Open Security Technology Washington, DC February 11, 2011 Dept. of Homeland Security Science & Technology Directorate Luke Berndt Program Manager.

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

GSA Office of Intergovernmental Solutions The U.S. Approach to Electronic Government: A Path to Improved Service Delivery and Increased Citizen Participation.
Matthias Heinicke© Siemens PLM Software All Rights Reserved. Tecnomatix Plant Simulation free Student download 
Canada-EU Future Internet Workshop Waterloo, Canada March 24th, 2011 Ignacio M. Llorente DSA-Research.org Distributed Systems Architecture Research Group.
The U.S. Coast Guard’s Role in Cybersecurity
10/29/20091 Innovation Partnerhsip Models with the Finance Sector Dept. of Homeland Security Science & Technology Directorate Douglas Maughan, Ph.D. Branch.
The 2009 Cloud Consensus Report July 28, 2009 Bringing the Cloud Down to Earth Sponsored by the Merlin Federal Cloud Initiative.
Making Condor Safer with… A Collaborative Marketplace for Continuous Software Assurance Brooklin Gore, Chief Operations Officer
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
11.1 Lecture 11 CASE tools IMS Systems Design and Implementation.
Building a Cluster Support Service Implementation of the SCS Program UC Computing Services Conference Gary Jung SCS Project Manager
Columbia University Dept of Computer Science Center for Research on Info Access University of So. Calif Information Sciences Institute (ISI)
The Acquisition Gateway
SBIR STTR Small Business Innovation Research & Small Business Technology Transfer at the National Science Foundation.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Plan Introduction What is Cloud Computing?
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Research Data Management Philip Tarrant Global Institute of Sustainability.
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
WAO 2007 Andrej Košiček Dealing with the Obsolescence in state-of- the-art Electronic Components 27 September 2007.
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
OSAF Board of Directors Meeting Open Source Applications Foundation September 19, 2002.
OpenDaylight project introduction An open source project under the Linux Foundation with the goal of furthering the adoption and innovation of Software.
Open Source and IP Telephony: Myth Busters, Best Practices and Real Life Application in the Contact Center Kelly Duerr, Senior Product Manager Tom Chamberlain,
GENIUS kick-off - November 2013 GENIUS kick-off meeting WP400 – Tools for data exploitation X. Luri.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Collaborating with iPlant.
A complementary view from the DIGOIDUNA study Paolo Bouquet, University of Trento, Italy SMART 2010/0054.
Panel Three - Small Businesses: Sustaining and Growing a Market Presence Open Interfaces and Market Penetration Protecting Intellectual Innovation and.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Sharing Research Data Globally Alan Blatecky National Science Foundation Board on Research Data and Information.
By: Jarek King ISM 158. What’s Cloud Computing?? Cloud computing is Internet- based computing, whereby shared resources, software and information are.
The Architecture Lecture September 2006 Cem Kaner CSE 1001.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Collaborating with iPlant.
Why Use MONAHRQ for Health Care Reporting? March 2015 Note: This is one of eight slide sets outlining MONAHRQ and its value, available at
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Rapid Technology Application Program Mr. Maurice Swinton RTAP Program Manager Engaging the Private Sector:
CTOlabs.com Government Big Data Success Stories Bob Gourley Jan 2012.
Innovation: The Key to the Future of Security  Douglas Maughan, Division Director, DHS S&T  Moderator: Illena Armstrong.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
PerfSONAR-PS Functionality February 11 th 2010, APAN 29 – perfSONAR Workshop Jeff Boote, Assistant Director R&D.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
NSF Cybersecurity Funding Opportunities Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure September 2015.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
0 National Geospatial Platform Jerry Johnston Department of the Interior January 6, 2016.
Michelle Malcher PepsiCo Session # For the DBA Manager – Understanding Oracle and DBAs.
Small Business Innovation Research Program (SBIR) Presented by Sharina Broughton.
1 SBIR/STTR Overview Wang Yongqiang. 2 Federal SBIR/STTR Program ‣ A +$2Billion funding program set-aside for small businesses seeking to early stage.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
WHAT IS THE NSF SBIR/STTR PROGRAM? Who We Are What We Do Grants That Go Beyond Funding Photo Credit: Graphene Frontiers, LLC Contact Us:
INFSO-RI JRA2 Test Management Tools Eva Takacs (4D SOFT) ETICS 2 Final Review Brussels - 11 May 2010.
GSA IT Strategic Plan 2009 – 2011 August 2007 US General Services Administration 1.
SCI-BUS is supported by the FP7 Capacities Programme under contract no. RI Introduction to Science Gateway Sustainability Dr. Wibke Sudholt CloudBroker.
Hospitality FM & Engineers Community of Practice.
Bob Jones EGEE Technical Director
Hyperconvergence in Space Ground Systems Architectures
Avenues International Inc.
Federal Outlook for Security Products and Services
Space Data Services Session 2: Space Data Country Outreach and Delivery Agenda Item #3 Brian Killough CEOS Systems Engineering Office (SEO) February 25,
Gregory Morton COSC380 February 16, 2011
SISAI STATISTICAL INFORMATION SYSTEMS ARCHITECTURE AND INTEGRATION
Quoting and Billing: Commercialization of Big Data Analytics
Supports launch of cloud-based endpoint management service
Presentation transcript:

Open Security Technology Washington, DC February 11, 2011 Dept. of Homeland Security Science & Technology Directorate Luke Berndt Program Manager Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA)

US Govt Spends $38 Billion on IT Annually Trend is Not Sustainable Bureaucracy (easy to blame) Complexity of Govt Enterprise Systems Redundancy – Re-Invent the Wheel Existing System of Acquisition, Management, Updating, Technical Obsolescence Significant Hurdle Cybersecurity = Protection of Infrastructure and Data 2 Need: Sustainable Government IT Systems 11 February 2011

Homeland Open Security Technology (HOST) Focus: Gov contribution to and adoption of Open Source solutions that support cyber security Make it easier for government (local, state, & federal) to take advantage of innovation in the OS space Encourage the contribution of Gov funded research to OS community by improving processes Investigate what OS is being used in Gov, acq best processes, & where gaps exist (user groups & census) Seed development of OS solutions to fill key gaps Phase 2 - $10m over 5 years 11 February 20113

HOST: Initial work OS Intrusion Detection DHS seeded development Create common, OS engine for R&D, and commercial products Maintained by non-profit Supported by companies 11 February OpenSSL libraries widely used in OS software Feds need Crypto, FIPS validated for acquisitions Each version needs to be re- validated DHS contributed to maintaining the FIPS validation

16 December Give open source community access to entire toolset  Open-source developers register their project. Coverity automatically downloads and runs tool over it.  Developers get back bugs in coverity’s bug database Big success:  Roughly 500 projects registered  4,700+ defects actually patched.  Some really crucial bugs found; dozens of security patches (e.g., X, ethereal) Coverity: scan.coverity.com

Software Assurance MarketPlace (SWAMP) BAA Topic 14: Focuses on the research infrastructure necessary to enable software quality assurance and related activities A software assurance facility and the associated research infrastructure services that will be made available to both software analysis researchers and software developers, both open source and proprietary DHS expects the SWAMP to become a national level R&D resource in software assurance for open security technologies, used across civilian agencies and their communities as both a research platform and core component supporting US Government supported software development activities 11 February 20116

SWAMP Conceptual Architecture 11 February Software Assurance MarketPlace (SWAMP) Software Analysis Tools – Open Source and potentially commercial Open Source Software (for starters) and potentially all government funded software Other Resources (e.g., High Performance Computing Clusters)