Threats to infrastructure…and everything else

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Introduction to the GeoHistoGram. Objectives: Students will be able to: Identify the elements of the GeoHistoGramIdentify the elements of the GeoHistoGram.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
Does American hegemony in the post-Cold War era create a safer world than the bipolar world of the Cold War?
Network Security of The United States of America By: Jeffery T. Pelletier.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
WHAT CAN ROCK OUR WORLD? 1. 2 …but very dangerous!!! ….but very dangerous!!!
How the Russian oil and gas exports to Europe effect the Europe Russia Geopolitical and economic relations? Nadav Avni Petroleum & Energy: Geopolitics,
Student: Ioana Antone Professor Coordinator: Arkadiusz Kotliński.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
National Security of Ukraine: Challenges and Threats 1.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
By Daniel.. American business. This a clear example of war, the U.S.A have been involved in wars all the time in history and also we know that wars happened.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Aspen, Colorado September 19 th, 2013 BLACK AND VEATCH UTILITY EXECUTIVE LEADERSHIP INSTITUTE: “PREDICTABLE PERFORMANCE”
Week 4. Tonight’s seminar National Security Strategy National Security Strategy Local Response Local Response United Kingdom’s plan United Kingdom’s plan.
Created by: Ashley Spivey For Department of Homeland Security All information from:
THE TERRORIST CHALLENGE September 11. The terrible events of September 11, 2001, “changed everything.”
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Week 4 Tina Mainwaring. VERY IMPORTANT!!! NO SEMINAR NEXT WEEK!!! NO SEMINAR NEXT WEEK!!! NO DISCUSSION BOARDS NEXT WEEK!! NO DISCUSSION BOARDS NEXT WEEK!!
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
THE CURRENT GLOBAL ICT ENVIRONMENT
GOVT Module 16 Defense Policy.
Nation State Actors Lex Dunlap.
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Cybersecurity, competence and preparedness
Transformation of conflict
Contemporary Global Issues
Public Facilities and Cyber Security
Operation Enduring Freedom
IACP: Inteligence Led Policing
The Cold War comes to the Americas
Ancient Greece Mountains divided the Greeks into independent city-states, like Athens & Sparta Access to the sea increased trade & cultural diffusion.
MAIN POINTS OF WORLD WAR I
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Bell Work Translate the quote into 2017 language
Containment & Soviet Control in Eastern Europe
This picture shows the border of North and South Korea.
Join In Be Secure Presentation
Presidential Approaches to Cybersecurity
Containment & Soviet Control in Eastern Europe
Transit Security Training and Education Overview
End of Year Project Major Grade – 100 pts (test grade)
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
The Two Party System An American Tradition.
Assessing Deterrence Options for Cyberweapons
18.2 The Civil War Begins (pt. 2) pp
Foreign and Defense Policymaking
U.S. Defense Structure and Key Players
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Section Three The Ratification Process: Federalists, Anti-Federalists, The Federalist Papers, and the Bill of Rights Author: Michelle Williams.
Foreign Policy and National Defense
Effects of the War.
Foreign and Defense Policymaking
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Essential Question: What was the impact of the spread of Hellenic culture under Alexander the Great? Warm-Up Question: What are the top 3 Greek innovations?
CyberSecurity Conference East: “No Silver Bullets …
Introduction to the GeoHistoGram.
Role of US Security and Intelligence Agencies
Deborah Housen-Couriel, ADV.
You will NOT receive credit for the session if you:
Introduction to the GeoHistoGram.
18.2 The Civil War Begins (pt. 2) pp
Foreign Policy and National Defense
Presentation transcript:

Threats to infrastructure…and everything else

Today’s World I have seen it more dangerous (probably) I have not seen it more complicated (definitely) I have never seen it more immediate (you bet)

One “big thing”: Things That Seemed Permanent Are Proving Not to Be Things like the post WW II American liberal global order

And he isn’t helping. Getting a seat at the table…by threatening to overturn it!!

And other things are changing…like the maps and borders created after WW I

…even things like the meaning of state, citizenship, power and religion

What is the center of gravity of this conflict?? A war between civilizations or a war within a civilization?

In any event, this is going to take a while… Probably not this…. …maybe this

Brent Scowcroft (April 2012) But a still bigger change is about the power of states and the nature of power Nation states and hard power play less of a role Sub-state actors and even individuals are empowered Failed states create risk The US is “threatened less by conquering states than we are by failing ones.” (2002 National Security Strategy) Brent Scowcroft (April 2012)

WE ARE IN ANOTHER GREAT AGE OF GLOBALIZATION Not Unlike the Era of European Discovery

Threats from Non-State Actors: Products of Empowerment and Connectivity Terrorism Transnational Crime Cyber attacks

The products of empowerment and connectivity…we are familiar with terror

But the Web Is the Largest Ungoverned Space in History

So…What Could Go Wrong? There’s stealing your stuff There’s corrupting your stuff There’s hurting your network There’s creating physical destruction

And Who Could Do This? Nation States Criminal Gangs Hacktivists

We’ve Seen a Lot of This

North Korea Attacks Sony Pictures

And now, this….

But wait! There’s more… Russian Attacks on Ukrainian Power On Dec. 23, 2015 a massive power outage in western Ukraine left approximately 700,000 homes in the dark. That outage was quickly followed by two smaller outages…

So Where Is This Now??? “So we have to get very, very tough on cyber and cyber warfare. It is—it is a huge problem….The security aspect of cyber is very, very tough. And maybe it’s hardly doable.” On his first day in office, President Trump will direct the Department of Defense and the Chairman of the Joint Chiefs of Staff to develop “a comprehensive plan to protect America’s vital infrastructure from cyber attacks, and all other form of attacks.”

But Government Has Been Late to Need Since Big Questions Still Remain

When Government Is Late to Need, the Private Sector Steps In Private Sector as ”victim” Private sector as solution …since the cavalry isn’t coming

It’s a Bit of a Role Reversal Who is the “main body”?

The Case for (and against) Encryption Can you be in favor of cyber security AND demand exceptional access?

The Classic Risk Equation Threat x Vulnerability x Consequence

Buckle up. It’s going to be a tough century.