The Road to Cyber Power

Similar documents
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET

An Overview of Large US Military Cybersecurity Organizations

Privacy and Security in Healthcare

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Cybersecurity: Mission integration to protect your assets

Cyber Situational Awareness - Big Data Solution

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

DoD Strategy for Defending Networks, Systems, and Data

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

DISA Testing Services for the Enterprise. Luanne Overstreet

SCADA Security Training

How To Build A Cybersecurity Company

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Security Threats on National Defense ICT based on IoT

Confrontation or Collaboration?

DON Cybersecurity/Information Assurance Workforce Management

SolarWinds Federal Cybersecurity Survey Summary Report

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

The Comprehensive National Cybersecurity Initiative

How To Improve The Defense Communications System

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Improvements Needed With Host-Based Intrusion Detection Systems

Cybersecurity Primer

Introduction to NICE Cybersecurity Workforce Framework

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

NICE and Framework Overview

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Service Oriented Architecture (SOA) for DoD

Guiding principles for security in a networked society

Marine Corps. Commercial Mobile Device Strategy

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Cyber Workforce Training

future data and infrastructure

( Increased usage of IP addresses )

Operationally Focused CYBER Training Framework

Network Systems Integration

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Federal Cloud Computing Strategy

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

U. S. Fleet Cyber Command / TENTH Fleet. Strategic Plan

Cyberspace Strategic Impact Social Risk Management. Cyber Security and Cyber Defence. Cyber Defense: NATO Vision

Space and Naval Warfare Systems Center Atlantic

Michael Yakushev PIR-Center, Moscow (Russia)

TUSKEGEE CYBER SECURITY PATH FORWARD

Cybersecurity Converged Resilience :

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Preventing and Defending Against Cyber Attacks November 2010

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Industrial Internet & Advanced Manufacturing

Flexible, Life-Cycle Support for Unique Mission Requirements

AT&T Cybersecurity Policy Overview

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

CYBERSECURITY RISK MANAGEMENT

The DoD CIO Charter:

Industrial Cyber Security 101. Mike Spear

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA

Resilient and Secure Solutions for the Water/Wastewater Industry

China s Economic Espionage

OPNAVINST A USFF/CNO N3/N5 10 Nov 2014

Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada

Comments :Incentives To Adopt Improved Cybersecurity Practices

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012

RETHINKING CYBER SECURITY

NICE Cybersecurity Workforce Framework Tutorial

DISA and the Evolving DoD Enterprise

Rethinking Cyber Security for Industrial Control Systems (ICS)

What is Really Needed to Secure the Internet of Things?

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Compliance, audit, risk, security what s the difference and why do we need it?

Subject: Critical Infrastructure Identification, Prioritization, and Protection

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Transcription:

0 Presentation to the Norman Forde Hampton Roads Chapter of the Association of Former Intelligence Officers The Road to Cyber Power Cyber Age, Cyberspace, Cyberpower, Cybersecurity, Commercial/Goverment Action Christopher Newport University October 28, 2009

1 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action

2 Over the last 250 years, waves of creative destruction emerge around the convergence of new technologies and organizational innovations Textiles, Canals and Machinery Steam, Coal, Iron and Rail Steel, Chemicals and Electricity Oil, Auto and Electronics Info and Com. Technology Age of Nano-Bio Tech and Robotics Agricultural Revolution (1700-1750) % of GDP 1771 Canal Mania Railway Mania The Gilded Age Roaring 20s Internet Craze Nano Nonsense FIRST WAVE SECOND WAVE THIRD WAVE FOURTH WAVE FIFTH WAVE SIXTH WAVE 1829 1873 1918 1971 2020 2070? 58 years 44 years 45 years 53 years 49 years 50 years Adapted from The Economist, Carlota Perez These waves create new industries, transform the underlying social and political-military systems, and create new sources and centers of power

3 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action

4 The number of users and methods used to access cyberspace have grown exponentially in size, scope and complexity Exponential Growth New Technologies Global Adoption Growth in the developed world exploded over the last 20 years 1990 2010 and will accelerate as a result of new technologies and reduced prices fueling the adoption of ICT in the developing countries Internet Users in China < 1 million 1.6 billion Internet Users 11 million 3 billion Cell Phones $100 laptops Miniaturized Smart Devices 111m 660m 2005 2020 100 Petabytes 1600 Exobytes Digital Data 300,000 700 million Ubiquitous Wireless Networks Internet Hosts 2005 2020 IP v6 Internet Users in India 21m 400m By 2020, there will be almost 3 billion internet users, driving massive new investments in infrastructure, technology, and new security architectures

ICT has transformed business models and warfighting, improving productivity and driving economic growth Massive Investment Mission Enablement Growing Vulnerabilities Industry and government invest $4t in ICT goods and services every year These investments have transformed business models and military operations while exposing substantial vulnerabilities and risks Computers $400b Finance: $3.2t per day in foreign exchange Hackers steal 40 million credit card numbers Software Servers Network Equipment $360b $60b $100b Health: Electronic Health Records Energy: 300k kilometers of lines carrying 3.8 b kilowatts per year E-Commerce: $200b in on-line sales Air Transportation: 741 million passengers per year Hackers steal 8.3 million Health Records Electricity grid in U.S. penetrated by spies Hackers break into FAA Air Traffic Control Systems Semiconductors $260b Defense: Network-Centric Operations However, greater dependence on ICT creates new vulnerabilities and risks for individuals, industry and government 5

6 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action

7 Both the current and former administrations understood the importance of cyber to the nation, as evidenced by robust policy and budget actions Enable the Economy Empower Society Enhance Security Digital Health Goal: Interoperable Electronic Medical Records Funding: $20-50b (5 years) Agencies: HHS, DoD, and DVA Intelligent Transportation Systems Goal: Smart Highways and Air Traffic Systems (NGATS) Funding: $20-30b (20 years) Agencies: DOT, NASA, DoD Rural Broadband Goal: Expand Broadband Infrastructure Funding: $7.2b Agencies: Commerce/NTIA and Agriculture/Rural Utilities Service Digital Education Goal: Improve Education through better Performance Data Funding:??? Agencies: Dept. of Education, State and Local, Private Mission Enablement Goal: Network-Centric Operations Funding: $20-30b Agencies: DISA, Services, UCC Network Defense Goal: Protect.mil and.gov networks Funding: $20-30b Agencies: DISA, DHS, Services, UCC (Cyber Command) Smart Energy Grid Goal: Improve efficiency through better data Funding: $10b (? Years) Agencies: Dept. of Energy, NERC, Utility Companies Digital Government Goal: Improve Transparency and Accountability Funding: $??b (? Years) Agencies: EOP, OMB, Agencies Network Exploitation Goal: Improve Intelligence Collection Funding: $??b Agencies: Intelligence Community, DoD CNCI Financial Reform Goal: Improve Transparency of Financial Markets and Protect Networks Funding:??? Agencies: Treasury, SEC,CFTC, Federal Reserve Digital Television Goal: Maximize Spectrum Improve TV Services Funding:??? Agencies: FCC, Commerce Network Attack Goal: Create new Military Capabilities Funding: $??b Agencies: Intelligence Community, UCC

8 Despite the convergence of interests, an inherent tension exists between all three in regards to the means of securing cyberspace Access and Inclusion Innovation and Growth Security and Safety Understanding and addressing these key tension is key to realizing the full benefits of cyber while managing the risks

9 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action

10 Cybersecurity needs a multidisciplinary approach addressing all levels international, domestic, and organizational - and all sectors civil society, business and government POLICY & GOVERNANCE (legal, regulatory, policy, strategy, authorities) LEADERSHIP & CULTURE (communication, incentives, human capital, training) International PLANNING & OPERATIONS (planning, info. sharing/collab., operations, lessons learned) TECHNOLOGY & STANDARDS (R&D, architecture, standards, solutions) MANAGEMENT & BUDGETING (planning, programming, budgeting, performance) National Organizational/Agency

11 Agenda Understanding the Cyber Age Cyberspace Opportunities and Threats Cyberpower Social, Economic, Security Cyber Security Pillars Commercial/Government Action

12 Strategy: Cyber University will contain all the learning assets for staff who want to develop their cyber knowledge, skills, and abilities Cyber University is a tool to help develop staff, quickly and cost effectively, who are able to perform high-quality work for Booz Allen cyber clients Cyber University contains lists of all cyber related courses, cyber certifications (including preferred vendors), and universities with top cyber programs Learning roadmaps will be designed for key cyber roles so staff will have a clear path to follow to develop cyber skills Cyber University will track cyber certifications and will allow staff to show skill proficiency to quickly move through the roadmap

13 Navy: Is aligning commands, functions and people in an unprecedented manner to meet the mission requirements of Cyber, IO, Intel, Space, and NetOPS IOC after 1 Oct 09 Strategy in progress-governance for program, operations and people is a priority Over 3,000 people involved just at IOC Information Dominance Corps in design No major location migrations besides growth at TENTH Fleet build out at Ft Meade anticipated Navy Staff model will be function focused to break platform centric thinking/programming NAVCENT NAVEUR New Navy Cyber Forces l AIRFOR SUBFOR FLTCOM s NAVAF NAVSOUTH PACFLT NSW USFF TYCOM Embedded SME Support Man, Train, & Equip SURFOR M,T&E CNO NAVSOC N2/N6 DCNO Information Dominance DIRLAUTH NAVY Network Warfare Command OPCON New ADCON Fleet Operational Missions STRATCOM USCYBERCOM OPCON OPCON OPCON OPCON NCTAMS New NCDOC FLTCYBERCOM/ US TENTH FLT NIOCs/CTFs OPERATIONS NSA SCE NIOC SUITLAND (RDT&E) SPAWAR supporting Navy undertaking most wide reaching/and boldest alignment The Navy has taken the additional significant step to integrate the N2 (intelligence) and N6 (communications) staffs on the Navy Staff

14 USCYBERCOM Organization DISA Field Office (DFO) Director s s liaison to USCYBERCOM Forward-based at Fort Meade Target: 50% manning NLT 1 Oct 2009 DISA Support Element (DSE) Liaison between Joint Operations Center (JOC) and DISA Operations Shared Situational Awareness Embedded in JOC (24 x 7)

15 QUESTIONS? Shift Happens Video http://www.youtube.com/watch?v=fdtofkhaplo&feature=related http://www.youtube.com/watch?v=f5k-j00t9um&feature=related