Download presentation
Presentation is loading. Please wait.
Published byBenjamin Richards Modified over 9 years ago
1
Why I follow this passion…and Your Role in National Security Theresa Payton, Chief Advisor and CEO, Fortalice LLC TP@FortaliceSolutions.comTP@FortaliceSolutions.comTwitter: @FortaliceLLC TP@FortaliceSolutions.com Facebook: Fortalice LLC Blog: http://fortalicesolutions.blogspot.com/ TV: WBTV.com “On Your Side”, “Protecting Your Cyberturf” Why You Should Be A Cyber Warrior
2
We will preserve for our children this, the last best hope of man on earth, or we will sentence them to take the first into a thousand years of darkness. We will preserve for our children this, the last best hope of man on earth, or we will sentence them to take the first step into a thousand years of darkness. President Ronald Reagan You and I have a rendezvous with destiny. If we fail, at least let our children and our children’s children say of us we justified our brief moment here. We did all that could be done.
3
Three Questions: Feel Free to Twitter Questions via DM @FortaliceLLC using #WhyCare before your question 1. What do you want to hear about today that would make this time high value add for you? 2. Burning issues or questions? 3. What scares you the most in cyberspace?
4
“Sorry, Mr. President. Please surrender your BlackBerry” What? What? Why? Why? Finding common ground Finding common ground
5
The Global View
6
15% of Global GDP E-Commerce
7
These Are Desperate Times Globally This will be the worst global recession in decades as the fallout of the most severe financial crisis since the Great Depression took a toll first on the U.S. and then--via a variety of channels--on the rest of the global economy. -- Nouriel Roubini, January 2009
8
Highlights from the Global Picture Global recession. Anti-state demonstrations in Europe and the former Soviet Union. Global recession. Anti-state demonstrations in Europe and the former Soviet Union. Iran’s pursuit of satellite, missile, and nuclear program. Iran’s pursuit of satellite, missile, and nuclear program. China’s counterspace, nuclear, cyber, and military program. China’s counterspace, nuclear, cyber, and military program. North Korea’s people continue to face food and energy shortages. North Korea’s people continue to face food and energy shortages. Moscow actively engages in military ventures with China and Venezuela. Moscow actively engages in military ventures with China and Venezuela. Oil imports in the US were 24% in 1970 and roughly 70% now. Could total $700B leaving the US economy – 4X the cost of the Iraq war. Oil imports in the US were 24% in 1970 and roughly 70% now. Could total $700B leaving the US economy – 4X the cost of the Iraq war. Sources: Fox News, Reuters, Wall Street Journal, T. Boone Pickens, and testimony from Dennis C. Blair, Director of National Intelligence
9
Highlights from the Global Threat Picture Russia and China have the technical ability to target and collect information or disrupt the US information infrastructure Russia and China have the technical ability to target and collect information or disrupt the US information infrastructure Nation states and criminals target private sector for commercial advantage Nation states and criminals target private sector for commercial advantage Terrorist groups desire to use cyber warfare to target the US Terrorist groups desire to use cyber warfare to target the US Cyber crime has gone commercial in a mature online servicing economy Cyber crime has gone commercial in a mature online servicing economy Source: Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, Dennis C. Blair, Director of National Intelligence. Provided 12 February 2009
10
The World’s Economic and Financial Order The IMF and World Bank are described on the IMF's website as the "twin intergovernmental pillars supporting the structure of the world's economic and financial order." The IMF and World Bank are described on the IMF's website as the "twin intergovernmental pillars supporting the structure of the world's economic and financial order."
11
World’s Money Supply At Risk "Electronic safety in the financial sector is in dire jeopardy,” "Electronic safety in the financial sector is in dire jeopardy,” Tom Kellermann, a former senior computer security official at the World Bank Treasury Unit.
12
World’s Money Supply At Risk September 2008 “The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year” “The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year” November 2008 “Another major international financial institution has had its computer system attacked by unknown cyber-hackers” “Another major international financial institution has had its computer system attacked by unknown cyber-hackers” Source: Fox News
13
Annual Threat Assessment A successful cyber attack against a major financial service provider could severely impact the national economy, while cyber attacks against physical infrastructure computer systems such as those that control power grids or oil refineries have the potential to disrupt services for hours to weeks. Annual Threat Assessment of the Intelligence Community, Director of National Intelligence, Dennis C. Blair, February 2009, Statement for the Record.
14
Reality
15
Smorgasboard of Hits “Largest ever” – Heartland Payment Systems “Largest ever” – Heartland Payment Systems Foreign spies in the U.S. power grid Foreign spies in the U.S. power grid DoD Bans USB after Trojan on thumb drive DoD Bans USB after Trojan on thumb drive 24,.7% rise in security incidents and educational institutions 24,.7% rise in security incidents and educational institutions Conficker…not just annoying, hits medical machinery Conficker…not just annoying, hits medical machinery Worms hit Twitter, Facebook, LinkedIn, MySpace Worms hit Twitter, Facebook, LinkedIn, MySpace “Chinese attackers” steal jet fighter secrets “Chinese attackers” steal jet fighter secrets Zeus Zeus DNS attacks…and more DNS attacks…and more
16
Some Strategies
17
The spending is estimated to span $15-30 billion over the next five years.
18
Focus on Defense Is Critical Distractions Impact Planning & Execution Distractions Impact Planning & Execution Global Economic Crisis Global Economic Crisis Industry failures and bailouts Industry failures and bailouts New President / Upcoming elections New President / Upcoming elections Shortage of Key Technology Resources to Protect and Defend Shortage of Key Technology Resources to Protect and Defend Significant layoffs in several industries Significant layoffs in several industries
19
Daily Reality – Executive Engagement No organization is safe. There is no fool-proof solution. No organization is safe. There is no fool-proof solution. “People are going to get in. We need to start designing a different strategy that accepts the network is permeable and designs around instead what’s on the network. The network isn’t valuable, it’s the data on the network, that at rest and being used.” —Richard Clarke, Chairman of Good Harbor Consulting and Former Chief counter-terrorism adviser on the U.S. National Security Council “People are going to get in. We need to start designing a different strategy that accepts the network is permeable and designs around instead what’s on the network. The network isn’t valuable, it’s the data on the network, that at rest and being used.” —Richard Clarke, Chairman of Good Harbor Consulting and Former Chief counter-terrorism adviser on the U.S. National Security Council
20
Black Swan Your mission: Convincing others to prepare to invest in an event that will “never” happen Your mission: Convincing others to prepare to invest in an event that will “never” happen “Zero Risk” does not exist – Make sure “Managed Risk” does “Zero Risk” does not exist – Make sure “Managed Risk” does
21
Daily Reality – Executive Engagement "If someone has the ability to enter information in systems, they can destroy data. And the destroyed data could be something like money supply, electric-power distribution, transportation sequencing, and that sort of thing…The federal government is not well-protected and the private sector is not well-protected." "If someone has the ability to enter information in systems, they can destroy data. And the destroyed data could be something like money supply, electric-power distribution, transportation sequencing, and that sort of thing…The federal government is not well-protected and the private sector is not well-protected." Michael McConnel, Former National Intelligence Director, February 27, 2008, Testimony before the U.S. Senate Armed Services Committee Michael McConnel, Former National Intelligence Director, February 27, 2008, Testimony before the U.S. Senate Armed Services Committee
22
Lessons Learned Executive Engagement, Awareness, and Innovation Examples
23
Lessons Learned Executive Engagement, Awareness, Innovation Share your nightmares Share your nightmares Think outside the norms Think outside the norms Segregate the people you can least afford to – innovate, innovate, innovate Segregate the people you can least afford to – innovate, innovate, innovate Business case Business case Pay attention to line of sight and creating safety nets Pay attention to line of sight and creating safety nets Your organization does not need to be experts, just aware enough to call you Your organization does not need to be experts, just aware enough to call you
24
“Do or do not. There is no try.”
25
We are nevertheless in a strong position to shape a world reflecting universal aspirations and values that have motivated Americans since 1776: human rights; the rule of law; liberal market economics and social justice. Whether we can succeed will depend on actions we take here at home…It will also depend on our actions abroad…in developing new multilateral systems… effective international cooperation in trade and finance, in neutralizing extremist groups using terrorism, in controlling the proliferation of WMD, developing codes of conduct for cyberspace and space, and in mitigating and slowing global climate change. Source: Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, Dennis C. Blair, Director of National Intelligence. Provided 12 February 2009
26
Q&A Theresa M. Payton, Former CIO at the Theresa M. Payton, Former CIO at the Executive Office of the President, White House Executive Office of the President, White House Theresa Payton, Chief Advisor and CEO, Fortalice LLC TP@FortaliceSolutions.comTP@FortaliceSolutions.comTwitter: @FortaliceLLC TP@FortaliceSolutions.com Facebook: Fortalice LLC Blog: http://fortalicesolutions.blogspot.com/ TV: WBTV.com “On Your Side”, “Protecting Your Cyberturf”
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.