice & assistance Serve as command s Senior Executive responsible for technical direction Formulate Cyber RDT&E Strategic Programmatic Objectives supporting command mission Identify Cyber technology investment opportunities strengthening Navy Enterprise capabilities & operational/tactical effectiveness Recommend technology policies & standards Enhance teamwork and collaboration strengthening Command structure and cyber strategic deliverables across the DON, OSD, OGAs and Coalition Partners Ensure RDT&E Cyber objectives meet current and future exponentially growing technology advances and threats. Unclassified
10 FCC/C10F Standing Task Organization FCC CTF 1000 C10F CTF 1030 CO Norfolk CTF 1090 CO NCWDG Suitland C10F CTG Menwith Hill Station CTG Sugar Grove CTG Misawa CTG Texas CTG Georgia CTG Maryland CTG Hawaii CTG Colorado CTG NIOD Yakima CTG NIOD Alice Springs CTG Norfolk CTG San Diego R & D HQ Service Cryptologic Component Operations CTG Whidbey Island Information Operations CTF 1010 COMNNWC CTF 1020 CO NCDOC CTF 1040 CO Texas CTF 1050 CO Georgia CTF 1060 CO Maryland CTF 1070 CO Hawaii CTF 1080 CO Colorado CTG NCTAMS LANT CTG NCDOC CTG Texas CTG Georgia CTG Maryland CTG Hawaii CTG Colorado CTG NCTAMS PAC CTG Pensacola CTG Bahrain CTG FIOC UK CTG Yokosuka CTG NAVSOC CTG Misawa Network Operations & Defense Group Fleet and Theater Operations Unclassified
11 UNCLAS // FOUO IDC Data
12 Agenda Cyber SA Initiatives Cyber SA Challenges SCADA & Other Initiatives SCADA & Other Challenges Other Significant Questions 12
13 A picture says it best: Bandwidth LOG Current CASREPs Ship status Ship Movements Views derived data stored in the cloud proximal to collections points Navy Cyber Battlespace Awareness SOH NETOPS Watchbox User picked and situation dependant widgets SATCOM SIGINT Adversary I&W Known Threats USS Neverdock GCCS Vulnerabilities Widgets are linked together USS Neversail Embedded Querys Blue Force Tracks Red Force Tracks Afloat C2 User defined widget dashboard Widgets created on-the-fly Available Cyber Widgets Available C2 Widgets Widget Library UNCLAS // FOUO 13
14 Cyber and Maritime SA External Data Feeds External Data Feeds Tools Tools C10F Maritime Data Cyber Data Numbered Fleet Naval C2SA Sensor Data Sensor Data Multiple Views -Logical -Nodal -Check Lists -IP based -Geographic Geographic Views -Spatial -Readiness of ship -Time to get ordnance to target 14
15 Mapping & Managing the Network Cyber SA Initiatives Established Cyber Maritime Operations Center (MOC) Space dedicated to and designed for SA Working through pilots to map the Navy network using the following tools; IPSONAR: implementation-pilot network discovery & mapping tool currently deployed on SIPRNET(Yokosuka, Naples & Bahrain) Everest: implementation-pilot Lawrence Livermore National Laboratory-generated visualization tool employing HBSS agent data Host-Based Security System (HBSS): DoD-standard C4I Host-based Intrusion Prevention System deployed on USN terrestrial and Shipboard C4I NIPR and SIPRNET networks 15
16 Cyber SA Initiatives Moving to integrate tools/capabilities in the context of NSA Cyber Pilot Enterprise Network Management System (ENMS): mature capability to monitor shore-side networks to the router on afloat platforms Integrated Network Management System (INMS): mature DISA-provided SA tool for monitoring the GIG at the DISA Transport level SM-7: Hewlett-Packard (HP) provided info technology system management tool employed in monitoring CONUS shore-side networks and systems Cybercore: Business Object Environment based data store and widget driven front end to provide SA of Navy CND sensors 16
17 Cyber SA Initiatives External Awareness External to the DoD Cyber Awareness Commercial IT companies Telecom Companies can provide high level metrics of the internet slide shows the expected are real usage of commercial IT network Commercial undersea transport locations helped us to expect outages based events such as the Japanese Tsunami 17
18 Cognitive Science & Human Factors Cyber SA Challenges What are the linkages between the data and the actions the operator needs to take or decisions the commander needs to make? How should the data be displayed at for different actions or decisions? How should the data be displayed given different operational (threat) environments? Very Large Dataset Analytics Possibly the most difficult part of developing and maintaining SA Reduce the mass of data into appropriate information sets for display Net sensor data, alarms, net anomalies, packet capture, etc. Sharing/access externally owned data & analytics for this data 18
19 Cyber SA Challenges Linking virtual locations to physical locations If we find a client is not behaving as expected we should be able to see it s location on a ship and the location of the ship on a map. 19
20 Cyber SA Challenges Ability to afford gaining SA and control of non-snmp legacy network elements Analog radios Extended View of Cyber SA of cyber external to DoD? What is the quantitative level of attacks? Are sections of the worldwide transport damaged or down? Should this be collected & provided at a higher level? Time synchronization of events Transition from awareness to action; automation versus human in the loop 20
21 SCADA & Other Initiatives Initial threat assessment of HM&E risks from cyber Initial threat assessment of closed loop systems from cyber 21
22 SCADA & Other Challenges Industrial/SCADA systems using PLCs, embedded OS, and RISC processors are difficult to update to improve security Use IA agents & sensors in realtime environments Develop hardening capabilities to encase SCADA systems with a defensive capability without requiring high cost upgrades using existing hardware and minimal operator knowledge. Ability to scan source code of real time systems for vulnerabilities PLC Controller RISC Processor operating in real-time without interrupts Boundary encasing SCADA code to provide security without degradation in speed of actions 22
23 Bridging enterprise security to user owned and operated mobile computing platforms and next generation tablets. DoD required security features such as 2 factor authentication SCADA & Other Challenges 23
24 Other Significant Questions 1. Is virtual maneuver of networks to obfuscate/deceive executable at large scales? Defending networks that we purposefully change when we are still developing the best way to manage a static network Defend and Jump using virtualized firewalls & routers and security devices Applying virtual maneuver (IP Hopping, software configured networks) in situations where clear knowledge of the network lacking (Invicta)? Redundancy Deception Maneuver Reconstitution 24
25 Other Significant Questions 2. How do we assess risks/boundaries to grant authority to operate in the cloud? 3. How do you handle information spill containment in a highly virtualized / large cloud environment? 4. Is attribute based access control (ABAC) effective at very large scales? Highly granular identities and tagged data change rapidly 25
26 Other Significant Questions 5. What are the implications of transitioning an enterprise network from IPv4 to IPv6? Cyber SA Network Defense 6. Measuring affect of actions in cyberspace 7. Assigning attribution with a level of certainty 26
27 Unclassified
The Road to Cyber Power
0 Presentation to the Norman Forde Hampton Roads Chapter of the Association of Former Intelligence Officers The Road to Cyber Power Cyber Age, Cyberspace, Cyberpower, Cybersecurity, Commercial/Goverment
Role of the Judge Advocate General s Corps. Uniformed Legal Advisor to Naval Leaders Title 10 Responsibilities
The Navy JAG Corps Role of the Judge Advocate General s Corps Uniformed Legal Advisor to Naval Leaders Title 10 Responsibilities Role of The Judge Advocate General Our nation is at war Credibility is everything
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
1. Section B for Option Year 2 is hereby reiterated as follows:
N00039-03-C-0084 P00026 Page 2 of 3 1. Section B for Option Year 2 is hereby reiterated as follows: Option Year 2 Items: ITEM SUPPLIES / SERVICES MAX QUANTITY / UNIT 0201 FSET Sys Engineering And Tech
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Next Generation Enterprise Network: Network Operations (NetOps) Concept of Operations (CONOPS) 7 April 2008
Next Generation Enterprise Network: Network Operations (NetOps) Concept of Operations (CONOPS) 7 April 2008 Letter of Promulgation 1. The Next Generation Enterprise Network (NGEN), Network Operations (NetOps)
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Joint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
A Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
DON Cybersecurity/Information Assurance Workforce Management
DON Cybersecurity/Information Assurance Workforce Management 23 March 2010 Chris Kelsall DON CIO, Director, Cyber/IT Workforce Steps to Transform IAWF Management Charter DON team to determine best approach
Subj: APPLICATION PROCEDURES FOR FISCAL YEAR 2016 NAVY MEDICINE ACTIVE COMPONENT CAREER MILESTONE POSITIONS
DEPARTMENT OF THE NAVY BUREAU OF MEDICINE AND SURGERY 7700 ARLINGTON BOULEVARD FALLS CHURCH, VA 22042 Canc: Jun 2016 IN REPLY REFER TO BUMEDNOTE 1410 BUMED-M09 BUMED NOTICE 1410 From: Chief, Bureau of
Eric J. Getka, Ph.D. CAPT(ret), MSC, USN National Training Director, Navy Psychology
NAVY PSYCHOLOGY WORLD CLASS CARE ANYTIME, ANYWHERE Eric J. Getka, Ph.D. CAPT(ret), MSC, USN National Training Director, Navy Psychology JOINING THE NAVY PSYCHOLOGY TEAM Uniformed Services University of
Data Consolidation and Application Optimization (DCAO) Organization
Data Consolidation and Application Optimization (DCAO) Organization 11 February 2015 Presented to: DON CIO IT Conference San Diego Convention Center Mr. John Pope DCAO Director Space and Naval Warfare
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
DECC Montgomery. Mr. Chris Kemp Director May 2009
DECC Montgomery Mr. Chris Kemp Director May 2009 MISSION Provide information technology for the warfighter when, where, and how it is required and without interruption. VISION Achieve and sustain the most
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Improvements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Mark S. Orndorff Director, Mission Assurance and NetOps
Mark S. Orndorff Director, Mission Assurance and NetOps Sustaining US Global Leadership: Priorities for 21 st Century Defense Both state and non-state actors possess the capability and intent to conduct
NGEN Re-compete Industry Day Navy Data Center Consolidation
NGEN Re-compete Industry Day Navy Data Center Consolidation Mr. John Pope Director, DCAO 17 November 2015 Multiple independent data centers grew up organically to support the warfighter. Lack of configuration
Commander s Cyber Security and Information Assurance Handbook
Navy Cyber Forces Commander s Cyber Security and Information Assurance Handbook REVISION 2 26 February 2013 This document serves as guidance from the Navy C5I Type Commander for commanders, commanding
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015
Industrial Control System Cyber Situational Awareness Robert M. Lee* June 10 th, 2015 Executive Summary Cyber situational awareness is the concept of understanding and visualizing the networked environment
Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI
1 Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI Tom Lerach Head of IA, HP DoD Rajat Bhargava StillSecure October 2009 Agenda endpoint compliance with NMCI
U. S. Fleet Cyber Command / TENTH Fleet. Strategic Plan 2015 2020
U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 2020 U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 2020 Foreword New warfighting platforms do not spring full-grown from their
continue to have difficulty with communications in the Arctic region.
How do you see the role & importance of satellite communications in the fulfillment of the CG mission? SATCOM has been critical to timely and reliable communications in the maritime environment. Its role
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
What Does a Cyber Secure Navy Look Like?
What Does a Cyber Secure Navy Look Like? Cyber Protection, Prioritization, and Plan May 2010 Brian D. Shaw DASN C4I / IO / Space Director of Cyber Warfare [email protected] [email protected]
The DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
DoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions
DISA s Computer Network Defense Service Provider Program (CNDSP) 7 May 2012 AGENDA CNDSP Program CNDSP is a Team Sport DISA s CNDSP Program Detect Protect Respond CNDSP Contacts Questions CNDSP Program
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Continuous Cyber Situational Awareness
Continuous Cyber Situational Awareness Continuous monitoring of security controls and comprehensive cyber situational awareness represent the building blocks of proactive network security. A publication
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership [email protected] Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern
CHAIN OF COMMAND. 1 August 2015
SHORE 1 August 2015 ECHELON 1 CHIEF OF NAVAL OPERATIONS (00011) (Director, OPNAV Detachment (DET), Site R, Ft. Detrick, MD) (63423) (Director, OPNAV DET Ocean US Office, Washington, DC) (3189B) 2 COMMANDER,
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain
SESSION ID: ANF-T08 Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain Sean Doherty VP Technology Partnerships and Alliances Symantec @SeandDInfo Deb Banerjee Chief Architect,
Information Assurance and Interoperability
Information Assurance and Information Assurance and Information Assurance (IA) and (10P) Evaluations SUMMARY Assessments in FY09 were performed during 25 Combatant Command and Service exercises, with the
Manned Information Security
Manned Information Security Adversary Pursuit and Active Network Defense root9b Technologies (RTNB) Presented By: John Harbaugh, COO CONFIDENTIALITY NOTICE This briefing, including any attachments, is
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Consolidated Afloat Networks and Enterprise Services (CANES)
Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Consolidated Afloat Networks and Enterprise Services (CANES) Statement A: Approved for public release; distribution
Enterprise Capabilities Descriptions
1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.
d. To apply basic policy and principles of computer hardware and software management as they relate to Information Management and Information Technology (IMIT) and Information Systems (IS) associated with
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
CHAIN OF COMMAND 1 JANUARY 2016
SHORE 1 JANUARY 2016 ECHELON 1 CHIEF OF NAVAL OPERATIONS (00011) (Director, OPNAV Detachment (DET), Site R, Ft. Detrick, MD) (63423) (Director, OPNAV DET Ocean US Office, Washington, DC) (3189B) 2 COMMANDER,
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide Contents Introduction...2 Coalition and extranet collaboration... 3 Deploying military units... 4 Fob-rob collaboration...4
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Army Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Depot Contributions to Weapon Systems Readiness
Depot Contributions to Weapon Systems Readiness RDML Michael Hardee USN, Commander, Air Depots, Naval Air Systems Command DOD MAINTENANCE SYMPOSIUM 26-OCT-06 RENO, NEVADA Outline Naval Air Depot Overview
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
Accenture Cyber Security Transformation. October 2015
Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security
The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense Tony Sager The Center for Internet Security Classic Risk Equation Risk = { Vulnerability, Threat, Consequence } countermeasures
MUOS Program Update. Program Executive Office Space Systems (PEO SS) Navy Communications Satellite Program Office PMW 146
Program Executive Office Space Systems (PEO SS) Navy Communications Satellite Program Office PMW 146 MUOS Program Update Statement A: Approved for public release, distribution is unlimited (21 October
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48 Updated: October 2011 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN (IT) SCOPE OF RATING GENERAL INFORMATION INFORMATION TECHNOLOGY
Strategic Design. To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook.
To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook.com/navfac Strategic Design Naval Facilities Engineering Command 1322 Patterson Avenue,
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Cloud Computing and Enterprise Services
Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau
