US Federal Cyber Security Research Program. NITRD Program
|
|
|
- Britton Summers
- 10 years ago
- Views:
Transcription
1 US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related policy making in the White House Office of Science and Technology Policy (OSTP) Scope Approximately $4B/year across 14 agencies, seven program areas Cyber Security and Information Assurance (CSIA) Human Computer Interaction and Information Management (HCI&IM) High Confidence Software and Systems (HCSS) High End Computing (HEC) Large Scale Networking (LSN) Software Design and Productivity (SDP) Social, Economic, and Workforce Implications of IT and IT Workforce Development (SEW) Established by the High-Performance Computing Act of
2 NITRD Structure for US Federal Cybersecurity R&D Coordination OSTP OMB National Science and Technology Council National Coordination Office for NITRD NITRD Subcommittee Senior representatives from agencies conducting NIT R&D National security systems R&D Special Cyber Operations Research and Engineering (SCORE) Interagency Working Group Cybersecurity R&D Senior Steering Group Cyber Security and Information Assurance Interagency Working Group (CSIA IWG) Senior representatives from agencies with national cybersecurity missions Program managers with cybersecurity R&D portfolios 3 Coordinated Effort on Game-Changers Changers It s about trustworthiness of digital infrastructure Security, reliability, resiliency, privacy, usability How can we: Enable risk-aware safe operations in compromised environments Minimize critical system risk while increasing adversaries costs and exposure Support informed trust decisions, necessitating flexible security strategies, and allowing for effective risk/benefit analyses and implementations Strong commitment to focus on game-changing technologies for coordinated cybersecurity R&D agenda 4
3 Federal Cybersecurity R&D Strategic Plan Research Themes Science of Cyber Security Support for National Priorities Transition to Practice deral-cybersecurity-rd-strategic-plan-released 5 R&D Coordination Through Themes Theme Hard Problem Themes provide shared vision of desired end state Themes compel a new way of operating / doing business Themes attack underlying causes to bring about changes Established through robust community discussion of what matters Themes recognize that independent thinking is vital to good research 6
4 Research Themes Tailored Trustworthy Spaces Supporting context specific trust decisions Moving Target Providing resilience through agility Cyber Economic Incentives Providing incentives to good security Designed-In Security Developing secure software systems Annually re-examine themes Enrich with new concepts Provide further definition or decomposition 7 7 Tailored Trustworthy Spaces In the physical world, we operate in many spaces with many characteristics Home, school, workplace, shopping mall, doctor s office, bank, theatre Different behaviors and controls are appropriate in different spaces Yet we tend to treat the cyber world as a homogenous, undifferentiated space The vision is of a flexible, distributed trust environment that can support functional, policy, and trustworthiness requirements arising from a wide spectrum of activities in the face of an evolving range of threats 8
5 TTS Paradigm Users can select/create different environments for different activities satisfying variety of operating capabilities Confidentiality, anonymity, data and system integrity, provenance, availability, performance Users can negotiate with others to create new environments with mutually agreed characteristics and lifetimes Basing trust decisions on verifiable assertions 9 TTS R&D Program Examples Trusted foundation for cyberspace operations [OSD and Service Labs] High assurance security architectures [NSA, ONR, AFRL, NIST] Content and Context Aware Trusted Router (C2TR) [AFRL] Information Security Automation Program [NIST, NSA, DHS] Security Content Automation Protocol (SCAP) Access Control Policy Machine [NIST] Military Networking Protocol (MNP) program [DARPA] High-Level Language Support for Trustworthy Networks [NSF] 10
6 Moving Target Controlled change across multiple system dimensions to: Increase uncertainty and apparent complexity for attackers, reduce their windows of opportunity, and increase their costs in time and effort Increase resiliency and fault tolerance within a system 11 Moving Target Paradigm All systems are compromised; perfect security is unattainable Objective is to continue safe operation in a compromised environment, to have systems that are defensible, rather than perfectly secure Shift burden of processing onto attackers 12
7 MT R&D Program Examples Polymorphic Enclaves and Polymorphic Machines [AFRL] Self Regenerative, Incorruptible Enterprise that Dynamically Recovers with Immunity [AFRL] Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) [DARPA] Cyber Camouflage, Concealment, and Deception [DARPA] Morphing Network Assets to Restrict Adversarial Reconnaissance (Morphinator) [Army] Defensive Enhancements for Information Assurance Technologies (DEFIANT) [Army] Robust Autonomic Computing Systems [ONR] 13 Cyber Economics & Incentives A focus on what impacts cyber economics and what incentives can be provided to enable ubiquitous security: New theories and models of investments, markets, and the social dimensions of cyber economics Data, data, and more data with measurement and analysis based on that data Improved SW development models and support for personal data ownership 14
8 CEI Paradigm Promotion of science-based understanding of markets, decision-making and investment motivation Security deployment decisions based on knowledge, metrics, and proper motivations Promote the role of economics as part of that understanding Creation of environments where deployment of security technology is balanced Incentives to engage in socially responsible behavior Deterrence for those who participate in criminal and malicious behavior 15 CEI R&D Program Examples Secure and Trustworthy Cyberspace (SaTC) Program (FY12 Solicitation) NSF Computer & Information Science & Engineering Directorate + NSF Social, Behavioral & Economic Sciences Directorate 16
9 Designed-In Security Designing and developing SW systems that are resistant to attacks Generating assurance artifacts to attest to the system s capabilities to withstand attacks 17 Designed-In Security Paradigm Require verifiable assurance about system s attack-resistance to be natively part of the SW design, development, and evolution lifecycle Enable reasoning about a diversity of quality attributes (security, safety, reliability, etc.) and the required assurance evidence Stimulate further developments in methods and tools for detecting flaws in SW 18
10 DIS R&D Program Examples Survivable Systems Engineering [OSD/SEI CERT] Trusted Computing [DARPA, NSA, OSD, NIST] Software Development Environment for Secure System Software & Applications [ONR] META (flows, tools, and processes for correctby-construction system design) [DARPA] Software Assurance Metrics And Tool Evaluation (SAMATE) [DHS, NIST] 19 Strategic Thrusts Research Themes TTS, MT, CEI, DIS Science of Cyber Security Support for National Priorities Transition to Practice 20
11 Science of Cyber Security A major research initiative on the science of security that Organizes the knowledge in the field of security Investigates fundamental laws Results in a cohesive understanding of underlying principles to enable investigations that impact large-scale systems. Enables repeatable experimentation Supports high-risk explorations needed to establish such a scientific basis Forms public-private partnerships of government agencies, universities, and industry 21 Some Potential Science of Security Research Topics Methods to model adversaries Techniques for component, policy, and system composition A control theory for maintaining security in the presence of partially successful attacks Sound methods for integrating the human in the system: usability and security Quantifiable, forward-looking, security metrics (using formal and stochastic modeling methods) Measurement methodologies and testbeds for security properties Development of comprehensive, open, and anonymized data repositories 22
12 Science of Security Program Examples AFOSR 2011 Science of Security MURI Stanford, Berkeley, Cornell, CMU, U of Penn NSA Science of Security Lablets UIUC, NC State, CMU NSF TRUST Program components Berkeley, CMU, Cornell, San Jose SU, Stanford, Vanderbilt 23 Support for National Priorities Goals Maximize cybersecurity R&D impact to support and enable advancements in national priorities Examples of Supported National Priorities Health IT Smart Grid Financial Services National Strategy for Trusted Identities in Cyberspace (NSTIC) National Initiative for Cybersecurity Education (NICE) 24
13 Transition ion to Practice Concerted effort to get results of federally funded research into broad use Integrated demos Conferences and workshops Matchmaking efforts Among Agencies Between research and product Potential funding for last mile 25 Drivers for next-generation solutions Basing trust decisions on verifiable assertions Shifting burden of processing onto attackers SW (system) lifecycle must natively incorporate verifiable assurance about system s attack-resistance 26
14 For More Information Tomas Vagoun, PhD CSIA IWG Technical Coordinator National Coordination Office for Networking and Information Technology Research and Development Suite II-405, 4201 Wilson Blvd. Arlington, VA Tel: (703)
US Federal Cybersecurity R&D Strategic Plan
US Federal Cybersecurity R&D Strategic Plan NITRD (Program) Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
June 9, 2014. Dear Colleagues:
June 9, 2014 Dear Colleagues: Today our Nation s security, economic progress, and modern lifestyle all rely upon maintaining a trustworthy digital infrastructure that is resilient and responsive to threats.
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
How To Plan A Federal Cybersecurity Research And Development Program
TRUSTWORTHY CYBERSPACE: STRATEGIC PLAN FOR THE FEDERAL CYBERSECURITY R ESEA RCH A ND DEVELOPMENT PROGRAM Executive Office of the President National Science and Technology Council DECEMBER 2011 TRUSTWORTHY
Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?
Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,
Cyber Security Division Overview
Homeland Security Advanced Research Projects Agency Cyber Security Division Overview Douglas Maughan, Ph.D. Director October 9, 2012 http://www.cyber.st.dhs.gov Environment: Greater Use of Technology,
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
No Free Lunch in Cyber Security
No Free Lunch in Cyber Security George Cybenko [email protected] Jeff Hughes [email protected] MTD Workshop Scottsdale AZ November 3, 2014 Acknowledgements Kate Farris, Ph.D. Student, Dartmouth Dr.
Testimony of. Before the. May 25, 2011
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif
Cloud Resilient Architecture (CRA) -Design and Analysis Glynis Dsouza Hamid Alipour Salim Hariri Youssif-Al-Nashif NSF Center for Autonomic Computing University of Arizona Mohamed Eltoweissy Pacific National
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
DHS S&T Cyber Security R&D Program
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA [email protected]
Vol. 19 No. 4 2012. Building a national program for cybersecurity science. Globe at a Glance According to the Experts Pointers Spinouts
Vol. 19 No. 4 2012 Building a national program for cybersecurity science Globe at a Glance According to the Experts Pointers Spinouts GUEST Editor s column Frederick R. Chang, PhD Considered by most to
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
DHS S&T Cyber Security R&D Programs
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security R&D Programs Ann Cox, PhD Program Manager October 24, 2014 http://www.dhs.gov/cyber-research Presentation Outline Threat Space
Big Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
Participants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC
Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC CSF Conference June 25, 2012 An Initiative of 18 Tremont Street,
Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.
Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government
Cyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation
National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal
RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.
INCO-TRUST: Intl Co-Operation in Trustworthy, Secure and Dependable ICT Infrastructures Neeraj Suri, TU Darmstadt, Germany James Clarke, Waterford Institute of Technology, Ireland INCO-TRUST Canada US
Information Technology Strategic Plan
Information Technology Strategic Plan Delivers solutions that are planned, anticipate the future and valued by customers Introduction Our Information Technology Strategy supports the Corporate Plan by
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Addressing Human Behavior in Cyber Security
Addressing Human Behavior in Cyber Security Image: Sileo.com Michael Orosz, Ph.D. USC Information Sciences Institute This discussion is proudly sponsored through a partnership between AFCEA, IEEE Computer
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
DOE Cyber Security Policy Perspectives
DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Software Quality and Infrastructure Protection for Diffuse Computing
FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
