Homeland Open Security Technology HOST Program

Similar documents
Homeland Open Security Technology (HOST)

The Comprehensive National Cybersecurity Initiative

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Middle Class Economics: Cybersecurity Updated August 7, 2015

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Actions and Recommendations (A/R) Summary

An Overview of Large US Military Cybersecurity Organizations

DHS, National Cyber Security Division Overview

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Department of Defense DIRECTIVE

Confrontation or Collaboration?

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

2) trusted network, resilient against large scale Denial of Service attacks

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

[STAFF WORKING DRAFT]

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Working with the FBI

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

CYBER SECURITY INFORMATION SHARING & COLLABORATION

DHS. CMSI Webinar Series

Legislative Language

Strategic Progress Update July 2014 March 2015

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Preservation of longstanding, roles and missions of civilian and intelligence agencies

CyberSkills Management Support Initiative

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NICE and Framework Overview

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA

Cyber Security Research and Development: A Homeland Security Perspective

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cybersecurity in the States 2012: Priorities, Issues and Trends

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

Into the cybersecurity breach

WRITTEN TESTIMONY OF

Cyber Security Research and Development a Homeland Security Perspective

NASCIO 2014 State IT Recognition Awards

Cyber Adversary Characterization. Know thy enemy!

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Developing a Mature Security Operations Center

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

How To Write A Cybersecurity Framework

How To Write A National Cybersecurity Act

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

I N T E L L I G E N C E A S S E S S M E N T

How To Make A National Security Agreement Between Dhs And Dod

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

Department of Homeland Security

The UK cyber security strategy: Landscape review. Cross-government

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Cybersecurity: Authoritative Reports and Resources

Oil & Gas Cybersecurity

What Risk Managers need to know about ICS Cyber Security

(BDT) BDT/POL/CYB/Circular

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

CERT/CC Overview & CSIRT Development Team Activities

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Water Sector Approach to Cybersecurity Risk Management

Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

U. S. Attorney Office Northern District of Texas March 2013

Transcription:

Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research Consortium Georgia Tech Research Institute Open Information Security Foundation Open Source Software Institute

Cybersecurity Essential Majority of US supply chains rely on information technologies that can be compromised at any time. CACI US Naval Institute report 2009 Continuous Cyber threats can be unintentional and intentional, targeted and nontargeted, and come from a variety of sources, such as foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers and disgruntled employees. GAO report 2009 Expensive You cannot replicate the NSA for domestic affairs, there isn't enough money, time or human talent. Defense Secretary Robert Gates, 2010

Vulnerability Operation Anti-Security Top Five Government Sites Hacked Summer 2011 The US Senate The Pentagon The CIA NASA FBI

HOST Program The mission of HOST is to investigate open security methods, models and technologies and identify viable and sustainable approaches that support national cybersecurity objectives.

DHS Science & Technology Directorate Drive innovation through advanced research activities Cyber security focus areas: User identity Data Privacy End System Security Research Infrastructure Law Enforcement Forensic Secure Protocols Education DHS S&T Program Areas: DNSSEC SPRI DECIDE HOST LOGIIC ITTC DETER PREDICT Secure Wireless CWID

HOST Program Public-Private Collaboration Government Industry Academia Open Source Development Communities Strategic Vision Leverage the technical, economic, administrative power of open source technologies for government use Objectives Drive innovation, advanced research in open security technologies, techniques and procedures Foster collaboration between public-private tech communities Invest in sustainable programs, accessible software assets

Open Security do more with less OPEN SECURITY Open development model Transparency, peer review, reusable tools Flexibility, resilience, durability of assets Non-restrictive license agreements, user rights to code access Access to resources Available repositories, community knowledge base Support Increase vendor competition Industry Community Academic participation Policy compliant

HOST Strategy DISCOVERY: Leading the discovery process to investigate existing and potential open security projects and techniques that support and protect government cyber networks. COLLABORATION: Coordinating collaborative development activities and establishing working relationships between public and private-sector research and development communities. INVESTMENT: Contributing seed investments in advanced research and development activities that support national cyber security objectives and producing sustainable project communities through broad adoption by public and private-sector use and support.

HOST Accomplishments HOST 2010-2011 DISCOVERY COLLABORATION INVESTMENT OpenCyberSecurity.org portal Open Technology Dossier Protocol Open Technology Inventory IA Open Source Policy Evaluation Open Information Security Foundation Government Strategic Council HOST Community Round Table Events Community Outreach Suricata IDS/IPS Engine FIPS Validated OpenSSL OpenCyberSecurity C&A

HOST Next Steps Identify more Open Security resources OpenCyberSecurity.org Information Portal Open Security Inventory, Open Technology Dossiers Adoption, Information Assurance, Acquisition Policy Issues Grow collaborative communities Government Industry Academia Development Communities Investment Opportunities Sustainable communities seed investments Provide leadership, vision, national cyber security objectives

Program Challenges Resistance to change Willingness to share sandbox Evolving business models Follow-through Consistent government vision Involvement of development community Ability to see the next horizon

Cyber Security: Our game to lose The U.S. government does not take sufficient advantage of innovative technology except within black budgets. U.S. government is missing a river of innovative technology, and it is both broad and deep. No one technology missed is a crisis, but in the aggregate, the U.S. government is falling behind in what it could do and what it is expected to do to protect the nation from cyber security threat. America s Cyber Future Security and Prosperity in the Information Age

HOST Contact Department of Homeland Security Luke Berndt, Program Manager Cyber Security Division Science & Technology Directorate Email: luke.berndt@dhs.gov Open Technology Research Consortium Joshua Davis, Principal Investigator Georgia Tech Research Institute Cyber Technology & Information Security Laboratory Email: joshua.davis@gtri.gatech.edu www.cyber.st.dhs.gov/host/