The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
|
|
|
- Sophie Hood
- 10 years ago
- Views:
Transcription
1 The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1
2 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be the focal point of a war fought between nation states, but the threats of today place us in exactly that situation. The reason these threats jointly implicate the public and private sector is that the cyber domain is under attack by an organized public/private sector threat, and until we recognize that fact and address it, we will continue to fail to protect it. The truth is that unless corporate America the private sector works with the public sector, we may not stop a cyber event that could be as destructive as Pearl Harbor or 9/11. This post is the first in a series of posts that will examine the nature of the threat we are facing, offer guidance about how companies can effectively and properly reduce the threat, and also illustrate the other business benefits of addressing these issues. The Threat. The Internet as we know it started as a public sector project that quickly morphed into what it is today a large, interconnected network connecting an unimaginable number of different devices that are both public and private sector, which never turns off. While in the past people imagined cyberspace as simply just a series of websites, those days are long gone. Today, with the number of devices that are constantly connected to the world wide network that is the Internet, the cyber domain includes a number of different computers, including those that control our financial system, critical infrastructure, as well as a variety of other devices in any number of different industries. These devices are central to our everyday existence, particularly when one includes mobile devices, as well as the ever increasing number of control devices that are networked. Since this always on world of connectivity places the resources of the United States, both public and private sector, on the same global network as those of nations and others who seek to do us harm, you cannot raise the drawbridge in today s world of cyber attack if you are part of the cyber domain, you are constantly open to potential attack. And the threat we face in the cyber domain is no longer the lone 15 year old trying to boost his hacker street cred by hacking the government it is now an organized, often well funded, effort to systematically damage our economy or our nation directly. The way these groups work are to find and exploit an information imbalance and create an asymmetric threat. An information imbalance is a situation where one side of a conflict has superior information regarding the weaknesses of the other. If that superior information relates to the weakness of another party, it can then be used to create an asymmetric threat, which is a threat that is targeted to, and exploits, another s weaknesses. 2
3 The best example of this is 9/11, contrasted with Pearl Harbor. Pearl Harbor involved an organized, but symmetric threat. It was the Japanese Military attacking another nation state s military. And while Japan exploited an information imbalance, it was a fight between combatants with roughly equal resources. For 9/11, Al Qaeda did not need their own army or air force, in fact, they didn t need organized military. They simply needed utility knives (perhaps even box cutters), training, and more importantly, information about how our system of air travel worked. By creating this information imbalance, they were able to perpetrate a devastating asymmetric attack on the United States. The lesson of 9/11 was not lost on the public sector it realized the nature of the threat and has taken steps to address it, and one need only examine recent Executive Orders, and the words of General Keith Alexander, the Director of the National Security Agency, and a recent speech by Defense Secretary Leon Panetta to see this. In 2005 President Bush issued Executive Order Further Strengthening the Sharing of Terrorism Information to Protect Americans, with the goal of giving information sharing of terrorism information among key stakeholders, including the public and private sector. In 2010 President Obama reaffirmed the need for public sector and private sector cooperation, and information sharing, to address cyber security concerns when it issued Executive Order 13549, Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities. A detailed examination of these Executive Orders are beyond the scope of the post, but the important point is that the Executive Branch recognizes the need for public and private sector cooperation and information sharing. These views were also recently reiterated by General Alexander, when he spoke to the largest hacker convention DEF CON, and asked for their help: We as a global society are extremely vulnerable and at risk for a catastrophic cyber event. Global society needs the best and brightest to help secure our most valued resources in cyberspace: our intellectual property, our critical infrastructure and our privacy. DEF CON has an important place in computer security. It taps into a broad range of talent and provides an unprecedented diversity of experiences and expertise to solve tough problems. The hacker community and USG cyber community share some core values: we both see the Internet as an immensely positive force; we both believe information increases in value by sharing; we both respect protection of privacy and civil liberties; we both believe in the need for oversight that fosters innovation, doesn t pick winners and losers, and retains freedom and flexibility; we both oppose malicious and criminal behavior. We should build on this common ground because we have a shared responsibility to secure cyberspace. Moreover, in a recent presentation, Secretary Panetta illustrated the true nature of the threat state sponsored activity that is increasing in intensity and, with the potential to disrupt to our way of life. The video is below, but in discussing the nature of state sponsored activity, he was clear. A cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11, and Panetta also believed that Such a 3
4 destructive cyber terrorist attack could virtually paralyze the nation. Panetta continued, We know of specific instances where intruders have successfully gained access to these control systems, and he also stated that We also know they are seeking to create advanced tools to attack those systems and cause panic, destruction and even loss of life. The critical point is that the examples Secretary Panetta uses are not attacks on DoD, or other public sector resources they are attacks on the financial institutions and energy sector by the government resources of another nation state. And this threat is not limited to the financial or energy industry. If you are a group seeking to do us harm, why attempt to detonate a WMD, when you instead can attempt to hack a Supervisory Control and Data Acquisition (SCADA) device that controls a water supply? Or why not attempt to disrupt the medical services in a large area by attacking the systems of a large hospital chain, or even a major health insurer. This can be done by a direct attack on the company, or by an attack on a company that is part of the chain of delivery of the necessary product or service. As a result, the threats are nearly endless and span a multitude of businesses that are not just in the energy or financial sectors. In sum, as the physical war in the Middle East winds down, we now face a new, more diffused threat organized well funded, attacks by entities that are state sponsored or part of organized crime networks. These actors seek to create information advantages that can be turned into asymmetric threats, and these threats are a clear and present danger to our society. How can the private sector protect itself from an organized, well funded, public sector threat? By organizing, and funding a solution that includes the public sector in the United States. This can be done through Information Superiority, and increased information sharing. Information Superiority and Information Sharing A Solution for the Public and Private Sector. In order to understand the solution to the problem, it is important first to focus on the root cause of the threat the information imbalance which permits the organized actors seeking to do us harm by understanding and exploiting our weaknesses i.e. creating an asymmetric threat. In other words, this is not exclusively a technology problem, or one where we simply need to spend more, or buy better technology. If the problem is information, the solution is information. The best example is 9/11, where the private sector spent a significant amount on technology for security in airports, and the technology the enemy used was utility knives (or perhaps even box cutters), coupled with extensive information about our system of air travel. Al Qaeda was able to gain an information advantage, which they turned into an asymmetric threat, with very rudimentary technology. That is the nature of the threat we face, even in the cyber domain, because the technology that is used to attack us is often rudimentary and very 4
5 available the utility knives of the cyber world and we must address the root cause of 9/11 in the private sector in the cyber domain, or risk facing the same consequences. While the threats are different, the challenges for the public and private sector are the same reduce information imbalances that can lead to disruptive or asymmetric threats. So if the solution is information, what does that really mean? It means that the private sector needs to realize that it is facing an information based problem, created by a well organized foe, and it must organize to combat it. The way to do that is to implement information governance solutions that reduce the information imbalances that exist, and also increase information sharing. Information Superiority. The reason this problem is really a governance problem is that the senior executives in private companies typically have no idea what information or systems their company have that are truly sensitive, or important, and there are inherent barriers to information sharing in any organization. Information is typically kept in stove piped verticals that often do not talk to each other and information imbalances inherently result. This is what helps to create the environment where organized actors can exploit the cyber domain, but, as will be discussed in future posts, it also creates business issues for the private sector. The good news for the private sector is that the public sector has already had to try to address these issues post 9/11. While there isn t a plug and play solution from the public sector, the private sector can learn from, and adapt, some of the doctrines and governance methodologies that the public sector has created to help deny our enemies an information advantage, and break down information verticals that create risk. The first doctrine the private sector must try to utilize is Information Superiority. The Department of Defense defines Information Superiority as A relative state achieved when a competitive advantage is derived from the ability to exploit an Information Advantage, and as The ability to develop and use information while denying an adversary the same capability. Under DoD doctrine, an Information Advantage is achieved when one competitor outperforms its competitors in the information domain. In order to implement Information Superiority, according to the DoD, technical and behavioral modifications to how data is collected and processed had to be made, so it could drive value for DoD. It is important to note that technology was viewed as enabling Information Superiority, but it was not the center of the doctrine, which illustrates that Information Superiority is more focused on governance of information, not the technology that enables its use. For the private sector, it must implement Information Superiority by focusing on making superior use of information by getting the right information, to the right executives, at the right time, which will help companies achieve a variety of goals, including: Avoiding the next 9/11; 5
6 Increasing profit for businesses; Reducing costs; Optimizing risks; Reducing the industrial espionage threat; and Reducing brand damage. The focus of these posts to date has been to focus on the first point, but as noted above, implementing Information Superiority will also help companies achieve a variety of other goals that are core to business. There are four key steps that the private sector must take in order to implement Information Superiority. The first step companies must take to implement Information Superiority, and reduce the chances of an exploitable information imbalance, is understand what information they have. Most companies do not completely understand what information they have, including what information is critical to their business. By creating an information inventory, particularly of systems with critical information, private companies can begin to understand what information they have, and where it resides. The second step companies must take is to create a governance structure that includes key senior stakeholders from departments that are relevant to governing information. This can include IT, HR, Privacy, Audit, Legal, Treasury, Security, and others. This governance structure will enable companies to better understand the results of the information audit, and hopefully help each department understand what information exists, with the goal of having the key stakeholders better understand how information can be effectively utilized for executive decision making, including to increase cyber security. The third step companies must take is to create a framework that classifies the company s information based upon sensitivity. Again, the public sector has some tools that can be instructive for the private sector. The intelligence community utilizes an information classification system that bases controls, security, and use of the information upon information sensitivity, and the categories, with the general descriptions are below. Top Secret Information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe. Secret Information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe. Confidential Information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe. 6
7 Unclassified. While the descriptions the private sector should use are different, data classification is a key issue. The private sector should modify the terminology used and create a structure that focuses on sensitivity both to the business and to consumers. There are a number of prior works in data classification, including ones that argue that proportionality is central to privacy. One such model is a modified version of the intelligence community s data classification system called Privacy 3.0 The Principle of Proportionality, which used tiers labeled: highly sensitive; sensitive; slightly sensitive; and non sensitive. This structure should be utilized by the private sector both for individuals data to focus appropriate privacy protections, but it is even more applicable in the Information Superiority structure for business data, as it will help your company understand what information it has, and what systems are critical, so that focused effort can be made to reduce a potential information imbalance that can be exploited by an organized adversary. The Lares Institute has done ground breaking research on consumer perceptions of data sensitivity, which can serve as a guide on the privacy issues, but this does not define sensitivity for business data, and this can vary widely between companies. The governance structure can help guide your business to understand how business information should be categorized, and this is a key early step in the information governance program. The fourth step companies must take is to make systematic behavioral changes to how information is collected and processed, so that information is appropriately shared with key stakeholders, both internal and external. The Information Governance structure that I recommend companies put in place must play a key role in changing behavior and encourage horizontal information sharing. Horizontal information sharing is a sharing of information across departments, or organizations. It is customer service sharing complaints with the engineering department so that issues are resolved in products. It is engineering department sharing solutions with customer service to improve customer satisfaction. It is also, for the public sector, different agencies sharing intelligence to prevent the next 9/11. And that really illustrates a final key point the public and private sector face the same issue, and need to work together to solve it. Whether it is the engineering and customer service divisions in a private company, or the CIA and FBI, information gathering and sharing are critical issues that must be addressed to deny our adversaries the information advantage they seek to gain. While much of this post has been about increasing information sharing in the private sector, the fact remains that we still face an organized, often state sponsored, threat on the other side. As recognized by the Obama Administration when it issued Executive Order 13549: 7
8 The need to share actionable, timely, and relevant classified information among Federal, State, Local, Tribal, and Private Sector (SLTPS) partners in support of homeland security is self evident. The way to do that is for the public and private sector to create structures, and share doctrines, such as Information Superiority, that facilitate this sharing, and increase our homeland security by working to eliminate the information advantage our enemies seek to exploit. Solving this problem will not be easy, and it will take time and resources, but there are resources that can assist. Through systematic and focused effort, coupled with the adoption of better information governance Information Superiority and sharing, we can address this threat, but to defeat an organized threat, we must organize our efforts, or we will fail to protect ourselves as we should. 8
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
The main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS
Presentation to the Cyber Security & Critical Infrastructure Protection Symposium March 20, 2013 PREPARED REMARKS BARBARA ALEXANDER, DIRECTOR OF CYBER INTELLIGENCE TASC INFRASTRUCTURE PROTECTION AND SECURITY
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
United States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
DIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
Cyber Adversary Characterization. Know thy enemy!
Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
National Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE
TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing
S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG Discussion Draft S.L.C. TH CONGRESS ST SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE
DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE JULY 2011 CONTENTS INTRODUCTION 1 STRATEGIC CONTEXT 2 FIVE STRATEGIC INITIATIVES Strategic Initiative 1: Treat cyberspace as an operational domain
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges
Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.
Cyberterror Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states. What are terrorists main uses of cyberspace? How does cyberterror
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
S. ll IN THE SENATE OF THE UNITED STATES A BILL
TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak
March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
How To Defend Yourself Against Cyber Attacks
Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.
Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Thank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow
Symantec Security Response WHITE PAPER Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow Symantec Security Response INSIDE What it is? How does this affect me? What can I do to make
Survey of Cyber Security Frameworks
Survey of Cyber Security Frameworks Alice Nambiro Wechuli (Department of Computer Science, Masinde Muliro University of Science and Technology, Kenya [email protected]) Geoffrey Muchiri Muketha (Department
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary
IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary Copyright Invictis Information Security Ltd. All rights reserved. Invictis Risk Intelligence Service Report Commercial
Trends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern
Data Analytics & Information Security
Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS
TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the
