Raytheon Cybersecurity and Small Business Engagement. Raytheon Jeff Jacoby



Similar documents
Supplier Diversity. Supply Chain Management

Cybersecurity Delivering Confidence in the Cyber Domain

CyberSecurity Solutions. Delivering

Self-Insured Workers Compensation Program. Copyright 2010 Raytheon Company. All rights reserved. Page 1

DoD Strategy for Defending Networks, Systems, and Data

Supplier Diversity. Supply Chain Management

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

McAfee Security Architectures for the Public Sector

SYSTEMS SECURITY ENGINEERING

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Northrop Grumman Cybersecurity Research Consortium

How To Buy Nitro Security

Cybersecurity on a Global Scale

What is Security Intelligence?

Protecting critical infrastructure from Cyber-attack

Microsoft s cybersecurity commitment

Reliable, Repeatable, Measurable, Affordable

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS

IBM QRadar Security Intelligence April 2013

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

Q1 Labs Corporate Overview

DoD Software Assurance (SwA) Overview

Protecting against cyber threats and security breaches

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Cybersecurity and internal audit. August 15, 2014

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

The Comprehensive National Cybersecurity Initiative

CGI Cyber Risk Advisory and Management Services for Insurers

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Cyber Learning Solutions

FREQUENTLY ASKED QUESTIONS

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Meeting the Challenges of Virtualization Security

BlackRidge Technology Transport Access Control: Overview

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Cybersecurity The role of Internal Audit

ORGANIZADOR: APOIANTE PRINCIPAL:

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Overview TECHIS Carry out security testing activities

Looking at the SANS 20 Critical Security Controls

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cyber Watch. Written by Peter Buxbaum

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Manned Information Security

Advanced Threat Protection with Dell SecureWorks Security Services

Combating Cyber Risk in the Supply Chain

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

How To Protect Your Network From Attack From A Network Security Threat

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Enterprise Cybersecurity: Building an Effective Defense

Payment Card Industry Data Security Standard

IBM Security IBM Corporation IBM Corporation

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Defending against modern threats Kruger National Park ICCWS 2015

Bellevue University Cybersecurity Programs & Courses

Cisco Security Optimization Service

SANS Top 20 Critical Controls for Effective Cyber Defense

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Unified Security, ATP and more

Solving the Security Puzzle

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Preventing and Defending Against Cyber Attacks November 2010

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Preparing Millennials to Lead in Cyberspace

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Cybersecurity Converged Resilience :

Injazat s Managed Services Portfolio

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Raytheon Oakley Systems

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Department of Management Services. Request for Information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Developing Secure Software in the Age of Advanced Persistent Threats

CYBER SECURITY INFORMATION SHARING & COLLABORATION

The IBM Solution Architecture for Energy and Utilities Framework

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Building a Cyber Security Operations Center

Middle Class Economics: Cybersecurity Updated August 7, 2015

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Transcription:

Raytheon Cybersecurity and Small Business Engagement Raytheon Jeff Jacoby

Raytheon Cybersecurity and Small Business Engagement DHS Cyber SBIR Workshop July 26, 2012 Jeff Jacoby Director, Cyber Enterprise Campaign jaco@raytheon.com Copyright 2012 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company.

Raytheon Company WHO WE ARE Raytheon is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as a broad range of mission support services At a Glance Chairman and CEO: William H. Swanson 71,000 employees worldwide $25 billion in 2011 sales Raytheon: Aspiring to be the most admired defense and aerospace systems company through our world-class people and technology Page 3 3

Raytheon Businesses and Leadership Integrated Defense Systems Tewksbury, MA Chairman and CEO Space and Airborne Systems El Segundo, CA Rick Yuse Missile Systems Tucson, AZ Network Centric Systems McKinney, TX Intelligence and Information Systems Garland, TX BD and Raytheon International Operations Rosslyn, VA Thomas Kennedy Global Headquarters Waltham, MA Bill Swanson Technical Services Dulles,VA Taylor Lawrence Daniel Crowley Lynn Dugle John Harris II Page 4

Raytheon Cybersecurity Solutions Secure Systems & Architectures Prevention, Detection & Intrusion Tolerance Redundancy, Reconfiguration, & Deception Response and Restoration System, Network and Data Resilience Vulnerability and Security Assessments Physical and information security assessments Software vulnerability testing Penetration testing / red teaming / blue teaming Compliance and security audits Monitoring and Traffic Analysis Network monitoring / auditing Endpoint / insider threat protection Real-time network traffic analysis Enterprise and Information Assurance (IA) Solutions and Services Cross-domain information sharing Data protection Perimeter defense Cryptographic solutions Public Key Infrastructure (PKI) Certification and accreditation Security architectural engineering and systems integration DoD 8500.2, DCID 6/3, ICD 503, CND-SP Advanced Persistent Threat (APT) Solutions Zero-day behavior-based detection Malware detection and mitigation Anomaly detection Cyber threat analysis On-site CERT and SOC support Supply Chain Integrity Hardware authentication and tagging Static binary analysis of software Dynamic binary analysis of software Counterfeit detection Anti-Tamper Critical program information identification Critical technology protection Requirements analysis & definition Robust, cost-effective system solutions Computer Network Operations Vulnerability research Tool production Open source exploitation Threat identification / assessment Training Solutions Cyber professional training Customizable, scalable, continually updated Classroom, instructor-led web-module, and on-demand Page 5

Raytheon Cyber Acquisitions Houston Associates NetOps / Warfighter Networks DoD Communications Virtual Technology Corporation Joint, net-enabled, C2 Modeling and simulation solutions Oakley Networks Endpoint Security Insider Threat SI Government Solutions Innovation, creativity, deep R&D World Class Vulnerability Research Telemus Solutions, Inc. Cyber engineering, R&D Technical / cyber operations BBN Technologies Leading-edge comms and cyber Innovation, creativity, deep R&D CompuCat Research Pty Ltd. Content Filtering Product OCONUS Presence Technology Associates Mission-focused cyber Tools, Apps and Infrastructure, Customer R&D Trusted Computer Solutions Cross Domain Expansion / UCDMO Trusted OS experience Applied Signal Technologies, Inc. Core Signal processing & cyber depth Premier IP inspection capability Pikewerks Corporation Cyber R&D and special operations Anti-exploitation, forensics analysis Henggeler Computer Consultants, Inc. Software development, analytic engineering Cyber services, mission driven solutions Page 6

Cyber Technologies of Interest Trust Integrity Non-repudiation Identity management Attestation Anti-tamper Least Privilege Assurance Modeling and Simulation Software / Hardware Validation Cross Domain / Trusted Computing Information / Data Assurance Metrics and Measurement Situational Awareness Detection Analytics Multi-source Data Fusion Continuous Monitoring Common Operating Picture Resiliency Redundancy Diversity Isolation Containment Precedence Prioritization Reconstitution Agility Secure Mobility / Mobile Apps Cyber maneuver Deception Non Persistence Randomness Page 7

Why Raytheon uses SBIR / STTR Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Working Together Uses small business capability to develop key technology Creates opportunity for rapid technology insertion Establishes long-term relationships with key small businesses Strengthens relationships with Raytheon s customers Evolves from reactive to proactive engagement It s good for the economy and National security SUCCESSTOGETHER Page 8

Raytheon Approach to SBIR All Raytheon businesses serving U.S. Government clients have a SBIR/STTR team providing gateway access to our program offices and technology teams Raytheon has an integrated approach to combine IRAD, SBIR, and CRAD management under a process team consisting of Engineering, Programs and Supply Chain Raytheon has developed processes to match SBIR business technologists with our Subject Matter Experts (SMEs) and Government Clients Raytheon develops SBIR Tech Champs (SMEs and Program Managers) who engage technical points-of-contact and small business technologists Page 9

What does the Raytheon SBIR / STTR team do for small business? Enables Raytheon to gain knowledge of small business capabilities Helps small business understand Raytheon s products and customer goals Matches small business technical capabilities to Raytheon s program and functional needs Facilitates discussions, information exchange and development of business arrangements Supports small business SBIR/STTR Phase I and Phase II efforts where mutually beneficial and a strategic fit Assists small business with rapid technology insertion into Raytheon s system design and development and production programs Connects small business with other Raytheon businesses Page 10

Connecting with Raytheon Visit our website at http://www.raytheon.com to learn more about our company, businesses, and capabilities To register online as a potential Raytheon supplier: 1. Visit http://www.raytheon.com 2. Select Connect with Us in the upper banner 3. Select Raytheon Supplier Diversity 4. Select Potential Supplier Registration 5. Select REGISTER NOW Page 11

Raytheon SBIR/STTR Contacts Integrated Defense Systems Mike Armenia, Supplier Technology Innovation 401.842.2079 michael_p_armenia@raytheon.com Will Cottrell, Supplier Technology Innovation 978.987.9092 william_j_cottrell@raytheon.com Erin Lynch, Supplier Technology Innovation 978.684.6150 erin.j.lynch@raytheon.com Intelligence & Information Systems Bob Mojazza, Emerging Technologies Outreach 972.205.5244 bob_mojazza@raytheon.com Lee Wesner, Supplier Diversity 972.205.4308 lwesner@raytheon.com Missile Systems Robert Laporte, Supply Chain, Strategic Pursuits 520.545.9757 rjlaporte@raytheon.com Jo Anne Arvizu, Supplier Diversity 520.665.5919 jnarvizu@raytheon.com Network Centric Systems Valerie King, Supplier Diversity 508.490.2331 valerie_king@raytheon.com Kristen Campbell, NCS SBIR Coordinator 727.302.7182 kristen.campbell@raytheon.com Space & Airborne Systems Devon Crowe, Principal Engineering Fellow 310.607.6931 devon@raytheon.com Shirley J. Patterson, Supplier Diversity 310.616.1683 sjpatterson@raytheon.com Raytheon Technical Services Company LLC John S. Moore, Engineering & Product Development 317.306.4090 john_s_moore@raytheon.com Raytheon Corporate Armatha Edwards, Business Development 703.284.4362 aedwards@raytheon.com Page 12