FCC Broadband Workshop on Cyber Security Don Welch President and CEO Merit Network, Inc.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Being Proactive and Less Reactive in Security Operations and Cyber Attack Response Christina Raftery, MCSE, CISSP FBI Los Angeles Field Office.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED.
E y e s o f t h e E a g l e Air Force Office of Special Investigations Current Investigative Trends SA James P. Stoddard 30 March 10 National Contract.
The French approach to CIIP ENISA workshop. Coordination of CIP in France ANSSI 2 A cross-ministerial issue The General Secretariat for Defense and National.
Emergency Communications Interface between Technology, Policy, and Business Paul Kolodzy 15 November 2012.
Cyber and Maritime Infrastructure
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Internet as a Military-Free Zone: The Kaspersky Vision Eugene Kaspersky Chairman & CEO, Kaspersky Lab.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
Integrated Information Technology (IT) & Information Assurance (IA)
SWOT Turn it Around Craig Williams, CPIM APICS Tampa Bay.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
LEVADA-CENTERLEVADA-CENTER “From opinions to understanding” LEVADA-CENTERLEVADA-CENTER.
John Prisco President and CEO Triumfant, Inc. Our defenses are designed to defeat threats we have seen before. We have very little protection against.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
IA&S July 17, Fault Tolerant Networks (FTN) Research Program Joint Information Assurance & Survivability (IA&S) Principal Investigator Meeting Honolulu,
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
© 2011 Institute for the Future. All rights reserved. | SR-1414 Technology Horizons Program Institute for the Future May 26, 2011 Forecasting the Smart.
16 October 2007 Focus and Convergence Challenges for Complexity Science List of Candidate Topics Focus and Convergence Challenges for Complexity Sciences.
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Securing the Network.
KTH Communication Systems Design 2002.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
OPSEC and Geospatial Information. Five step process Our operations from an adversary point of view Compilation Indicators Operations Security.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Detecting Attacks on Internet Infrastructure and Monitoring of Service Restoration in Real Time Andy Ogielski FCC Workshop on Cyber Security 30 September.
The Smart Grid Business Case: Creating a Secure & Reliable Energy Resource Steve Oldham Chair, USTelecom President & CEO, SureWest Communications.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Understanding the Threats of and Defenses Against Cyber Warfare.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Hygiene The Big Picture © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Copyright © 2015 Scott Borg/U.S. Cyber Consequences Unit. All rights reserved. Making Economics a Cyber-Security Weapon Scott Borg Director (CEO) and Chief.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Iraq: What’s it all about, Alfie? -- If they ever fully understood it, too many Americans, including some members of the military, have become confused.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
Threats to Information Systems Don Faatz 5 October 1999.
Liberty International Underwriters
Cyber Security: State of the Nation
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Security Themes Debunked
COSC 316: Host Computer Security
United States Coast Guard
Strategy: If you don’t know where you’re going, you’ll never get there
Experience with Implementing IT and Information Security Solutions
What IS ?.
Academic Alliance Initiative
I CAN DECIDE…IT’S UP TO ME
Cyber security through the user eyes. Good practices.
Dr. Matthew Canham Dr. Clay Posey Institute for Simulation & UCF
Presentation transcript:

FCC Broadband Workshop on Cyber Security Don Welch President and CEO Merit Network, Inc.

First l Understand the threat l Not techniques, but intentions and capabilities l Our adversaries are people l They are smart l They learn and adapt l They can focus more time, energy and resources when and where they choose

The Threat l State Agencies l Espionage – diplomatic, military, commercial l Destruction – government, military, critical infrastructure l Criminals l Money l Terrorists l Espionage l Destruction/Publicity l Pseudo State Agencies l Harassment l Hobbyists l Notoriety l Petty cash

Trade-offs l ROI is “negative” on security investments l Return is things that didn’t happen l It is hard to build support for loss of usefulness l We can’t stop everything Security UsefulnessCost

Defense In Depth l Technology l Security products l Non-security products l Policy l People l Our adversaries are people l Physical l A backhoe can be more effective than a “sploit” l Virtual l Broadband is used by the attackers and the defenders

Conclusion l Don’t mandate how l Too hard/Doesn’t work in practice l Mandate results l Not easy, but leverages our strengths