A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.

Slides:



Advertisements
Similar presentations
Chapter Seven, Section Four
Advertisements

AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Chapter 15 Notes Government at Work: The Bureaucracy
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
EC-Council | Press The Security Books You Have Been Waiting For!
DHS, National Cyber Security Division Overview
South Carolina Cyber.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Chapter 1 Introduction to Security
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Introduction to Network Defense
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Cracking down on international cyberterrorism
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chapter 14 Section 5 Objective: To understand the executive agencies and the role of the cabinet.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
“Executive Departments & Cabinet” “Independent Agencies and Regulatory Commissions.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Friday 22nd April 2016 DS Chris Greatorex SEROCU
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Information Security in Laurier Grant Li Wilfrid Laurier University.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
Comprehensive Security and Compliance at an Affordable Price.
Team 1 – Incident Response
Helping the President. “Executive Departments & Cabinet” “Independent Agencies and Regulatory Commissions.
Team 2 – understand vulnerabilities
Cyber Insurance – FFs & CHBs
Compliance with hardening standards
Introduction to the Federal Defense Acquisition Regulation
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Andy Hall – Cyber & Tech INSURANCE Specialist
Tuesday January, 27, 2015 Agenda Homework Executive Agencies Notes
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing the Threats of Tomorrow, Today.
Cyber Security Culture
“Presidential Advisers and Executive Agencies”
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President. “Executive Departments & Cabinet” “Independent Agencies and Regulatory Commissions.
“Executive Departments & Cabinet” Chapter Six, Section Four – “Independent Agencies and Regulatory Commissions.
Resulting in increased training revenue
Figuring out CyberSecurity Return On Investment
Presentation transcript:

A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review

A Cyber Security Company Contents  Cyber Breach Snapshot  Why Cyber Security Is Critical  Moving Forward  Current Events  San Antonio – A Hub to Cyber Security  Administrations Top Considerations  Where are We Today

A Cyber Security Company Cyber Breach Snapshot Breaches are wide-spread and growing. DHS estimates attacks up 800% 2005 – 2007—estimates often low. Our company alone has thousands of attempted probes per week Attacks cost more than $8 billion over 2 years; $100+ million in 6 months. Federal BreachesOverall Breaches

A Cyber Security Company Computer Spies Breach Fighter Jet - WSJ Electricity Grid in U.S. Penetrated by Spies - WSJ Estonia Denial of Service Attacks (2006)

A Cyber Security Company Why Cyber Security Is Critical  Cyber space now recognized as critical to our lives and national defense - Bank accounts - Stock markets - Insurance claims - Medical records - Nuclear/electric plants and utilities  Attempts against U.S. critical assets are increasing –Some are foreign government-sponsored. Some obviously successful  Effects will be powerful and destructive.

A Cyber Security Company Moving Forward  Federal, State, local governments should work with industry in advance to improve plans and resources to cyber security incidents. What needs to be done? –Detect –Prevent –Respond –Mitigate  Cyberspace cannot be secured without regulation - Voluntary regulation is not the right solution

A Cyber Security Company Moving Forward  We must do a better job in properly configuring software products –Configuring software products for security is expensive and often produce new vulnerabilities –We are spending more to ensure that software is securely configured and to patch software defects than what the product itself is worth  We must improve the acquisition process for hardware/software

A Cyber Security Company Current Events…  President Obama – “We’re not as prepared as we should be, as a Government or as a country.”  NSA Director General Alexander “The United States must defend against a cyber attack by going after the botnets at their point of origin”  General Schwartz USAF Chief of Staff – “We’ve regarded network protection and security as the “Comm Guy’s Job,” and as a user inconvenience. THIS MUST NOT LONGER BE THE CASE”.  Johnnie Hernandez – “We don’t have enough trained people to mitigate all of the probes and attacks occurring in our network systems”

A Cyber Security Company San Antonio – A Hub to Cyber Security  NSA West  AF Cyber Command in San Antonio  Birthplace of AF Information Warfare/Information Operations  Wealth of talent in the local area  Public/private partnerships with academia  Ranked “The Most prepared community in the nation” for cyber security  Plus, all the other great things SA has to offer (i.e List of best cities…)

A Cyber Security Company Administrations Top Considerations  Appoint a cyber security policy official responsible for coordinating the Nation’s cyber security policies and activities  Initiation of a national public awareness and education campain to promote cyber security  Develop a framework for research and development strategies

A Cyber Security Company Policy Analysis & Insights Top ConsiderationsAnalysis OverallGood first-step, but few immediate steps forward PriorityCritical - Overdue Reporting StructureReports to Nat’l Security Council and Nat’l Economic councils – OMB oversight for proper budgeting FundingGood. $17 billion expected to be increased. $100 million spent last 6 mos. alone fixing damage. Top Priorities - Awareness - Education - Timing Slow Critical Couldn’t come fast enough

A Cyber Security Company WHERE ARE WE TODAY  - Leaders must all realize that hackers are constantly trying to steal information  Adversaries are on a wartime footing  Cyber security is a growth issue

A Cyber Security Company Questions?

A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review