US Cyber Command. Lt Col Paul Young J64 Acting Chief, Architectures and Engineering Division

Similar documents
An Overview of Large US Military Cybersecurity Organizations

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Cyber Situational Awareness - Big Data Solution

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

DoD Strategy for Defending Networks, Systems, and Data

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

The Comprehensive National Cybersecurity Initiative

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Joint Information Environment Single Security Architecture (JIE SSA)

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

The Road to Cyber Power

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Some Thoughts on the Future of Cyber-security

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

DISA Testing Services for the Enterprise. Luanne Overstreet

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Cybersecurity Strategic Talent Management. March, 2012

Since creation of the first interconnected computer network in

DIVISION N CYBERSECURITY ACT OF 2015

Cyber Security Initiatives at the Federal Level & Technology Opportunities. Slide 1

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Hybrid Warfare & Cyber Defence

Operationally Focused CYBER Training Framework

Preventing and Defending Against Cyber Attacks November 2010

Computer Network Security & Privacy Protection

Middle Class Economics: Cybersecurity Updated August 7, 2015

DISA and the Evolving DoD Enterprise

Legislative Language

Command And Control Of Cyberspace Operations, A Strategic Perspective

How To Write A Cybersecurity Defense Assessment Report

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Faculdade de Direito, Lisboa, 02-Jul The Competitive Advantage of Cybersecurity

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Preface to the Fourth Edition

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Public Law th Congress An Act

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Network Management and Defense Telos offers a full range of managed services for:

Cyberspace Operations

Capabilities for Cybersecurity Resilience

United States Cyber Security in the 21st Century

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

1. Contracting Officer Representative (COR)

Cybersecurity on a Global Scale

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

Predictive Cyber Defense A Strategic Thought Paper

Privacy and Security in Healthcare

What Risk Managers need to know about ICS Cyber Security

Commercial and Government Information Technology and Industrial Control Prodnct or System Vulnerabilities Equities Policy and Process (U//FOUO)

The DoD CIO Charter:

Department of Defense INSTRUCTION

S. ll IN THE SENATE OF THE UNITED STATES A BILL

Standards for Security Categorization of Federal Information and Information Systems

Partnering with Small Business

CyberSecurity Solutions. Delivering

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Security & privacy in the cloud; an easy road?

Waterfall for NERC-CIP Compliance

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

National Initiative for Cyber Security Education

Cybersecurity Converged Resilience :

Next. Beyond Big Data: Riding the Technology Wave. Ira A. (Gus) Hunt Chief Technology Officer

Introduction to NICE Cybersecurity Workforce Framework

Principles of Information Assurance Syllabus

Rapid Cyber Remediation Response Management. Using the Game-Changing Capabilities from Project Remedies Inc.

Space Ground Services in the Joint Information Environment (JIE)

No. 33 February 19, The President

DIVISION N CYBERSECURITY ACT OF 2015

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cybersecurity Delivering Confidence in the Cyber Domain

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

FREQUENTLY ASKED QUESTIONS

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

Cybersecurity Definitions and Academic Landscape

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY. NOTICE: This publication is available digitally on the AFDPO WWW site at:

Confrontation or Collaboration?

Thank you for your very kind introduction.

S. ll IN THE SENATE OF THE UNITED STATES

Department of Defense DIRECTIVE

Update On Smart Grid Cyber Security

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Preventing and Defending Against Cyber Attacks October 2011

NICE and Framework Overview

Microsoft s cybersecurity commitment

future data and infrastructure

Manned Information Security

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Actions and Recommendations (A/R) Summary

Preventing and Defending Against Cyber Attacks June 2011

Transcription:

US Cyber Command Lt Col Paul Young J64 Acting Chief, Architectures and Engineering Division

Global Internet Growth DECEMBER 1995 16 million Internet users MARCH 2001 458 million Internet users FEBRUARY 2011 2.08 billion Internet users

Networks of Yesterday to Today Data transfer more than 1000 times faster than 10 years ago. Growth to 2.08 billion users. Easy application development aimed at nonexperts, complete with flaws and security vulnerabilities. Hardware is cheap, and has a much wider range of features. Tools: Ubiquitous and scripted.

Protection and Civil Liberties UNCLASSIFIED It is neither a choice nor a balance It is and always must be both. SAFEGUARDING OUR WEALTH & TREASURE PROTECTING & MAINTAINING PRIVACY & CIVIL LIBERTIES UNCLASSIFIED 4

A Disturbing Trend

Exploitation

Disruption

Operation BUCKSHOT YANKEE

Destruction Russian power facility remotely operated and controlled via a Supervisory Control and Data Acquisition (SCADA) system

Great Power Status In the 20 th century, developing, testing and possessing nuclear weapons conferred special power and prestige on a select group of nations In the 21 st century, this same power and prestige will be held by those that control the network.

Empowered Individual Status

Mitigating Network Vulnerabilities COCOMS CYBERCOM HQ, FT Meade, MD MARFORCYBER HQ, FT Meade, MD ARCYBER HQ, FT Meade, MD FT Belvoir INSIDE AFCYBER (24 th AF) HQ, San Antonio, TX Real-Time Distributed Architecture FLTCYBERCOM HQ, Ft Meade, MD NSA Global Platform PERIMETER DISA NSA CYBERCOM DHS USG OUTSIDE

Technology Priorities Virtualization Trusted computing/id validation Attribution/Forensics Shared situational awareness Role-based information sharing Cyber environment change detection Automated decision logic Personal security products/anonymizers Smart data/data tagging Tool development Social networking threat analysis

Evolution of USCYBERCOM The United States Cyber Command (USCYBERCOM): Plan, coordinate, integrate, synchronize, and conduct activities to direct operations and defense of Department of Defense information networks to prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries. USCYBERCOM Lines of Operations 1. DoD Global Information Grid Ops (DGO) 2. Defensive Cyber Operations (DCO) 3. Offensive Cyber Operations (OCO)

Mission and Capabilities UNCLASSIFIED USCYBERCOM Mission: USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. DoD Global Information Grid Operations Employment of manual and automated methods to preserve and sustain the availability, confidentiality, integrity and non-repudiation of military information networks Defensive Cyber Operations Synchronized real-time capability to discover, detect, analyze and mitigate threats and vulnerabilities, and outmaneuver adversaries, in order to defend Cyberspace and enable freedom of action Full Spectrum Cyber Operations Employment of full spectrum cyberspace operations to support COCOM operational requirements and the defense of DoD information networks UNCLASSIFIED 15

Projecting Power Today Whole of Government approach Building the TEAM Partnering for capacity Integrating broad expertise Innovative workforce

Whole of Government 17

Building Cyber Capacity

CYBERCOM S Architectural Challenges Architectures have been largely considered not operational Importance of architectures in a federated environment generally understated We are coming late to the game... 19

QUESTIONS?