Presentation is loading. Please wait.

Presentation is loading. Please wait.

Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks

Similar presentations


Presentation on theme: "Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks"— Presentation transcript:

1 Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks dawn.c.meyerriecks@ugov.gov

2 Mission Spectrum Hard Targets through Nation Building & Stabilization

3 Democratization of Technology diydrones.com lava-amp.com local-motors.com

4 IT Mission Impacts

5 Scope Cybersecurity: measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Information Assurance: the practice of managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.

6 Federal Cybersecurity Research Agenda Tailored Trustworthy Spaces: supporting context-specific trust decisions Moving Target: providing resilience through agility Cyber Economics: providing incentives to good security

7 Tailored Trustworthy Space Flexible, distributed trust environment –Akin to physical world, where expectations and behaviors are based on context User Empowerment via Edge Innovation –Home, School, Library, Bank, Theatre, Church Enabling Informed Trust Decisions –Context-Specific Trust Services –Coherent Policy Implementation –Visible Rules & Attributes Challenges –Identifying Dimensions of a Tailored, Trustworthy Space –Policy Specification & Management –Validation of Platform Integrity –Violation Detection –Verifiable Separation of Spaces

8 Moving Target Controlled Change across Multiple System Dimensions –Increase uncertainty and apparent complexity for attackers, reduce their windows of opportunity, increase their costs in time and effort –Increase resiliency and fault tolerance within a system Assumptions –All systems are compromised & perfect security is unattainable –Defensible systems, rather than perfectly secure –An adversarial science Challenges –Managing Moving Target Systems –Smart Movement –Developing the Ecosystem to Support Agility

9 Cyber Economic Incentives Impacts and Incentives –Motivators: Common good, Ease of Use (NOT Insurance) –Data-driven –Support for “personal data ownership” Enablers –Science-based Understanding of Market, Decision-Making and Investment Motivation –Creation of Environments where Deployment of Security Technology is Balanced Challenges –Legal and Ethical Collection, Protection Distribution –Lack of Data to Support Economic Analysis –Personal Information and Behavior –Empower of Critical Infrastructure Providers

10 Opportunities CLARITY –Clearly scope problem and potential solution –Don’t oversell!! REAL, COLLECTIVE INNOVATION –Traditional & Non-Traditional Partnering –Traditional & Non-Traditional Sourcing –Factor in “soft” as well as hard sciences COMMENT –FORUM: http://cybersecurity.nitrd.govhttp://cybersecurity.nitrd.gov –eMail: cybersecurity@nitrd.gov

11 The Tech Community Must: Demonstrably Focus on Mission Outcomes Solve Problems Collaboratively Innovate Relentlessly Catalyze delivery of innovative technology-based capabilities solving intelligence challenges.


Download ppt "Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks"

Similar presentations


Ads by Google