Cybersecurity Strategic Talent Management. March, 2012

Similar documents
Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cybersecurity Delivering Confidence in the Cyber Domain

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Northrop Grumman Cybersecurity Research Consortium

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

NICE and Framework Overview

Computer System Security Updates

How To Build A Cybersecurity Company

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

Evolving Optical Transport Network Security

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Initiative for Cyber Security Education

EC Council Certified Ethical Hacker V8

LINUX / INFORMATION SECURITY

The Comprehensive National Cybersecurity Initiative

Cybersecurity High School and Beyond

CEH Version8 Course Outline

Cyber R &D Research Roundtable

CYBERTRON NETWORK SOLUTIONS

CyberSecurity Solutions. Delivering

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Homeland Security Lessons Learned: An Analysis from Cyber Security Evaluations

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Certified Ethical Hacker (CEH)

Cyber Security Operations: Building or Outsourcing

BotNets- Cyber Torrirism

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

National Initiative for Cybersecurity Education

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Ed Ferrara, MSIA, CISSP Fox School of Business

EC-Council. Certified Ethical Hacker. Program Brochure

Defense Security Service

Preventing and Defending Against Cyber Attacks November 2010

DHS. CMSI Webinar Series

NETWORK SECURITY ASPECTS & VULNERABILITIES

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CyberSkills Management Support Initiative

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

Bellevue University Cybersecurity Programs & Courses

How To Write A National Cybersecurity Act

Web Applications The Hacker s New Target

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

[CEH]: Ethical Hacking and Countermeasures

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

ADC Survey GLOBAL FINDINGS

Federal Communications Commission

Reliable, Repeatable, Measurable, Affordable

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Detailed Description about course module wise:

Protecting against cyber threats and security breaches

WRITTEN TESTIMONY OF

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

How To Become A Cybersecurity Consultant

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Preventing and Defending Against Cyber Attacks June 2011

DoD Strategy for Defending Networks, Systems, and Data

Advanced & Persistent Threat Analysis - I

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

National Initiative for Cybersecurity Education

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

[STAFF WORKING DRAFT]

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

An Overview of Large US Military Cybersecurity Organizations

Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

TUSKEGEE CYBER SECURITY PATH FORWARD

Confrontation or Collaboration?

Cybersecurity: Mission integration to protect your assets

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Introduction of the GCCD. (Global Cybersecurity Center for Development)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Penetration Testing //Vulnerability Assessment //Remedy

Transcription:

Cybersecurity Strategic Talent Management March, 2012

Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2

Talent Management Challenge Mission: Attract, Develop, Engage and Retain What are Cyber missions today and in the future? What talent do we need? How do we develop interest for the profession and grow a pipeline? How do we attract and develop talent? How do we create a cyber aware and cyber safe workforce? How do we develop Cyber thinking and talent in all of our mission areas? How do we meet generalized and specific Cybersecurity training needs? How do we foster innovation in our Cyber workforce? What do we need to do for retention and career development? How do we get our customers, partners and suppliers engaged? 3 Cyber needs to be institutionalized for the future

Threat Evolution High Intruder Knowledge Packet Spoofing Sniffers Denial of Service Tools Cross - site Scripting Stealth Advanced Scanning Techniques SQL Injection Conficker 2009 Staged Estonia DDoS Distributed Attack Tools Stuxnet 2010 Google v. China Disabling Audits Backdoors Sweepers GUI Network Management Diagnostics WWW Attacks Automated Probes / Scans Attack Sophistication Burglaries Hijacking Sessions 4 Low Exploiting Known Vulnerabilities Password Cracking Self - Replicating Code Password Guessing Intruders 1985 1990 1995 2000 2005 2010 Source : www. cert. org

C A P A B I L I T I E S Northrop Grumman Cybersecurity Mergers & Acquisitions Technology Development & Operations UK Cyber Range Sterling Software Incorporated SILENTWIRE DARPA National Cyber Range IM&S JTF-GNO Research Consortium DOJ Cyber Tactical Data Systems Westinghouse Defense Electronics Logicon Essex Active Defense BACN NETCENTS Einstein III CAWS HSDN NYC WiN Control system for USPS Message text handling 4 th Gen Software languages Xetron Army 1 st IO TRW XonTech CSOC 3001 Sentinel XD Virginia IT Agency Sentinel XD Cyber- Mission Planning Tool for all U.S. Military Teledyne Ryan Aeronautical Marine Corps NOSC 1970 1980 1990 2000 2010 TODAY 5 30+ Year History of Cybersecurity Expertise & Proven Solutions

Northrop Grumman Cybersecurity A Premier Cybersecurity Provider for: Department of Defense National Security Agency US CYBER Command Defense Information Systems Agency Defense Advanced Research Projects Agency National Reconnaissance Office Defense Intelligence Agency Department of Homeland Security Department of Justice Department of the Treasury Veterans Administration Department of State Federal Bureau of Investigation New York City State of Virginia Defensive Cyber: Offensive Cyber: Research & Education 6 Defense Industrial Base Pilot Buckshot Yankee mitigation 150+ strategic industry partners cutting edge small companies Network Operation Security Centers Industry leading internal network security center Classified Capabilities Classified Customers Leading Integrator of Full-Spectrum Cybersecurity for Federal Government NGC Cybersecurity Research Consortium R&D Partners 100+ Universities 51 Laboratories Small Business Incubator Programs NGC Cyber Academy Cyber Patriot Sponsor NGC Cyberspace Solutions Center STEM

Cyber Academy Training Framework Partnerships UMUC: Natl policy and Law UMBC: Secure S/W Eng GMU: Ethical Hacking/Analysis CMU: Operational Security Specialization Specialty training to address Advanced Threat challenges Advanced Specialty Training Pen Testing/Ethical hacking Incident Handling/ Intrusion Detection Digital Forensics Skills Skill development focused on delivery of secure capabilities/solutions Secure Architecture Design & Engineering Secure Software Engineering Secure Architecture Design Secure Coding Methods and Practices Certifications Certifications based on business/skills needs aligned with DoD 8570 reqts Cyber Certification Program DoD 8570 related CERTs Security + CISSP, etc. Awareness/ Basic Trng 7 Awareness education and training for all levels Basic Awareness Education / Training * External offering available Skill(s) Mapping/Competency Modeling, Partnerships, Technology/Research Note: Yellow text indicates completed activities Cyber 001 Cyber 002 Cyber 101

Panel s Goals - Share our Experience, Successes and Challenges Growing and Developing a Talent Pipeline Structuring a comprehensive approach to training Professional Development Working with our partners - universities and technology Delivering results through our people 8 Successful Cyber Operations - Starts with People