"Momentum non vertendum" - Irreversible Momentum

Slides:



Advertisements
Similar presentations
EMBEDDING EMPLOYABILITY AND ENTREPRENEURSHIP WITHIN THE CURRICULUM Dr Julia Wolny Director of Fashion Business Resource Studio London College of Fashion.
Advertisements

Innovate Now: Overview and Next Steps February 2007.
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
EAC HIGHER EDUCATION POLICY
Principal Professional Development project
DHS, National Cyber Security Division Overview
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Advancing Government through Collaboration, Education and Action Financial Innovation and Transformation Shared Services Workshop March 17, 2015.
Managing the Information Technology Resource Course Introduction.
KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports lessons learned,
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
1 The “New FEMA” The National Logistics Coordination Forum March 27, 2008 Eric Smith Assistant Administrator Logistics Management Directorate FEMA LOGISTICS.
PS Version 1 National Response Framework Overview for Private Sector Audiences January 22, 2008.
Page 1 Strategic Foresight Initiative Summary Briefing Emergency Management Higher Education Conference June 6, :30 – 11:30 am.
Visit us at usacac.army.mil AMERICA’S ARMY: OUR PROFESSION – LIVING THE ARMY ETHIC Challenges and Opportunities BG John Kem.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
1 Overview of the Montefiore Emergency Preparedness Coalition Presentation to the New York City Healthcare Coalition Leadership Council February 18, 2016.
AACN – Manatt Study In February 2015, the AACN Board of Directors commissioned Manatt Health to conduct a study on how to position academic nursing to.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Innovation Manager SPECIFIC DUTIES AND RESPONSIBILITIES Manage new product projects from concept through commercialization. Partner with Brand Teams to.
Russian Information-Analytical APEC Center for Agricultural Biotechnology.
1 Chapter 9 Implementing Six Sigma. Top 8 Reasons for Six Sigma Project Failure 8. The training was not practical. 7. The project was too small for DMAIC.
UNCLASSIFIED Lift the living standards and wellbeing of all Victorians by sustainably growing Victoria’s economy and employment and by working with the.
Community Resilience Jill J Artzberger, MPH 2011 Texas Emergency Management Conference Thursday, April 28, 2011.
Procurement Development Programs
Mgt Project Portfolio Management and the PMO Module 8 - Fundamentals of the Program Management Office Dr. Alan C. Maltz Howe School of Technology.
Maritime Security as an Integral Part of an
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Collaborative Innovation Communities: Bringing the Best Together
Why KM is Important KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports.
Transforming the future of public health in Missouri
Crisis management related research at
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Aligning Curriculum Revision with Strategy
IFAD’s Environmental and Social Assessment (ESA) Procedures
DSMC-Executive Program Management Courses
Governors Homeland Security and All-Hazards Cyber Security Sub-Committee April 19th, 2016.
IT Governance at the SCO
Eric Smith Assistant Administrator Logistics Management Directorate
2017 National Geospatial Preparedness Summit
California Cybersecurity Integration Center (Cal-CSIC)
TF Mission To protect and strengthen our bases and the jobs and economic impacts associated with them in alignment with the expected assessment criteria.
Georgian Research & Development Foundation (GRDF)
Disaster Response – A Collaboration
Public Health England – Our progress under the Sendai Framework
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
8 Building Blocks of National Cyber Strategies
Stellenbosch University
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Continuity Guidance Circular Webinar
Defense Health Agency Industry Exchange J-6 I&O’s Enterprise Approach by COL Beverly Beavers November 08, 2018 Authorized Use Only Authorized Use Only.
The U.S. Department of Homeland Security
Presentation to the National Council of Space Grant Directors
Cybersecurity ATD technical
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
Corporate Program Update
Strategic Planning in Dynamic Times
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
KEY INITIATIVE Shared Services Function Management
BRD The Development Bank of Rwanda Plc (BRD) is Rwanda’s only national Development Finance Institution Public limited company incorporated in 1967 and.
Director - Mr. Wayne Raabe
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Getting Knowledge into Action for Healthcare Quality
Infragard national 2019 Strategic direction & plans
Presentation transcript:

"Momentum non vertendum" - Irreversible Momentum Army Cyber Institute CW3 Judy Esquibel Research Scientist "Momentum non vertendum" - Irreversible Momentum

Line of Support: Enabling the ACI The ACI is a national resource for research, advice, and education in the cyber domain, engaging military, government, academic, and industrial cyber communities in impactful partnerships to build intellectual capital and expand the knowledge base for the purpose of enabling effective Army cyber defense and cyber operations . Recruit people who want to continuously contribute to the ACI mission Build a diverse resource portfolio Develop and maintain facilities Develop a culture to empower interdisciplinary research Develop an ACI communications strategy Line of Support: Enabling the ACI Line of Effort 1: Advance the Body of Knowledge Conduct, facilitate, and identify basic research Conduct, facilitate, and identify interdisciplinary applied research Create venues for sharing research of interest to DoD Attend, present, and facilitate prioritized cyber community events Synchronized and accessible cyber innovation and research conducted in an interdisciplinary approach Line of Effort 2: Leverage Impactful Partnerships Harness academic partnerships to support of research objectives Collaborate with USMA research centers in support of research objectives Develop partnerships with industry in support of research objectives Create and nurture partnerships with government entities to help identify cyber domain future challenges and support research objectives Lead cyber community partnership efforts across the Army to reduce duplicative efforts and advances efforts across the community Developed dynamic partnerships The ACI has empowered people with the right skills, aligned with their interests on useful projects Line of Effort 3: Leader Development Supported cyber curriculum integration into USMA and other leader development institutions Influence and advise pre-commissioning leader development Support the Dean’s vision of cyber curriculum integration throughout USMA Support the Commandant of Cadets with innovative technology for training Support integration of cyber learning objectives throughout the U.S. Army War College Vision

The Army Cyber Enterprise HQ DA-G3/5/7 (DAMO-CY)

Research – Jack Voltaic Background (Con’t): 135 Participants across 25 Organizations First Responders, Emergency Mgmt, Transportation, Telecommunications, Power, Water, Finance and Healthcare

Jack Voltaic 1 – New York City Purpose – August 2016 JACK VOLTAIC is a multi-sector cyber security threat exercise led by the Army Cyber Institute and Citigroup in concert with a variety of commercial, and local government sector collaborators to demonstrate a cyber-attack in NYC, resulting in impact to multiple sectors and requiring coordinated response to contain an escalating threat to business and critical infrastructure. Lessons Learned – August 2016 BLUF: The need to improve “cyber fusion” was communicated in this context to express the need to improve a city’s communication to enable a proactive defense.

Innovations for Cyber Defense Jack Voltaic is an example of… Innovations for Cyber Defense High Targeted Market Existing New Low Sustaining (Meeting Existing Customer Needs) Breakthrough (Jumping the Curve) Incremental (Evolutionary) Disruptive (Revolutionary) Wong and Sambaluk's Innovation Framework (2016) Technological Complexity or Sophistication "To counter the advantages that are available to those conducting cyberattacks, we must pursue more disruptive defensive innovations" - Defending the Core with Cyber Innovations: Refusing to Concede to Cyberattacks (Gagnon, Wong, Hutton, 2016)

Background: Leveraged Partnerships December 2015 ACI discovered Regional Mutual Assistance Groups (RMAGs) . An energy sector framework to provide Operational and technical assistance During an incident. How Is this done within the Cyber domain? Innovate Academia Government Industry April 2016 ACI in Partnership With the Electric Infrastructure Security (EIS) Council and CMU-SEI-CERT conducted A workshop to explore Cyber Mutual Assistance Jonathon Monken, Former EIS Council VP of Operations Experiment Technical Report (draft): “Cyber Mutual Assistance Workshop Report” – soon To be published through CMU Bill Lawrence, E-ISAC/NERC Director Programs & Engagement May 2016 ACI Partnered with Citigroup’s Global Threat Exercise Team to begin developing Jack Voltaic Partner Develop an experiment…

Live-Fire-Exercise (LFX) Table-Top-Exercise (TTX) Design Concept Component 1: Live-Fire-Exercise (LFX) Component 2: Table-Top-Exercise (TTX) Component 3: Planning Committee   Correlated Selected planners, also known as “trusted agents” were key to the successful development and execution of this exercise. Planners were knowledgeable and experienced in cyber, emergency plan procedures and was involved throughout the designing, execution and evaluation of the exercise. Inspired from Existing exercise frameworks ACI consulted with U.S. Cyber command J71 – Training & Exercise Live-Fire-Exercise inspired from Cyber Guard Table Top Exercise Inspired from 2014 NYC TTX – led by DHS & FBI Homeland Security Exercise Evaluation Program (HSEEP) ACI consulted with DHS-National Cyber Exercise Planning Program (NCEPP) to obtain AAR Category – 3 : Senior Executives Category – 2: Mid-level Management Category – 1: Operator and Analysts

Jack Voltaic 2 National Preparedness – Strengthening the security and resilience of the United States

Jack Voltaic 2 – Sector Participants

Jack Voltaic 3 ? – Innovate & Thrive How the military and industry partnerships fill gaps between cyber + physical attacks and critical infrastructure Develop Enduring Partnerships with Private Sector(experts within a critical infrastructure) Identify collaborative opportunities – work a similar challenge together Evolve the Army’s ability on cross-sector protocol. Begin by learning from operations conducted within the homeland and then apply and adapt to operations abroad. Example – Evolve Cyber/EW Operational Insights on mission critical systems Future Required Skillsets brought on by technologies (Electrical Grid, Software Defined Radios, Internet of Things (PLC device emit Radio Frequencies)) Ham Radio Operators merged with Hacker skillsets – “Ham-Hackers” Vulnerabilities introduced overtime through the modernization of OT environments to enable management and efficiency. Enable the Identification of the “Gold Standard” – needed for transformation Enable Rapid Capability Development Evolve our use of existing authorities

Questions?