International Cyber Warfare and Security Conference

Slides:



Advertisements
Similar presentations
Sensors and location technologies – the front end of ISR
Advertisements

GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
David A. Brown Chief Information Security Officer State of Ohio
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
The U.S. Coast Guard’s Role in Cybersecurity
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
DHS, National Cyber Security Division Overview
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Significant Work. Extraordinary People. SRA. Property Management Solutions for Unique Identification, AIT, and the Supply Chain March 30, 2011 Susan Pearson,
Tadiran Electronic System A member of the Elisra Group Operates as a system House for: Intelligence & EW systems (Electronic Warfare) Spectrum Management.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Information Visualization Solutions March 15-16, 2007 Information Visualization Solutions Team Overview & Analysis ~ Michael Hardy.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Who We Are Raytheon Company is a technology and innovation leader specializing in defense, security and civil markets throughout the world. Number of.
Realizing intrinsically cyber secure large systems
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Maritime Domain Awareness The Key to Maritime Security
Electronics, Intelligence & Support Systems Solutions & Integration Charleston, South Carolina Overview.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
SEC835 Database and Web application security Information Security Architecture.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Lessons Learned in Smart Grid Cyber Security
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1 Corporate Overview CIC Luncheon Feb 15, Industry Leader Lockheed Martin #1 Aerospace and Defense Company with Revenue Greater than $20 Billion.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
© RHEINMETALL DEFENCE 2014 Systems Engineering at Rheinmetall Air Defence Dr. Marc Honikel.
Information Warfare Playgrounds to Battlegrounds.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Delivering innovative ISTAR solutions SG.E
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
Microsoft in Defence Michel van der Bel Vice President Microsoft International.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Copyright © 2012 Raytheon Company. All rights reserved.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Chapter 17: Foreign Policy and National Defense Section 2.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
EPIC Connections® is a leading provider of contact center consulting, outsourcing and managed infrastructure services. Our highly qualified teams deliver.
How to Make Cyber Threat Intelligence Actionable
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Vodafone Business Cloud
 Elsag Datamat 2009 All rights reserved. Reproduction in whole or in parts is prohibited without written consent of the copyright owner 24/06/2016 CONSTRUCTING.
Physical Security Market to Global Analysis and Forecasts by Application, Services No of Pages: 150 Publishing Date: Jan 2017 Single User PDF: US$
Physical Security Market to Global Analysis and Forecasts by Application, Services No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Space Hellas Corporate Presentation
Comprehensive Security and Compliance at an Affordable Price.
Challenges and Opportunities
THE NEXT GENERATION MSSP
Securing the Threats of Tomorrow, Today.
Enhanced alerting and collaborative incident management
Cyber Security in a Risk Management Framework
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

International Cyber Warfare and Security Conference Ankara, November 27th, 2014

Table of contents Finmeccanica overview Selex ES overview Main Military References - NATO and National Cyber, the Fifth Military Domain Cyber Intelligence Solutions

FINMECCANICA TODAY Finmeccanica is a leader in the high technology sector and ranks among the top ten global players in Aerospace, Defence and Security. With about 67,000 employees worldwide, Finmeccanica generated in 2012 revenues of approximately EUR 17.2 billion. We operate in: HELICOPTERS AERONAUTICS SPACE DEFENCE AND SECURITY ELECTRONICS DEFENCE SYSTEMS TRANSPORTATION 3

€bil. 17.2 €bil. 16.7 New Orders 16,703 Revenues 17,218 Order Backlog 2012 GROUP RESULTS REVENUES 2012 €bil. 17.2 NEW ORDERS 2012 €bil. 16.7 RESULTS € MLN 2012 New Orders 16,703 Revenues 17,218 Order Backlog 44,908 4% 5% 6% 5% 7% 6% 10% 13% 17% 18% 24% 23% 32% 30% HELICOPTERS SPACE TRANSPORTATION DEFENCE AND SECURITY ELECTRONICS DEFENCE SYSTEMS ENERGY *On December 23rd 2013 Finmeccanica has closed the sale of its 39.55% stake in Ansaldo Energia share capital to Fondo Strategico Italiano. The remaining 15% stake will be sold between June and December 2017. At the same time FSI has acquired also the 45% stake held by First Reserve. AERONAUTICS 4

Selex ES - Key facts 17,000 people Revenues in excess of 3.2 billion Euros More than 17.5% of investment in R&D 70% engineers and personnel with technical qualifications Worldwide industrial footprint Operating in Turkey since 1989 with its fully owned subsidiary Selex ES Elektronik Turkey, headquartered in Gölbaşı, Ankara,

Our Divisions Airborne and Space Systems Land and Naval Systems Radar and Advanced Targeting Air Systems, Unmanned Systems and Simulators Electronic Warfare Avionics Space Systems Support and Service Solutions Land and Naval Systems Naval & Air Defence Systems Land & Battlefield Systems Optronics Systems Defence Communications Systems Support & Service Solutions Security and Smart Systems Homeland Security & Critical Infrastructures Cyber Security & Information Assurance Air & Vessel Traffic Management Systems Automation Systems ICT & Networking Smart Solutions

We are a systems integrator and manufacturer with a broad perspective of security requirements OVERVIEW OUR TEAM INCLUDES: Strong Managed Security experience 500 Professional Staff 10+ SOC commissioned by Defense and CNI customers 2 (+1) Security Operation Centres Working across Europe, NATO Nations, Middle East and Asia 30+ years at the forefront of cryptology High Grade solutions Multinational, multi-platform Electronic Key Management Systems Galileo PRS Secure infrastructure and secure modules Delivering NCIRC in 55 locations in 26 countries

Managed Security Services Our Offering Professional Services Cyber Security Solutions Intelligence Equipment and Technologies Managed Security Services Analyse & Plan Design Implement Manage Support Compliance Consulting Disaster Recovery Web intelligence – utilizzo di MSS - Managed Security Services Security Infrastructure Security Operation Center & CERT Device Monitoring Device Management Incident Handling Threat Management Malware Analysis Penetration Test Forensic Analysis

Cyber Security - Main Customers Military (NATO and National) Central and Local Government National Security Agencies Law Enforcement Health Care Telecommunications Transportation & Utilities Large Enterprises Banks and Insurances

ANWI Active NetWork Infrastructure Selex ES, main partner of Lockheed Martin, is responsible for: Security Accreditation Testing Management Consultancy services on Cross-Domain Gateways Secure Communication Services

Cyber Security for the Italian Defence CERT for the Italian Army Planning and Implementation of an Integrated Security Monitoring System for the supervision of the Army Network through a Command Center. Italian Navy SOC Planning and Implementation of an Integrated Security Monitoring System for the supervision of the Navy Network. Operation Center for the Italian MoD Operation Service for the SOC and CERT Cyber Defence Capabilities Program for the Italian MoD Planning and Implementation of a Cyber Defence Capabilitiy (CDC) through a Data Fusion System (Data Integration & Correlation) and a Command Center.

Cyber Space - The Fifth Domain Source: ADD 3-12 “ CYBERSPACE OPERATIONS” All missions (Air, Land, Maritime, Space, C4ISR) depend on the Cyber Domain The Cyber Domain can be contested and/or denied Complexity and Interdependency are growing © Copyright Selex ES S.p.A 2014 All rights reserved

Full spectrum dominance No one of the four domains can be controlled if Cyberspace is not. Cyberspace pervades all the other military domains and must be considered the essential key to achieve the full spectrum dominance Land Sea Cyberspace © Copyright Selex ES S.p.A 2014 All rights reserved C4ISR Air Space

© Copyright Selex ES S.p.A 2014 All rights reserved Intelligence Intelligence is the main capability necessary to control the Five military Domains. Strategic Intelligence Operational Intelligence Tactical Intelligence © Copyright Selex ES S.p.A 2014 All rights reserved Military intelligence diagram of defense positions during the Battle of Okinawa, 1945

Fifth Domain Intelligence = Cyber Intelligence Tactical Intelligence Advanced detection Compliance Monitoring & reporting Operational Intelligence (SOC/CIRT)(*) Centralized management Response Coordination Analysis Continuity plan Recovery plan Service resiliency  Strategic Intelligence Social & political dynamics Security trends Predictive analysis Early warning Manage Incidents © Copyright Selex ES 2014 All rights reserved Prevent actions and physical threats (*) Security Operation Centre & Computer Incident Response Team

Cyber Warfare Physical Networks Logical Wireless e.g. Social Networks Electromagnetic Spectrum Digital Data Force Protection Electronic Protection Data Influence Physical Activity Computer Activity Electromagnetic Spectrum Influence Activity Logical Wireless Infrastructure Cyber User/ Organization Asset / Organization Protection Intelligence e.g. Social Networks ANTICIPATE: Respond to attacks before they occur REACT: Investigate who did what to whom DEPLOY: Intelligence that deploys early warning systems DETECT: Observe attacks and intrusions DEFEND: Secure physical and logical assets © Copyright Selex ES S.p.A 2014 All rights reserved

Situational Awareness and Early Warning capabilities are a priority 1.400 It’s the average number of relevat attacks experienced by an organization within a week 35% Are the attacks that exploit code vulnerabilities 88% It’s the share of company’s software that presents vulnerabilities There is public information that is available on the internet …but a lot of it cannot be accessible through the traditional web search engines… …or we don’t even look for it, because we ignore that it even exists.

Cyber Intelligence - XASMOS Selex ES XASMOS platform is based on a High Performance Computer, specialized in high speed processing of massive information on the internet. Defines problem oriented analysis to support the intelligence process Applies different mathematical algorithms and vertical applications to generate actionable intelligence Provides timely reports and suggests immediate actions for remediation Indexed Web Dark Web Deep Web

High Perfomance Computer High-Performance Computing +310 TFlops High Perfomance Computer Italian Technolgy - Eurotech Aurora High level Integration Liquid cooled – unique technology “Free Cooling” technology with low power consumption Solid State Storage

Open Source Intelligence Services Cyber Attack Identification & Prediction Identifies next target of Hackers, Hacktivist, etc. Identifies potential leaks/availability of information on the web Identifies attackers’ activities during the early stages prior to an attack; Early Warning and Vulnerability Identification Analyses the information within social networks and from millions of sources, identifying anomalies related to new vulnerabilities; Provides the Analyst Team with alerts on threats that the Security Vendor community does not yet manage. © 2014 Selex ES S.p.A. – All rights reserved

Predictive Analysis – a real example Attack against an Italian Government Agency, by Anonymous, foreseen 48 hours before initiated Descrivere la soluzione integrata di prodotti/servizi dedicata alla previsione ed alla gestione degli scenari di minaccia: Metodologia e processo di analisi (modello AgId); Piattaforme tecnologiche di supporto (centro di calcolo e server on site per la valutazione degli scenari di minaccia); Esposizione degli output significativi prodotti nel corso del test “Lampedusa” svolto dal centro di calcolo; Descrizione del processo di gestione degli scenari di minaccia (Bollettino di alert e valutazioni di temibilità, analisi del rischio sistemico, implementazione delle misure compensative in funzione della finestra temporale di imminenza; auto correzione dei parametri valutativi e delle soglie di allarme). © 2014 Selex ES S.p.A. – All rights reserved

Thank you for your attention Aldo Pietro Paggi Vice President International Technical Sales Support aldo.paggi@selex-es.com