Overview. Enabling Successful Development Efforts: Standards, People, and Culture: The Enterprise Perspective March 9, September 16, 2011

Similar documents
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Cybersecurity Strategic Talent Management. March, 2012

Northrop Grumman Cybersecurity Research Consortium

Data Analytics & Information Security

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Cybersecurity Delivering Confidence in the Cyber Domain

Department of Homeland Security Federal Government Offerings, Products, and Services

Advanced Threat Protection with Dell SecureWorks Security Services

Manned Information Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Raytheon Cybersecurity and Small Business Engagement. Raytheon Jeff Jacoby

Reliable, Repeatable, Measurable, Affordable

IEEE-Northwest Energy Systems Symposium (NWESS)

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Network Security Deployment (NSD)

NIST Cybersecurity Framework Manufacturing Implementation

DoD Strategy for Defending Networks, Systems, and Data

Rising to the Challenge

QRadar SIEM and FireEye MPS Integration

ICBA Summary of FFIEC Cybersecurity Assessment Tool

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Northrop Grumman White Paper

Cyber Situational Awareness - Big Data Solution

Software Sustainability Challenges for Acquisition, Engineering, and Capability Delivery in the Face of the Growing Cyber Threat

Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Changing the Enterprise Security Landscape

Disclosure of Proprietary Data Notice

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

STREAM Cyber Security

REQUEST FOR INFORMATION

Industrial Control Systems Security Guide

Flexible, Life-Cycle Support for Unique Mission Requirements

FFIEC Cybersecurity Assessment Tool

OUTSIDE-IN Transforming Enterprise IT

Operationally Focused CYBER Training Framework

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

Partnering with Small Business

Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

Department of Information and Technology Management

BOARD OF GOVERNORS MEETING JUNE 25, 2014

Update On Smart Grid Cyber Security

Cyber Watch. Written by Peter Buxbaum

Cyber R &D Research Roundtable

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Debate Session II No More Mr. Nice Guy! Tightening the screws on Cloud Security. Thursday 27 March :20 10:50 am Iben Rodriguez

Security strategies to stay off the Børsen front page

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

CyberSecurity Solutions. Delivering

How To Do Business With Northrop Grumman

Client Technology Solutions Suresh Kumar Chief Information Officer

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Cyber Security Metrics Dashboards & Analytics

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Middle Class Economics: Cybersecurity Updated August 7, 2015

How To Protect Your Data From Being Hacked

Building a Cyber Security Operations Center

Intelligence Driven Security

Actions and Recommendations (A/R) Summary

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

SAIC Corporate and Small Business Introduction

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Protecting Malaysia in the Connected world

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Strategic Plan On-Demand Services April 2, 2015

National Initiative for Cyber Security Education

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Cyber Security Defense Services Portfolio Development Status. February 2016

The Evolution of Application Monitoring

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Preventing and Defending Against Cyber Attacks November 2010

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Thomas J. Schlagel Chief Information Officer, BNL

Cyber Security for Advanced Manufacturing Next Steps

AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions

DoD CIO UNCLASSIFIED. DIB CS Program Value-Added

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

McAfee Network Security Platform

Cybersecurity Enhancement Account. FY 2017 President s Budget

The Aviation Information Sharing and Analysis Center (A-ISAC)

ADDENDUM 4 TO APPENDIX 3 TO SCHEDULE 3.3

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Third-Party Cybersecurity and Data Loss Prevention

Trusted Experience on Major Data Center Initiatives

US-CERT Year in Review. United States Computer Emergency Readiness Team

Providing On-Demand Situational Awareness

KUDELSKI SECURITY DEFENSE.

Cisco Advanced Malware Protection for Endpoints

Defense Security Service

Continuous Network Monitoring

Joint Information Environment Single Security Architecture (JIE SSA)

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

Transcription:

Software Assurance Information (SwA) Systems Forum Overview Enabling Successful Development Efforts: Standards, People, and Culture: The Enterprise Perspective March 9, 2009 September 16, 2011 Brian P. Gallagher Division Director Cyber Intelligence Division Northrop Grumman Information Systems

NGC Cyber Capabilities at a Glance Weaponized Platforms Resilient Systems Weaponized Payloads Non-Kinetic Effects Secure Supply Chain Cyber Capability Training Programs Facility Staffing CND Operations (IC, DoD, Fed) Title 50 & Title 10 Operations Intelligence Fusion & Analysis NCC, Kinetic & Non-Kinetic C2 Next Generation Networks Aerospace Systems Electronic Systems Technical Services Information Systems Integrated Cyber Security Goals and Future Vision Corporate Cross Sector Initiatives Project Viceroy Project NKE Multi-Int, Multi-Sensor Mission Assurance Coordinated Non-Kinetic and Kinetic Mission Assurance 2 Committed to Addressing The Nation s Challenges

3

NGC s CyberSecurity Experience Private Sector Federal Department of Defense Intelligence Community Key Programs Northrop Grumman Global Network (NGGN) DHS/DOJ CISO Support DoS Enterprise NW/Security Treasury GSOC USCYBERCOM, US ARMY I2WD, 1 st IO CMD, 5 th SIG, 7 th SIG, MCNOSC Restricted Programs, Multiple Customers Description Enterprise security and risk mgmt (120,000 users) 24x7 CyberSecurity Operations (Protect, Detect, Respond, Recover) APT defensive technologies Smart Card/HSPD-12 SOCs/CSIRCs TIC implementation FISMA, PKI Deep packet inspection Continuous vulnerability assessment and risk mgmt Forensics Tier-1,2 & 3 Incident Handling and Response for DoD GIG, LANDWARNET, Marine Corps Enterprise Network Security architecture, engineering & testing Cyber Test & Exercises Cyber sensors and system development, integration & test System deployment, sustainment, training Collaborative, agile software development 4 Relevant Expertise Integrated COTS and custom solutions InfoShield framework Legal/privacy issues CyberSecurity info sharing across.mil,.gov,.com R&D Investments to enhance capabilities Collaboration tools to improve notification Risk management and prioritization Executive dashboard vulnerability status Enterprise Patch Mgmt Visualization tools Near real-time CND situational awareness C2, coordination CNO Mission & Exercise Planning Vulnerability mgmt Cyber Threat Analysis Emulation, Modeling & Simulation Northrop Grumman Cyber Academy Research & Development Interfaces to IC-based capabilities for response and threat tracking Support transfer of IC capabilities/knowledge Advanced threat detection and analytics

Cybersecurity Relationships & Partnerships Corporate Strategic Technology Partners Lab investments, joint R&D Small Businesses, Key Vendors Research University Relationships 100+ university partnerships Cybersecurity Research Consortium (Carnegie Mellon, MIT, Purdue Universities) Industry and research consortia, national level advisory boards, professional societies DoD Defense Industrial Base (DIB) 5 Resources to Accelerate the Pace of Cyber R&D

Standardization: The Program Execution Framework (PEF) Reference Model 6 Reference model shows all activities for all program types

PEF assets are stored on T3G landing pages Links to policies and procedures Integration with sector PM Handbook Wiki to share and deliver data T3G = Templates, Tools, Training, and Guidance 7

Managers use PMPro to tailor the PEF PMPro an Access db tool used to help Programs plan the appropriate management controls to be implemented including applicable policies, procedures, work products & associated success criteria, and gate review points. Single Program use (i.e., start new instance of tool for each program) 8 The NG PM Pro tool assists in tailoring the NG quality standards to a program

PEF program types 9 1. Product Development. Activities involved in the transformation of customer needs to delivered products or service systems required to deliver services. 2. Product Maintenance. Activities involved in the adaptive, corrective, improvement, enhancement and sustainment of delivered products 3. Production / Manufacturing. Activities to repetitively produce products with no or slight variations on an approved core design. 4. Staff Augmentation. Activities related to providing consulting expertise with process ownership of program management only; delivering hours only. Management of the activities is done by the customer. 5. Professional Services. Activities related to providing services as specified, including ownership of essential processes. Unique program management of the activities is done by NG. 6. IT Managed Services. Activities related to providing Information Technology infrastructure services to organizations. 7. Operations. Operations, routine maintenance, and / or support to accepted, deployed, operational systems. 8. Product Line. Activities to build a set of systems or products sharing a common, managed set of features that satisfy the specific needs of a particular market segment or mission and that are developed from a common set of core assets in a prescribed way.

NGIS Program Execution Framework (PEF) NG PM Pro tool encapsulates: Program types Work products and success criteria Business rules to select applicable work product elements, success criteria, and gates Reference Model defines: Core activities for Programs, Engineering, Mission Assurance Review gates Each activity defined by: Policy (Command Media ISP) Procedure (Command Media ISO) Work products and success criteria For each activity, T3G defines: Templates Tools Training Guidance 10 Mark pages according to the proprietary level of information as described in Company Procedure J103 (or remove)

Summary NGIS is a strong partner in assuring our products and services exceed customer expectations The NG Program Execution Framework codifies best practices enables program execution success, and ensures consistent execution through independent gate reviews and in execution process evaluations 11

12