2 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Chatham House Rule “Participants are free.

Slides:



Advertisements
Similar presentations
Department of Homeland Security Site Assistance Visit (SAV)
Advertisements

The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
David A. Brown Chief Information Security Officer State of Ohio
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
Summary of “Challenges in International Cyber Security” NDU Conference Report Charles Barry Center for Technology and National Security Policy The National.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
South Carolina Cyber.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
CYBER AS A NEW WAR DOMAIN Cengiz ÖZTEKE Colonel Commander, TAF Cyber Defence Command.
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
Network Security of The United States of America By: Jeffery T. Pelletier.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Space Systems as Critical Infrastructure Iulia-Elena Jivanescu 1st Space Retreat, Tenerife, Spain, 8-22 January, 2013.
Update: Physical Guideline UPDATE: Physical Security Guideline UPDATED Physical Response Security Guideline Public Release.
U.S. D EPARTMENT OF E NERGY Office of Electricity Delivery & Energy Reliability May 18, 2015 Stewart Cedres SYMPOSIUM IN HOMELAND SECURITY AND DEFENSE.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
“Technology based economic development through open innovation” © 2014.
Foreign Policy and National Defense Chapter 17. NATIONAL SECURITY Section 2.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Phoenix Convention Center Phoenix, Arizona When Prevention and Preparation May Not be Enough: Resilience and Recovery for the Electricity Sub-Sector Operational.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Settling the Frontier: The Convergence and Impact of Privacy and Security Practices Chris Israel Deputy Assistant Secretary for Technology Policy U.S.
The Fox School of Business and Management Temple University Charles E. Wilhelm October 3, 2003.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
 Mulroney government began negotiations with the United States in September  Deal was finally reached in October 1987.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Hurdles in implementation of cyber security in India.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
BAE Systems Small Business Program
Welcome Participants! to the DPRK Energy Expert Study Group Meeting Four Seasons Hotel East Palo Alto, California, USA June 26 – June 27, 2006.
WLE Decides 2014! The Debate. WLE Decides 2014 The resolution debated: Ecosystem based approaches are the only way to feed the growing population and.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
OAS Secretariat for Multidimensional Security CICTE Secretariat Disasters and Critical Infrastructure Protection.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
Chapter 17: Foreign Policy and National Defense Section 2.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
The Current State of Cyber Security and How to Defend Your Data.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Paul A. Strassmann New Canaan Mens Club – January 9, 2015.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Food Supply Resilience 27 October 2015 Dugald Strathearn
Agenda Control systems defined
Bell Ringer Get with your groups and make any final changes to your political cartoon, paragraph explanation, and prepare for your presentation! You will.
Extending The Information Society To All
America’s First National Critical Infrastructure Exercise
Copyright © 2012, Elsevier Inc. All rights Reserved.
The U.S. Department of Homeland Security
UPDATE: Physical Security Guideline
Chapter 17: Foreign Policy and National Defense Section 2
ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U
Presentation transcript:

2 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Chatham House Rule “Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.” All dialogue is UNCLASSIFIED

3 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Dealing With Today’s Asymmetric Threat  Symposia series began in 2008  Dialogue on issues critical to national security  Pro bono, educational, and non-political public service events

4 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Symposia Series

5 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Transcending Battlefields Silicon Shadows Iron

6 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 What If…  No phone service?  No news?  No water?  No transportation?  No basics? August 2003 Northeast Blackout

7 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 A Nation Disrupted August 2003  55 million people  8 NE states and Canada  100 power plants  $7-10 billion in losses 2013  40% of DHS hacking cases in energy sector  Industrial control systems of energy firms attacked

8 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 The Spectrum of Reliance and Vulnerability

9 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 A Global Challenge

10 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 A National Imperative

11 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Panels The All-Hazards Approach to Preparedness Electromagnetic Spectrum Dominance Keynotes Maj Gen Jeff Newell, USAF Director of Strategy, Policy and Plans (J5), North American Aerospace Defense Command and U.S. Northern Command Hon. Suzanne Spaulding Under Secretary, National Protection and Programs Directorate (NPPD), Department of Homeland Security