National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.

Slides:



Advertisements
Similar presentations
Life Science Services and Solutions
Advertisements

Bethan Bishop Head of Innovation & Industry Engagement The Public Sector (NHS) Perspective Future European Structural and Investment Funds innovation workshop.
0 © 2011 Silver Spring Networks. All rights reserved. Building the Smart Grid.
OpenStand and Collaborative Communities For innovation, solutions and market growth Kantara Initiative 3 June 2014 Summit Karen McCabe Senior Director,
Internet2, CENIC and Merit: Partnering to Deliver Cloud Services to California.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Do You Know ???.
The Promise & Challenge of Health Care IT in Community Clinics: Insights from the California Community Clinics Initiative Prepared for the convening on.
ITPA Luncheon March 12, 2015 Emerging Role of the CTO.
Service Provisioning Service Provider Consulting Microsoft Consulting Services harvests the knowledge, experience, and tools established by designing and.
Techuk.org |#techuk Introducing techUK Volcrowe/ Nemode Workshop. 22/4/15.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
365 IT CONSULTANCY AND PROJECTS PTY (LTD) 04 Smuts Park Corner Northey & Smuts Ave Witbank 1039 Phone: Fax:
1 Building National Cyberinfrastructure Alan Blatecky Office of Cyberinfrastructure EPSCoR Meeting May 21,
EMarketPlace: Advanced Service Delivery Solutions Stephanie Woolson Lockheed Martin.
Contribution since August,2008 National MSME Conclave 19 November, 2014 Use of ICT to make MSME more competitive and sustainable Tapan K. Patra Director.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
John McDougall, President 10 th Annual Re$earch Money Conference, 11 May 2011.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Sapient Global Markets – Commodities Team Analytics, Advisory and Project Management.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Duke Medicine IT Strategy Jeffrey Ferranti, MD Chief Information Officer / VP Medical Informatics Duke Medicine April 17, 2015.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
O Creative Industries - worth £5.2 billion to Scottish Economy o No visibility of Design or Scotland’s Designers-missing gap in cultural provision o V&A.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
1© Nokia Siemens Networks 2011 To change the document information in the footer, press [Alt + F8] and use the „Nokia_Siemens_Networks_–_Change_Document_Information“
OpenStand Principles for the modern paradigm for standards development.
Click to edit text Presentation Title Presenter’s name Presenter’s Title Date Be Efficient – Accurate – Connected™
·
OnlineOn Premises Hybrid Cloud on your terms Messaging Voice & Video Content Management Enterprise Social Reporting & Analytics Best experience across.
Research Recommendations for the Broadband Taskforce Agenda November 23, 2009.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
| Collaboration at Rural Business Approach.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Integral Health Solutions We make healthcare systems work in harmony.
1 Lotus Connections Customer Use Cases The following are stories from early customer engagements. They were created to help people understand the many.
Topic 3A SEMANTIC INTEROPERABILITY: REUSE OF EHR DATA Mats Sundgren.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
The U. S. Health Care System Challenges, Opportunities and Solutions Fifth National HIPAA Summit Clinical Data Standards and the Creation of an Interconnected,
Advancing Government through Collaboration, Education and Action Priority Area Leaders Community Accomplishments Preview May 7, 2015.
Advancing Government through Collaboration, Education and Action Date ET SIG Cross SIG Alignment Activities Planned Page 0.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
Salesforce.com Migration Assessment with Microsoft Services Assess whether your current CRM implementation is the right solution for your current and future.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies NIST Industry Day February 10, 2016.
1 Bottom-up to Colorado Blueprint to Business Plan.
AN OPPORTUNITY TO ENTER INTO A JOINT VENTURE PARTNERSHIP WITH NTIS FOR DATA INNOVATION NTIS Information Session Department of Commerce Auditorium and Webcast.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |1 Accelerate Your Digital Transformation Innovate, Integrate, Collaborate #paas.
Scales Technology FZCO
Massachusetts Clean Energy Center Budget Overview
Penn State Center for e-Design Site Vision and Capabilities
Integration Community of Interest
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Dependable, secure and time-aware sensor networks - Overview
Replace with Application Image
CONNECT: Sydney A New Platform for City Development
The People Ready Vision for Business in the Enterprise
INNOVATION SUPERCLUSTERS INITIATIVE
OUR HISTORY & MISSION ABOUT US. OUR HISTORY & MISSION ABOUT US.
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Plan and design the solution
Presentation transcript:

National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National Cybersecurity Center of Excellence

ABOUT THE NCCOE

3Welcome to the NCCoE STRATEGY GOAL 1 PROVIDE PRACTICAL CYBERSECURITY Help people secure their data and digital infrastructure by equipping them with practical ways to implement standards-based cybersecurity solutions that are modular, repeatable and scalable VISION ADVANCE CYBERSECURITY A secure cyber infrastructure that inspires technological innovation and fosters economic growth MISSION ACCELERATE ADOPTION OF SECURE TECHNOLOGIES Collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs GOAL 2 INCREASE RATE OF ADOPTION Enable companies to rapidly deploy commercially available cybersecurity technologies by reducing technological, educational and economic barriers to adoption GOAL 3 ACCELERATE INNOVATION Empower innovators to creatively address businesses’ most pressing cybersecurity challenges in a state-of-the-art, collaborative environment

4Welcome to the NCCoE MODEL The NCCoE seeks problems that are: ‣ Broadly applicable across much of a sector, or across sectors ‣ Addressable through one or more reference designs built in our labs ‣ Complex enough that our reference designs will need to be based on the combination of multiple commercially available technologies Two Types of NCCoE Project ‣ Use Case - Sector-specific use cases that focus on a business-driven cybersecurity problem facing a particular sector (e.g., health care, energy, financial services) ‣ Building Block - Technology-specific building blocks that cross sector boundaries (e.g., roots of trust in mobile devices, trusted cloud computing, software asset management, attribute based access control)

5Welcome to the NCCoE ENGAGEMENT & BUSINESS MODEL ORGANIZE + ENGAGE Partner with innovators TRANSFER + LEARN Guide stronger practices IMPLEMENT + TEST Build a reference design Identify and describe business problem Conduct market research Vet project and use case descriptions Publish project use cases, building blocks and solicit responses Select partners and collaborators Sign CRADA Build reference design Test reference design Identify gaps Collect documents Tech transfer Document lessons learned Define business problems and project descriptions, refine into specific use case Collaborate with partners from industry, government, academia and the IT community on reference design Practical, usable, repeatable reference design that addresses the business problem Set of all material necessary to implement and easily adopt the reference design DEFINE + ARTICULATE Describe the business problem OUTCOME ACTION

6Welcome to the NCCoE BENEFITS Cybersecurity solutions that are: based on standards and best practices usable, repeatable and can be adopted rapidly modular, end-to-end and commercially available developed using open and transparent processes matched to specific business needs and bridge technology gaps

7Welcome to the NCCoE NATIONAL CYBERSECURITY EXCELLENCE PARTNERS

8Welcome to the NCCoE CURRENT PROJECTS AND PUBLICATIONS Current Publications SP IT Health & Mobile Devices SP Energy Sector IdAM SP Attribute Based Access Control SP Mobile Device Security SP IT Asset Management for Financial Sector Current Projects Derived PIV Credentials Energy Sector Situational Awareness Cybersecurity Profile for Bulk Liquid Transport Point of Sale Data integrity Security using DNSSEC Security for medical Wireless infusion Access right management under the financial sector 2 nd builds for MDS, ABAC PET for Identity Federation

Gudelsky Drive Rockville, MD Questions?