Northrop Grumman Cybersecurity Research Consortium



Similar documents
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Cybersecurity High School and Beyond

Innovation, Partnership, Development

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

CyberSecurity Solutions. Delivering

Cybersecurity Strategic Talent Management. March, 2012

Middle Class Economics: Cybersecurity Updated August 7, 2015

TUSKEGEE CYBER SECURITY PATH FORWARD

Cybersecurity: Mission integration to protect your assets

Cybersecurity Delivering Confidence in the Cyber Domain

KEY TRENDS AND DRIVERS OF SECURITY

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Introduction to Cybersecurity Overview. October 2014

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

The fast track to top skills and top jobs in cyber. Guaranteed.

Thomas J. Schlagel Chief Information Officer, BNL

Advanced Threat Protection with Dell SecureWorks Security Services

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Address C-level Cybersecurity issues to enable and secure Digital transformation

The enemies ashore Vulnerabilities & hackers: A relationship that works

McAfee Security Architectures for the Public Sector

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

STRATEGIC HUMAN RESOURCE MANAGEMENT IN MODERN TIMES. By Maryam Bayi

Predictive Cyber Defense A Strategic Thought Paper

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Italy. EY s Global Information Security Survey 2013

Bellevue University Cybersecurity Programs & Courses

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

DYNAMIC INFRASTRUCTURE Helping build a smarter planet

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

Partnership for Cyber Resilience

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Cybersecurity in the States 2012: Priorities, Issues and Trends

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber security Building confidence in your digital future

Evidentiary Integrity for Incident Response (EIIR)

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

THE WORLD IS MOVING FAST, SECURITY FASTER.

The fast track to top skills and top jobs in cyber. Guaranteed.

Comprehensive real-time protection against Advanced Threats and data theft

Raytheon Cybersecurity and Small Business Engagement. Raytheon Jeff Jacoby

GUIRR UPDATE. Susan Sloan, Director. FDP Meeting * May 11, 2015

Succession Management/Planning Talent Management

Cyber Learning Solutions

[STAFF WORKING DRAFT]

WEBSENSE TRITON SOLUTIONS

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Risk and responsibility in a hyperconnected world: Implications for enterprises

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Cybersecurity and Privacy Hot Topics 2015

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

2012 North American Content Security Product Differentiation Excellence Award

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

TRITON APX. Websense TRITON APX

We Prevent Breaches (and surprises) Intelligent Prevention

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Dr. Dave Dampier Professor of Computer Science and Engineering

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Cybersecurity and internal audit. August 15, 2014

UNM Information Assurance Scholarship for Service (SFS) Program

Security & privacy in the cloud; an easy road?

Cyber Watch. Written by Peter Buxbaum

CyberArk Privileged Threat Analytics. Solution Brief

CyberSkills Management Support Initiative

Promoting a cyber security culture and demand compliance with minimum security standards;

Enterprise Cybersecurity: Building an Effective Defense

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Addressing Cyber Risk Building robust cyber governance

OPNAVINST A USFF/CNO N3/N5 10 Nov 2014

Security strategies to stay off the Børsen front page

CyberNEXS Global Services

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Transcription:

Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information Systems NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I

Key Points for This Presentation Cybersecurity threats continue to grow in numbers, sophistication, and significance Advanced Persistent Threat, intellectual property and other monetary theft, critical infrastructure, cyber warfare, Northrop Grumman is the leading provider of security systems and services to the USA public sector (growing internationally, as well) Defense, intelligence, civil government agencies (federal, state, local) Information operations, cyber security, identity management, physical security (e.g., access management, surveillance, etc) Very dynamic arena -- Addressing the cybersecurity challenges requires continuing advanced research from many organizations We are reaching out to the leading research universities to complement our cybersecurity R&D program and have created this consortium for collaborative projects

Northrop Grumman Today ~$34 billion in revenues 120,000 people, p 50 states, 25 countries Leading capabilities in: Climate and environment C4ISR and battle management Cybersecurity Defense electronics Homeland security Information technology and networks Naval shipbuilding Public health Systems integration Space and missile defense

Major Factors Affecting our Cybersecurity Technology Strategy Growth in range, size, and value of IT and CI applications Implies needs for many types of security architectures and ability to handle massive amounts of data and make real-time cybersecurity y decisions Cybersecurity has now become a national priority Increased investment and many more players rapidly changing arena requires continuing dialogs with many organizations Cybersecurity is a complex and multi-disciplinary subject Many dimensions and domain-specific aspects Technology developments but also strategic, economic, psychological, sociological, and legal developments Technology strategy must align with Northrop Grumman business Technology strategy must align with Northrop Grumman business strategy Technology investments largely governed by business strategy Need for some exploratory R&D

Planning the Northrop Grumman Cybersecurity Research Consortium Concept Create a research consortium for challenging cyber security problems Focus on leading schools and research relevant to NGIS strategies Scope includes joint Northrop Grumman-university research (IRAD and CRAD) Objectives Develop leading edge technology concepts and discriminators market shaping and increased PWin Increase Northrop Grumman thought leadership, technology intelligence, branding Increase graduate recruiting at top university cybersecurity programs Selecting Universities Graduate school ratings History and depth in cybersecurity Research center, commercialization Recognition in cybersecurity thought leadership, professional awards, research sponsors Northrop Grumman UR&R activities Research Areas 14 research areas defined in RFP See next chart Matched to Northrop Grumman cyber strategy 40+ proposals received, 10 selected

Northrop Grumman Cybersecurity Research Consortium Research Areas Application Security Attribution Critical Infrastructure Networks Cybersecurity Modeling and Simulation Decomposable Systems Fast Forensics Identity Management Information Tagging Architectures Insider Threats IPv6 Transition Privacy Security Metrics and Related Performance Measures Situational Awareness Supply Chain Risk

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Aligning Projects to Business Strategy Develop leading technology capabilities Stimulate thought leadership, innovations, educational initiatives Recruiting at leading university cybersecurity programs NGCRC Projects (2009-2010, 2010-2011) CMU Real-time malware detection, automatic exploit generation, control network cybersecurity, mobile network and device security MIT Secure software by design, secure audit trails, trusted cloud architectures with FPGAs, recovering system integrity with selective reexecution Purdue Watermarking and provenance, scalable cyber-ranges, fast forensics, defending SOA s against collaborative attacks Accelerating the Technology Transition Approach includes strategic framework and shorter communication lines Projects derived from market priorities, integration perspective, and strategic plan Collaborative projects, networking, cooperative use of facilities Education and professional development Northrop Grumman Cybersecurity Research Consortium expansion will include industry partners

An Assessment of the First 18 Months Funded projects at top research universities in cybersecurity CMU, MIT, Purdue Growing level of collaboration learning to work together, joint work on IRAD projects, some joint CRAD proposals in development, university PI s starting to call us about CRAD opportunities Example results CMU Automatic generation of exploits demonstrated on several applications, database of malware developed for Northrop Grumman massive information project MIT Secure by Design technology tested on Northrop Grumman biometrics software, innovative approach to cloud security incorporated into Northrop Grumman strategy Purdue Approach for scaling cyber test range results being applied to UK test range planning, digital watermarking applications Encouraging beginning, but much room for growth Evolving priorities New or expanded projects Additional universities,

Cybersecurity Talent Development Strategy Enhance the work environment Advanced technology developments Savvy leader Cyber community of practice Advanced cyber lab network Utilize social networking and other types of distributed collaboration Attract Talent University strategies Targeted experienced recruiting Military recruiting Future Technical ca Leaders Program Redeployment career pathways Flexible work offering Progressive compensation & benefits Clearance sponsorship strategy Engage/ Retain Develop / Invest Focus on continuing development and effective deployment of professional staff Industry and university research Expand Northrop Grumman Cyber Academy Progressive career path Certifications Internal rotational program Apprenticeships / mentoring

11