AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.

Slides:



Advertisements
Similar presentations
Manatt manatt | phelps | phillips New York State Health Information Technology Summit Initiative Overview and Update Rachel Block, Project Director United.
Advertisements

1 POLICY ON SCIENCE AND TECHNOLOGY BY: M.B. WILLIAMS DIRECTOR, DEPARTMENT OF SCIENCE AND TECHNOLOGY.
Maryse Robert, Director Department of Economic and Social Development Executive Secretariat for Integral Development San Pedro Sula, Honduras, September.
Innovate Now: Overview and Next Steps February 2007.
Opening Doors: Federal Strategic Plan to Prevent and End Homelessness
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
© 2010 Deloitte & Touche LLP The Cyber-Savvy Organization: 10 Steps to a New Cyber Mission Discipline May 2010.
Joint CASC/CCI Workshop Report Strategic and Tactical Recommendations EDUCAUSE Campus Cyberinfrastructure Working Group Coalition for Academic Scientific.
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
National Infrastructure Protection Plan
The U.S. Coast Guard’s Role in Cybersecurity
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
Cyber Security: Past and Future John M. Gilligan CERT’s 20 th Anniversary Technical Symposium Pittsburgh, PA March 10, 2009.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
For Discussion Purposes Only
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Session 121 National Incident Management Systems Session 12 Slide Deck.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
National Response Framework
U.S. Department of the Interior U.S. Geological Survey Facing Tomorrow’s Challenges USGS Science in the Coming Decade Dr. Mark Myers Director USGS.
Part of a Broader Strategy
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Health IT Policy Committee Federal Health IT Strategic Plan September 9, 2015.
Association of Defense Communities June 23, 2015
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Critical Infrastructure Protection: Program Overview
A National approach to Cyber security/CIIP: Raising awareness.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
ICAI International Conference 8 th January, 2012 Vision 2030.
PS Version 1 National Response Framework Overview for Private Sector Audiences January 22, 2008.
Peter B. Bloland, DVM, MPVM Director Division of Public Health Systems and Workforce Development Global Health Leadership Forum November 10, 2011 National.
1 The Federal Shared Youth Vision Partnership A Federal Partnership between the United States Departments of Education, Health.
Climate Adaptation Policy & Practice in the United States A Presentation for the Environmental Evaluation Network Forum June 24, 2011 Steve Adams Managing.
NCR-Homeland Security Strategic Plan November 2005 Draft Initiatives Included.
DEVELOPMENT COOPERATION FRAMEWORK Presentation by Ministry of Finance 10 December 2013.
Page 1 Strategic Foresight Initiative Summary Briefing Emergency Management Higher Education Conference June 6, :30 – 11:30 am.
Dr. Shane Renwick, DVM, MSc, A/Director, Animal Health Science Division, Canadian Food Inspection Agency CAHLN, UCVM June 8, 2010 Foresight for Canadian.
Preparing Youth for the 21 st Century Economy Gregg Weltz Director of Youth Services U.S. Department of Labor.
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
The Workforce, Education Commissioning and Education and Learning Strategy Enabling world class healthcare services within the North West.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Healthcare Coalitions. John Heywood English Writer
Building Governance for Risk Management
Crisis management related research at
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Higher Education’s Role in the Identity Ecosystem
8 Building Blocks of National Cyber Strategies
Continuity Guidance Circular Webinar
National Quantum Initiative
Cybersecurity ATD technical
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation Deloitte & Touche LLP June 25,

CSIS Cybersecurity Commission “Securing Cyberspace for the 44 th Presidency” (Dec 08) Summary of Findings & Recommendations Cybersecurity – now a major national security problem for the U.S. Decisions & actions must respect privacy & civil liberties Only a comprehensive national security strategy that embraces both domestic & international aspects of Cybersecurity will make us more secure  Create a Comprehensive National Security Strategy for Cyberspace  Organize for Cybersecurity  Partner with Private Sector  Regulate for Cybersecurity  Secure Industrial Control Systems (ICS) & Supervisory Control and Data Acquisition (SCADA) Systems  Use Acquisition Rules to Improve Security  Manage Identities  Modernize Authorities  Revised Federal Information Security Management Act (FISMA)  End Division Between Civilian & National Security Systems  Conduct Training for Cyber Education & Workforce Development  Conduct Research & Development for Cybersecurity 2

CSIS Cybersecurity Commission Conclusion (Dec 08) The effort to improve Cybersecurity offers the opportunity to rethink how government & industry operate and to build collaboration across organizational boundaries The goal should not be the best defense, but government & industry that can : –Securely take full advantage of Cyberspace –Enable and assure essential services in Cyberspace –Create opportunities for collaboration, growth, & national advantage 3

President’s Cyberspace Policy Review Assuring a Trusted and Resilient Information and Communications Infrastructure, May 29, 2009 U.S. is at a crossroads – “cyberspace” underpins almost every facet of society Status quo no longer acceptable – U.S. must lead with strong leadership & vision Federal government to initiate a national public awareness & education campaign U.S. should develop a globally competitive workforce Federal government should reinforce cybersecurity partnership with private sector U.S. needs a cybersecurity strategy addressing the international environment U.S. needs comprehensive framework to coordinate Federal, State, local, tribal, private sector, & international allies response to significant cyberspace events Federal, State, & local partners should identify procurement strategies to incentivize the market to make more secure products & services 4

President’s Cyberspace Policy Review (May 09) Near-Term Action Plan 1.Appoint NSC/NEC dual-hatted cybersecurity policy official & establish NSC directorate 2.Prepare cybersecurity national strategy 3.Designate cybersecurity as a Presidential key management priority with metrics 4.Designate a privacy & civil liberties official to the NSC cybersecurity directorate 5.Formulate policy – clarify roles, responsibilities, & agency authorities 6.Initiate national public awareness & education campaign 7.Develop an international cybersecurity policy framework & strengthen international partnerships 8.Prepare cybersecurity incident response plan; enhance public-private partnerships 9.Develop framework for research & development (R&D) strategies focusing on game-changing technologies 10.Build a cybersecurity-based identity management vision and strategy that addresses privacy & civil liberties, leveraging privacy-enhancing technologies 5

President’s Cyberspace Policy Review (May 09) Mid-term Action Plan 1.Improve process for resolving interagency disagreements 2.Use performance-based budgeting, using OMB program assessment framework 3.Expand key information age education programs and R&D 4.Expand & train the workforce 5.Determine best mechanisms to obtain strategic warning, maintain situational awareness, & inform incident response capabilities. 6.Develop a set of threat scenarios & metrics for risk management, recovery planning, and R&D prioritization 7.Develop a process between government & private sector for preventing, detecting, & responding to cyber incidents 8.Develop mechanisms for information sharing that address privacy & proprietary information & make information sharing mutually beneficial 9.Develop solutions for emergency communications 10.Expand information sharing with key allies about network incidents & vulnerabilities 6

President’s Cyberspace Policy Review (May 09) Mid-term Action Plan (cont’d) 11.Encourage collaboration between academic & industrial laboratories 12.Define goals for national & international standards bodies 13.Implement an “opt-in” array of interoperable identity management systems to build trust for on-line transactions to enhance privacy 14.Refine government procurement strategies & improve market incentives for secure & resilient hardware & software products, new security innovation, & secure managed services 7

CSIS Cybersecurity Commission (Phase 2) “ … we will continue the Commission's work to identify sound policies that address the critical issues for Cyberspace. We will build a national community of experts to engage in this vital task. Our goal is to fulfill the Commission's vision for a secure Cyberspace while adhering to the bipartisan and independent principles that guided our report.” Potential work-plan & topics we will address in more depth during Phase 2: Cybersecurity Strategic Vision Foundational Elements  Identity & Authentication  International Framework  Situational Awareness & Health of Networks  Privacy & Civil Liberties  Authorities & Doctrine  Innovation & Migration Tools for Achieving Foundational Elements  Acquisition  R&D  Workforce Training Plan for Moving Ahead 8