Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

1 Open PepsiCo 2009 Ian Noble R&D Director Foods Innovation.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Primary Benefit Types Value Discipline Benefits – Operating Excellence Reduce Cost Reduce Risk – Product Leadership Increase Revenue – Customer Intimacy.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Bill Newhouse Two Government Cybersecurity Initiatives NIST.
Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes.
Next Steps toward More Trustworthy Interfaces Burt Kaliski, RSA Laboratories 1 st Workshop on Trustworthy Interfaces for Passwords and Personal Information.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
Presented to ISMORS September 2009 Dr. David S. Alberts Director, Research OASD/NII – DoD CIO Redefining the “M” in MOR st Century OR Challenges.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
May l Washington, DC l Omni Shoreham SaaS Market Opportunities Jerry Champlin Chief Executive Officer Absolute Performance Inc. Enabling Today’s.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Patricia A. Muoio Chief National Information Assurance Research Lab.
Secure and Trustworthy Cyberspace (SaTC) Program Presentation to NSF/DIMACS Workshop for Aspiring PIs in SaTC SaTC Program Directors National Science Foundation.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Improving Implementation Research Methods for Behavioral and Social Science Working Meeting Measuring Enactment of Innovations and the Factors that Affect.
Terri Lewis Darlene Groomes Lou Adams Tom Jones Managing the Transition from WIA: Framing the “O” in WIOA 8 th Summit Conference San Diego, California.
Secure Societies 2014 Working programme University of ULSTER (UU), United Kingdom University of ULSTER (UU), United Kingdom Prof. Hui Wang, Dr. Jun Liu,
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
Fostering a ‘Whole Community’ Approach to Emergency Management David J. Kaufman Director, Office of Policy and Program Analysis 8 June 2011.
Wireless Networks Breakout Session Summary September 21, 2012.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Global City Teams Challenge September 29-30, 2014 Report Out: Project X.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Improving Integration of Learning and Management Systems Paul Shoesmith Director of Technical Strategy Becta.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Kate Sutcliffe, NAEDF Online Presentation to Savannah Symposium 2009.
Community-Driven Development: An Overview of Practice Community Development Strategies – how to prioritize, sequence and implement programs CommDev Workshop.
Applications in Acquisition Decision-Making Process.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
Crisis “Management”: A Way Forward David S. Alberts presented to Crisis Management 3.0: Social Media and Governance in Times of Transition.
The Future of Veterinary Services. VS is evolving to meet the needs of 21 st century animal health.
Enterprise Cybersecurity Strategy
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Student Technology Services June Student Technology Services Team Dedicated to creating a holistic strategy to improve the technological services.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
ADNI for Acquisition, Technology, and Facilities INTELLIGENCE INTEGRATION Defense Daily’s Open Architecture Conference September 21, 2010
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies NIST Industry Day February 10, 2016.
Scrum BUT Research Adapting Agile principles in a research environment Gary Morgan Chief Science and Technology Office March 16, 2009 PNNL-SA
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
A policy framework for an open and trusted Internet
“Existing world order is being redefined.” Henry Kissinger Jan 2015
DISA Global Operations
ASSET - Automotive Software cyber SEcuriTy
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
ATD session 2: compliancy versus mission assurance
Microsoft Services Cloud Productivity Solutions
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
An Urgent National Imperative
Cybersecurity ATD technical
Women in Cyber and Satellites Discuss Realities & Practicalities
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Presentation transcript:

Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks

Mission Spectrum Hard Targets through Nation Building & Stabilization

Democratization of Technology diydrones.com lava-amp.com local-motors.com

IT Mission Impacts

Scope Cybersecurity: measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Information Assurance: the practice of managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.

Federal Cybersecurity Research Agenda Tailored Trustworthy Spaces: supporting context-specific trust decisions Moving Target: providing resilience through agility Cyber Economics: providing incentives to good security

Tailored Trustworthy Space Flexible, distributed trust environment –Akin to physical world, where expectations and behaviors are based on context User Empowerment via Edge Innovation –Home, School, Library, Bank, Theatre, Church Enabling Informed Trust Decisions –Context-Specific Trust Services –Coherent Policy Implementation –Visible Rules & Attributes Challenges –Identifying Dimensions of a Tailored, Trustworthy Space –Policy Specification & Management –Validation of Platform Integrity –Violation Detection –Verifiable Separation of Spaces

Moving Target Controlled Change across Multiple System Dimensions –Increase uncertainty and apparent complexity for attackers, reduce their windows of opportunity, increase their costs in time and effort –Increase resiliency and fault tolerance within a system Assumptions –All systems are compromised & perfect security is unattainable –Defensible systems, rather than perfectly secure –An adversarial science Challenges –Managing Moving Target Systems –Smart Movement –Developing the Ecosystem to Support Agility

Cyber Economic Incentives Impacts and Incentives –Motivators: Common good, Ease of Use (NOT Insurance) –Data-driven –Support for “personal data ownership” Enablers –Science-based Understanding of Market, Decision-Making and Investment Motivation –Creation of Environments where Deployment of Security Technology is Balanced Challenges –Legal and Ethical Collection, Protection Distribution –Lack of Data to Support Economic Analysis –Personal Information and Behavior –Empower of Critical Infrastructure Providers

Opportunities CLARITY –Clearly scope problem and potential solution –Don’t oversell!! REAL, COLLECTIVE INNOVATION –Traditional & Non-Traditional Partnering –Traditional & Non-Traditional Sourcing –Factor in “soft” as well as hard sciences COMMENT –FORUM: –

The Tech Community Must: Demonstrably Focus on Mission Outcomes Solve Problems Collaboratively Innovate Relentlessly Catalyze delivery of innovative technology-based capabilities solving intelligence challenges.