Security BoF: What Are The Community's Open Questions? Joe St Sauver, Ph.D. or Manager, Internet2 Nationwide Security.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

Update on OCIs Cybersecurity Activities for CASC September 2011 Kevin Thompson.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
 National association Pamela Walker, Director of Government Affairs National Association of State Chief Information Officers NLC Congressional City Conference:
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services Steve Cotter Director,
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research.
Salsa-DR BOF Internet2 Member Meeting San Antonio Texas Joe St Sauver, Ph.D. or
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
What Data Do We Need and Why Do We Need It? Jim Pepin Chief Technology Officer University of Southern California.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
DUKE UNIVERSITY DNSSEC 101 Kevin Miller.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
 A big “Howdy” from SolarWinds in Austin Texas »Josh Stephens – VP of Technology & Head Geek  Today’s Topic: »Introduction to IPv6  Who is SolarWinds?
Defense Needs for Future Information Assurance Standards John James “Know the enemy, know yourself; your victory will never be endangered.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
HL7 Webinar: Mobile Health Chuck Jaffe Austin Kreisler John Quinn 19 March 2012.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Evolving Threats Paul A. Henry MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE Florida PI License C Forensics & Recovery LLC Florida.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Using NowComment to Meet the Demands of the CCSS updated from: HCESC Tech Conference 2013  English Language Arts  Content Area Literacy Standards.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
INDIANAUNIVERSITYINDIANAUNIVERSITY 23rd APAN Meeting Manila, Philippines January REN-ISAC and Peakflow SP John Hicks Indiana University TransPAC2.
Larry Hornak Co-Director, CITeR, West Virginia University NSF I/UCRC 2003 Annual Meeting Washington, DC, January Research in Emerging Areas: Defense.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
Lambdas and Your Campus BoF: Some Introductory Comments Internet2/ESNet Joint Techs Minneapolis, 12:30, February 13, 2007 Joe St Sauver, Ph.D.
ENISA efforts for securing European Internet Infrastructure
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Cybersecurity : Optimal Approach for PSAPs
Application Architecture Internet Architecture David D. Clark MIT CSAIL September 2005.
Project FENIX by NIX.CZ Tomas Marsalek APRICOT 2015 Fukuoka,
5/18/2006 Department of Technology Services Security Architecture.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
1 REN-ISAC Update Research and Education Networking Information Sharing and Analysis Center Joint Techs Madison WI July 2006.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Advanced research and education networking in the United States: the Internet2 experience Heather Boyles Director, Member and Partner Relations Internet2.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
IS3220 Information Technology Infrastructure Security
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Network Devices and Firewalls Lesson 14. It applies to our class…
Spike DDoS Toolkit A Multiplatform Botnet Threat.
OARsec 17 Feb 2016 OARnet Agenda 17 Feb 2016 Call to Order & Introductions OARnet Updates Security Operations and Response Standards.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Bob Jones EGEE Technical Director
Information Security Program
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
University of California, Santa Barbara
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Technology Convergence
Presentation transcript:

Security BoF: What Are The Community's Open Questions? Joe St Sauver, Ph.D. or Manager, Internet2 Nationwide Security Programs and InCommon Certificate & Multifactor Authentication Programs Techs in Paradise, Tuesday, January 15 th,

A Little About This Session This is meant to be a discussion among colleagues So, to begin, let's go around and briefly introduce ourselves. If there are open security issues you'd like to have us talk about today, please feel free to mention them as part of that Our primary question today: "What are the pressing open problems in the security area for our community, and what should we, the community, be doing about them?" Secondary question: "How can Internet2 help move security forward?" I've outlined a few topics to prime the pump on the next slide, but I suspect that I've just scratched the surface of security issues that are out there

Some Potential I2 Security Topics Moving Forward Network security architectures at 100Gbps (ScienceDMZ, etc.) Instrumenting 100Gbps networks (Netflow, etc.) Circuit-oriented architectures and security implications thereof OpenFlow/SDN security Security for Net+ services InCommon Trust Services (federation, certificates, assurance, multifactor, etc.) Operational security trust communities (such as the REN-ISAC) IPv6 security impacts DDoS mitigation and BCP 38 filtering DNSSEC; DNS security (e.g., query rate limiting, RPZ, passive DNS, etc) BGP security (route monitoring, RPKI, etc.) Community security expectations for Internet2-connected sites Disaster recovery and business continuity Malware/phishing/spam Mobile device security (security for smart phones, tablets, etc.) Academic security research

These Are NOT the DHS "11 Hard Problems" "A Roadmap for Cybersecurity Research," November 2009, 1. Scalable Trustworthy Systems 2. Enterprise-Level Metrics (ELMs) 3. System Evaluation Life Cycle 4. Combatting Insider Threats 5. Combatting Malware and Botnets  exception 6. Global-Scale Identity Management 7. Survivability of Time-Critical Systems 8. Situational Understanding and Attack Attribution 9. Provenance 10.Privacy-Aware Security 11.Usable Security

Related Questions What's the right time horizon for Internet2's security work? Immediate operational issues? 1 year out? 3 years out? 5 years out? What should the role between Internet2 and other entities, such as Educause and the REN-ISAC, look like when it comes to the security work space? How can we help the academic security research community? (c.f., NDSS) What should our engagement with vendors look like? Does the community want more (or different) sorts of engagement with security vendors? What about government agencies? Obviously the NSF has been very supportive of network research, but there are many, many federal agencies that are interested in network security research and operations today. If there are privacy implications, how do we manage those? Should security be a routine track area for Joint Techs or the Member Meetings? How do we make sure that we capture the security insights that the community generates, and leverage them effectively in the future? That is, "How do we leave tracks" and make sure that security-related work can easily be found? What level of formal funding is appropriate?