CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
UNCLASSIFIED December 2010 Is N.I.C.E.. UNCLASSIFIED THE PRESENT Comprehensive National Cybersecurity Initiative Initiative #8, Expand Cyber Education.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
National Infrastructure Protection Plan
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
DHS, National Cyber Security Division Overview
South Carolina Cyber.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Overview FAA IT & ISS R&D: Security Today Security Tomorrow Marshall Potter Chief Scientist for Information Technology Federal Aviation Administration.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Session 121 National Incident Management Systems Session 12 Slide Deck.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Cracking down on international cyberterrorism
HSGP Funding for Security Efforts Presented by Michele Robinson.
A First Course in Information Security
Franca R. Jones Senior Policy Analyst Chemical and Biological Countermeasures National Security and International Affairs Remarks for the Interagency Board.
Part of a Broader Strategy
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
The Integrated Pilot Comprehensive Exercise (IPCE) Briefing to the U.S. Nuclear Regulatory Commission’s 21st Annual Regulatory Information Conference Marc.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Agency Security Update Service (ASUS) Mike Bolger KSC CIO.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Cybersecurity : Optimal Approach for PSAPs
Understanding the Threats of and Defenses Against Cyber Warfare.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Interagency Modeling & Atmospheric Assessment Center Presented to 8 th Annual George Mason University Conference On Transport & Dispersion Modeling July.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Cyber Risks: Protecting confidential data against unauthorized access Vik Bansal Deloitte & Touche LLP John Reidhead State of Utah March 17, 2016.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Surveillance and Security Systems Cyber Security Integration.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Federal Information Security Spending Outlook
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
AVI AFRIQUE October 2018 Tshepo Peege
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
Role of US Security and Intelligence Agencies
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications

Cyber Attacks Up 300% Since 2005 Threats diverse and expanding Foreign government sanctioned and/or financed Politically/militarily/economically motivated Domestic and International Organizations as well as individual actors Shift from “nuisance” attacks to intent to damage Goal: disruption, destruction and theft Must also consider “collateral damage” – Information disruption caused by some unrelated physical disruption Incidents Reported to US-CERT 2 Source: GAO Attacks continue to rise Up 200% since 2006 (& over 300% since 05) Increasing in complexity and coordination Attacks continue to rise Up 200% since 2006 (& over 300% since 05) Increasing in complexity and coordination

Cyber Threats Causing Market Changes Comprehensive National Cyber Initiative (CNCI) has 12 Key Elements that will be the Focus for Protecting the Nation’s Critical Infrastructures.

Cyber Threats Causing Market Changes Comprehensive National Cyber Initiative (CNCI) Established by President Bush in 1/2008 Goal of improving efforts to protect against intrusion attempts and anticipate future threats across federal computer networks Estimated budget of $40b over several years OMB’s Information Systems Security Line of Business (ISS LoB) Established as part of President Bush’s eGov Initiative Goal of improving the level of information systems security across the federal government, and to gain cost efficiencies by sharing functions and processes for managing information security GSA’s SmartBUY GSA’s program for improving, streamlining and automating IT systems for lender processing systems Department of Homeland Security Initiatives National Cyber Security Center (NCSC) U.S. Computer Emergency Readiness Team (US-CERT) EINSTEIN Trusted Internet Connections (TIC) Cyber Storm Cyber Security R&D Center OMB’s FDCC Federal Desktop Core Configuration (FDCC) Established by OMB in 2007 Collaboration with DHS NSC Division/US-CERT and NIST GSA’s MTIPS Established March 2009 Allows agencies to obtain TIC- compliant Internet services through Networx Civilian Initiatives Span Several Agencies

5 IPv6 Tools & Processes to Address Cyber Security Implications Intrusion Detection Sensor (IDS) to Intrusion Prevention Sensor (IPS) Technologies to “Predict” the Threat Cyber Information Correlation, Analysis, and Course of Action Response Standardized Cyber Simulation, Training, and Exercise System System More Robust Insider Threat Tools Cyber Workforce Modernization and Expansion Key Cyber Activities to Benefit Industry