Coast Guard Cyber Command

Slides:



Advertisements
Similar presentations
The U.S. Merchant Marine and America’s Maritime Security
Advertisements

Systems Security Engineering An Updated Paradigm INCOSE Enchantment Chapter November 8, 2006 John W. Wirsbinski.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Sensors and location technologies – the front end of ISR
The U.S. Coast Guard’s Role in Cybersecurity
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
624 OC Perspective: Directing Cyber Operations
South Carolina Cyber.
Information Assurance Efforts at the Defense Information Systems Agency & in the DoD Richard Hale Information Assurance Engineering Defense Information.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Storage Security and Management: Security Framework
Part of a Broader Strategy
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
BUSINESS B1 Information Security.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Systems Security Operations Security Domain #9.
Air Force Strategy to Resources
Network security Product Group 2 McAfee Network Security Platform.
U.S. Coast Guard Intelligence & Criminal Investigations
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Ms. Sandra Stanar-Johnson
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
JNTC Joint Management Office
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Homeland Security Cyber Threat Discussion INFRAGARD 2012 UNCLASSIFIED/FOR OFFICIAL USE ONLY Richard C. Baron Executive Director Ohio Homeland Security.
C4IT S ERVICE C ENTER 2016 Industry Day C4IT Service Center CAPT David Dermenalian March 8, 2016.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
UNCLASSIFIED Defense Threat Reduction Agency Small Business Innovation Research (SBIR) Small Business Technology Transfer (STTR) Mark Flohr Program Manager.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
OIT Security Operations
BruinTech Vendor Meet & Greet December 3, 2015
DoD Cyberspace Workforce Definitions
DISA Global Operations
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
California Cybersecurity Integration Center (Cal-CSIC)
Advanced Threat Protection
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
United States Coast Guard
U.S. Coast Guard Cyber Education & Training
Cyber defense management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
DoD Cyberspace Workforce Definitions
John M. Felker Director, NCCIC.
Cybersecurity ATD technical
Cybersecurity EXERCISE (CE) ATD Scenario questions
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
NDIA DoD CIO Vision.
Presentation transcript:

Coast Guard Cyber Command CAPT Michael C. Dickey, USCG March 2016

Coast Guard Cyber Strategy Identify and Harden Systems and Networks Understand and Counter Cyber Threats Increase Operational Resilience Defending Cyberspace Risk Assessment – Promote Cyber Risk Awareness and Management Prevention – Reduce Cyber Security Vulnerabilities in the MTS Protecting Infrastructure Incorporate Cyberspace Operations into Mission Planning and Execution Deliver Cyber Capabilities to Enhance all Missions Enabling Operations Strategic Priorities Enabling Factors Culture Law Partnerships – Real Time Communications – Organization – Cyber Workforce - Investment

Defending Cyberspace Goal 1. Identify and Harden Systems and Networks Goal 2. Understand and Counter Cyber Threats Goal 3. Increase Operational Resilience

Enabling Operations Goal 1. Incorporate Cyberspace Operations into Mission Planning and Execution Goal 2. Deliver Cyber Capabilities to Enhance All Missions

Protecting Infrastructure Goal 1. Risk Assessment – Promote Cyber Risk Awareness and Management Goal 2. Prevention – Reduce Cybersecurity Vulnerabilities in the MTS.

Cyber Strategy Implementation Plan Cybersecurity is Foundational to all the Commandant’s Priorities Western Hemisphere Strategy Arctic Strategy Human Capital Strategy Service to Nation Duty to People Commitment to Excellence Enabling Operations Protecting Infrastructure Defending Cyberspace

Strategy Implementation Dashboard Primary Focus DCDI CNDSP CPT Program Office

DoD Vision + USCG… CNMF Cyber National Mission Force Headquarters 4 x JFHQ-Cyber Joint Force Headquarters-Cyber JFHQ-DODIN Joint Force Headquarters- DOD Information Networks Below teams combined across all 4 JFHQs National Mission Forces Combat Mission Forces Cyber Protection Forces 13 27 6 National Mission Teams Combat Mission Teams DOD Information Networks Cyber Protection Teams 8 + 17 National Support Teams Combat Support Teams Service-Retained Cyber Protection Forces Cyber Protection Forces Cyber Protection Forces 18 20 24 National Cyber Protection Teams Combatant Command Cyber Protection Teams Service Cyber Protection Teams

CGCYBER and CYBERCOM 17 USSTRATCOM USCYBERCOM DoD CIO DIRNSA/CHCSS Support USSTRATCOM USCYBERCOM DIRNSA/CHCSS Dual Hatted DoD CIO Joint Operations Center Deputy Director NSA NSA NSOC ROC NTOC JFHQ DoDIN JFHQ Cyber Global Enterprise Ops Ctr Service Cyber Components Agencies DISA DoDIN Command AFCYBER Enterprise Ops Ctr ARCYBER FLTCYBER MARFORCYBER DoDIN CPTs CGCYBER Cyber Protection Teams (CPTs) 17

Relationship with C4ITSC Operate & Defend Build & Maintain CNDSP for USCG, DCO-IDM CSOC - 24x7x365 Watch Service Cyber Component to USCYBERCOM Executes TASKORDs from USCYBERCOM Intelligence fusion/indicators and warnings from NTOC DoDIN Ops Technical Authority Configuration management for CG networks Change Authority Build, deploy and maintain security systems and sensors COLLABORATION…COORDINATION

Defense in Depth – a Partnership PREVENTION MEASURES PROTECTION MEASURES IDENTIFICATION MEASURES RESPONSE MEASURES Attack Types Impacts Shellcode & Buffer Overflow Business Interruption Impacts 1 2 6 5 Malicious Code Injection 7 4 3 Property Damage Impacts 9 1 2 6 System Exploited 8 Denial of Service (DoS) 3 9 Impacts on People 8 5 4 7 Social Engineering & Spoofing Secondary Economic Impacts Countermeasures Identification & Response Measures Secure Input/output Handling Executable Space Protection Data Execution Prevention Anti-Virus Software Intrusion Prevention System Firewalls Social Engineering Training Security Protocols Access Control Intrusion Detection System System Backup Restoration Deep Packet Inspection DoS Defense System Network Analyzer Operating System Reinstallation Honeypots Firewall Modification Hardware Replacement “CND Services protect the network from adverse events, detect adverse events that do occur, and then respond”