WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.

Slides:



Advertisements
Similar presentations
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Advertisements

Forensics, Fighter Pilots and the OODA Loop The Role of Digital Forensics in Cyber Command & Control Heather M.B. Dussault, Ph.D. Assistant Professor,
Navy’s Operational Authority for Naval Networks, Information Operations, and FORCEnet 2004 Strike, Land Attack & Air Defense Annual Symposium Vice Admiral.
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
Sensors and location technologies – the front end of ISR
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
The U.S. Coast Guard’s Role in Cybersecurity
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
DHS, National Cyber Security Division Overview
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Protection of Classified Information & Cyber Security
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
SEC835 Database and Web application security Information Security Architecture.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Resources to Support Training Programs for CSIRTs.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Introduction to Disciplined Agile Delivery (DAD) Scott W
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Coast Guard Cyber Command
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Headquarters U.S. Air Force
Proactive Incident Response
Team 1 – Incident Response
Center of Excellence in Cyber Security
DISA Global Operations
California Cybersecurity Integration Center (Cal-CSIC)
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Cyber defense management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
Cybersecurity at PJM Jonathon Monken
Securing the Threats of Tomorrow, Today.
Security Management Platform
Cybersecurity at PJM Jonathon Monken
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Presentation transcript:

WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity

2 The Challenge Cyber Security represents an evolution of security Computer security = 1970’s IT Security = 1980’s IA = 1990’s CyberSec = 2000’s Characterized by advances in information warfare (state sponsored), a focus on intent (criminal activity) and the need for situational awareness. An organization’s Information Technology (IT) supports the mission or business of the enterprise. Information Assurance (IA e.g. confidentiality, integrity, availability) facilitates the IT to carry out this task. Cyber Security advances IA to include all things digital and its data connected through Cyberspace. Security is a function of business. Cyberspace is a the new Battle Space (e.g. air, land, sea, space)

3 Cyber Superiority Cyber operations historically been built around traditional threat analysis, malware identification, monitoring, engineering and response. These mechanisms only allow analysts to perform reactive functions and forensics with some predictive analysis based upon state of the art of network behavior analysis and anomalies detection representing a “post-launch” attack analysis or malware detection capability. The concept of Cyber Superiority reflects the need of a nation to exercise absolute control and authority over the cyberspace within its territory or jurisdiction Dominance in cyberspace requires the need to maintain a strength of readiness to prevent potential adversaries from interference. This facilitates the transformation of current information operations (IO): information warfare (IW) and information assurance (IA) strategies to include political assertions and cyber intelligence to maintain national cyber sovereignty and superiority.

4 Cyber Intelligence (CYINT) The ongoing need for Situational Awareness of internal and external security threats is critical for understanding what is challenging an enterprise so to protect the organization. Being able to have early warning of ‘what’s coming’, ‘to see over the horizon’, so to tweak and tune defenses is desired by CISOs. CyberIntelligence can facilitate Information Warfare, allow for refinement of defenses, shorten sense and respond times, provide data for enhanced metrics, save critical funds and staffing vice “fighting through” and clean-up

5 CYINT As with any battle space (e.g. air, land, sea, space), intelligence is critical to predict, provide forewarning, take proactive offensive measures and defensive countermeasures to deter, detect, delay, defend and defeat threats in order to mitigate risk to friendly forces or the organization. CYINT moves the questions “upstream” of any potential disruptive incident for proper tasking to HUMINT, SIGINT, ELINT, MASINT, and OSINT for collection, closer examination, confirmation and analysis. CYINT must include an “Order of Battle” that can leverage traditional analysis of indicators such as an analysis of signatures of malware design, software development organizations, academics and instruction design where software engineers are trained, exploitation of the knowledge base, biographic analysis, court case analysis, patent filings, technical writings and open source writings to perform threat analysis actions. By understanding the intent of actors, their behaviors, their technical training, logistics and their “delivery” technologies and methods can help enhance situational awareness to become more proactive and predictive.

6 CYINT: So What Do We Know We know the state of the art and what information that provides We know how Hackers attack We know some behaviors of malware We rapidly can know what is the impact of malware But what is missing? Indicators Source; domain, state-sponsored, individual criminal Intent Order of Battle; ISR Construct Configuration of malware When will the next attack occur Where will the next attack occur Who is the target Impact and Outcome Metrics Who is the perpetrator

7 CYINT Improves Capabilities

8 CYINT Answers

9 One Model  Learning from the Anti-Virus Community, we know software/code has signatures  We know that programmers are taught either in academic settings or training centers. In some cases, like protéges, some will adopt the signatures of their mentors  By moving into the upstream into the cloud we can detect the malware, capturing the code/script and conducting forensics to understand its behaviors and signatures  We already have server and IP source information but the intent is to get as specific as we can so to determine if it is State Sponsored or an Individual  Need to develop Indicators list for I&W  Develop and Overlay with an Intell/Surveillance/Recon CONOPS  In the analysis of code, geographic source, signatures etc so to task HUMINT, MASINT, SIGINT etc to potential source targets for IW activities, tweak for defense or attack

10 Idea Conducting cyber warfare needs to be done in real-time, similar to a multi-seat military aircraft or a tank operations; it’s hard to determine who the operator is when all the parts make up the whole during the mission. This requires that requires collaboration that often blurs the lines between CYINT analyst and operator skills; however, organizational charters will delineate roles in support of the mission. Collaboration will require real-time connections and shared common operational views Threats are envisioned to be categorized (e.g. nation/state, non-state, military, hackers, etc.). Analysts will seek to determine, in advance, who will attack, why, when, where, and how using a range of skills focused on specific threats. These skills are broken into basic threat assessment (who, why, when, where) and technical assessment (how) orchestrated around effective intelligence cycles applied against standard ISR sources. The technical assessments sources come from monitoring cyber activity directly on the network as well as through SIGINT, ELINT and MASINT.

11 Strategies Action Plans Vision Goals Objectives Provide for Ehanced Situational Awareness, Assure our infrastructures, systems, and data are secure from exploitation, theft and disaster Mission Protect Information: Human Capital Defend Enterprise Systems Enhance Situational Awareness/ Sense Develop Cyber Intelligence: Collection and Analysis Enhance Response Protect and Defend Networks Cyber Security Strategic Framework Creating a Roadmap EXAMPLE

12 Specific Steps  Create Cyber Security Policy and Program  Develop Objectives and Strategies in each Swimlane  Coordinate with LE, Mil, Industry to develop Indicators  Overlay ISR constructs  Stand up Analytical Cell; Seek collaborative agreements from monitoring sources, industry and governments  Configure Distribution of Intelligence  Integrate and Enhance Situational Awareness Capabilities to look upstream and over the horizon

Questions Henry Horton, CISM Public Service-NA Security and Cyber Security Initiative Alastair MacWillson Global Managing Director, Security Tel:

14 Information Assurance Program Current IT Program Information Assurance Program Recommendations Where You Want To Be! Where You Are! How To Get There!

15 One Model