WEIS 2011 Workshop on the Economics of Information Security Chris Greer Assistant Director for Information Technology R&D White House Office of Science.

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

Opening Doors: Federal Strategic Plan to Prevent and End Homelessness
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
UNCLASSIFIED December 2010 Is N.I.C.E.. UNCLASSIFIED THE PRESENT Comprehensive National Cybersecurity Initiative Initiative #8, Expand Cyber Education.
NSF Webinar Partnerships for Innovation Programs (Solicitation: NSF ) Karlene A. Hoo, Ph.D. Sara B. Nerlove, Ph.D. Program Directors Industrial Innovation.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
Bill Newhouse Two Government Cybersecurity Initiatives NIST.
David A. Brown Chief Information Security Officer State of Ohio
Brian Connett, LCDR, USN US NAVAL ACADEMY
` OEDIT Presentations December 8, Collaborative innovation is key for job creation and economic growth “Given the complexity of the problems and.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
UNCLASSIFIED Shaping the Future of Cybersecurity Education October 2010 NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Is N.I.C.E.
U.S. Science Policy Cheryl L. Eavey, Program Director
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
External Reports Overview Presentation for the ENG Advisory Committee By Michael Reischman Deputy Assistant Director for Engineering.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Health IT Standards Committee Federal Health IT Strategic Plan December 10, 2014 Seth Pazinski Director, Office of Planning, Evaluation, and.
Consumer Work Group Presentation Federal Health IT Strategic Plan January 9, 2015 Gretchen Wyatt Office of Planning, Evaluation, and Analysis.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Harnessing the Power of Digital Data for Science and Society Chuck Romine (NIST), Co-chair Interagency Working.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Entrepreneurship in Missouri  Business Recruitment  Business Expansion  Entrepreneurism/New Business Formation Strategies for Economic Development.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Information Sharing Challenges, Trends and Opportunities
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
AFCEA Homeland Security Conference An Overview of DHS Acquisition 25 February 2010 Rick Gunderson Acting Chief Procurement Officer.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
INSTITUTIONS & U.S. Science and Technology Policy April 8, 2003 PAF591 - U.S. S&T Policy.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
US Department of Labor Employment and Training Administration (ETA) Partnering for Effective Business Engagement Heather Graham Director of Special Initiatives.
 Create a budget  Deliver the State of the Union  Enforce laws  Create a budget  Deliver the State of the Union  Enforce laws Responsibilities of.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
CACE Standing Curriculum Meeting CACE Standing Curriculum Meeting.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
NITRD Networking and Information Technology Research and Development Program 19 March 2009.
Moving Toward Self-Sufficiency ________________________________________________________________ Preparing Mississippi’s Workforce Presentation for Reaching.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
NITRD Networking and ITRD IT R&D CIC computing, info and comm HPCC and communication HPC high-performance computing George O. Strawn NITRD co-chair and.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
1 American Competitiveness Initiative John H. Marburger, III President’s Council of Advisors on Science and Technology March 28, 2006.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Existing Programs to support development of micro-enterprise for informal economy workers and other poverty reduction programs 16 March 2012 Banyan tree.
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Information Security Program
South Big Data Innovation Hub
Higher Education’s Role in the Identity Ecosystem
U. S. Department of Homeland Security. Office for Civil Rights
8 Building Blocks of National Cyber Strategies
Community of Users.
Presentation transcript:

WEIS 2011 Workshop on the Economics of Information Security Chris Greer Assistant Director for Information Technology R&D White House Office of Science & Technology Policy June 14, 2011

America's economic prosperity in the 21st century will depend on cybersecurity - President Obama, May 2009

Invest in the Building Blocks of American Innovation Educate Americans with 21 st century skills and create a world-class workforce Build a leading physical infrastructure Strengthen and broaden American leadership in fundamental research Develop an advanced information technology ecosystem Catalyze Breakthroughs for National Priorities Unleash a clean energy revolution Accelerate biotechnology, nanotechnology, and advanced manufacturing Develop breakthroughs in space applications Drive breakthroughs in health care technology Create a quantum leap in educational technologies Promote Market-Based Innovation Accelerate business innovation with the R&E tax credit Promote investments in ingenuity through effective intellectual property policy Encourage high-growth and innovation-based entrepreneurship Promote innovative, open, and competitive markets Source: President’s Strategy for American Innovation

Invest in the Building Blocks of American Innovation Strengthen and broaden American leadership in fundamental research Develop an advanced information technology ecosystem Catalyze Breakthroughs for National Priorities Unleash a clean energy revolution Accelerate biotechnology, nanotechnology, and advanced manufacturing Develop breakthroughs in space applications Drive breakthroughs in health care technology Create a quantum leap in educational technologies Promote Market-Based Innovation Accelerate business innovation with the R&E tax credit Promote investments in ingenuity through effective intellectual property policy Encourage high-growth and innovation-based entrepreneurship Promote innovative, open, and competitive markets Source: President’s Strategy for American Innovation

Invest in the Building Blocks of American Innovation Strengthen and broaden American leadership in fundamental research Develop an advanced information technology ecosystem Source: President’s Strategy for American Innovation Comprehensive Cybersecurity Framework Trustworthy Cyberspace: Strategic Plan for Federal R&D Trustworthy Cyberspace: Strategic Plan for Federal R&D International Strategy for Cyberspace International Strategy for Cyberspace Administration Proposal for Cybersecurity Legislation National Strategy for Trusted Identities in Cyberspace National Initiative for Cybersecurity Education

President’s Cyberspace Policy Review May 2009 Themes:  Lead from the top  Build capacity for a digital nation  Share responsibility for cybersecurity  Create effective information sharing and incident response  Encourage Innovation

President’s Cyberspace Policy Review May 2009 Themes:  Lead from the top  Build capacity for a digital nation  Share responsibility for cybersecurity  Create effective information sharing and incident response  Encourage Innovation

International Strategy for Cyberspace

“Cyberspace, and the technologies that enable it, allow people of every nationality, race, faith, and point of view to communicate, cooperate, and prosper like never before.” President Obama May

The United States will work internationally to promote an open, interoperable, secure, and reliable cyberspace that supports international trade and commerce, strengthens international security, and fosters free expression and innovation. Our Goal

The cyberspace environment that we seek:  rewards innovation and empowers entrepreneurs;  connects individuals and strengthens communities;  builds better governments and expands accountability;  safeguards fundamental freedoms and enhances personal privacy; and  builds understanding, clarifies norms of behavior, and enhances national and international security.

 Upholding Fundamental Freedoms  Respect for Property  Valuing Privacy  Protection from Crime  Right of Self-Defense  Global Interoperability  Network Stability  Reliable Access  Multi-stakeholder Governance  Cybersecurity Due Diligence Norms of Responsible Behavior

 Upholding Fundamental Freedoms  Respect for Property  Valuing Privacy  Protection from Crime  Right of Self-Defense  Global Interoperability  Network Stability  Reliable Access  Multi-stakeholder Governance  Cybersecurity Due Diligence Norms of Responsible Behavior

Administration Proposal for Cybersecurity Legislation

The Administration should partner appropriately with Congress to ensure adequate law, policies, and resources are available to support the U.S. cybersecurity-related missions. President’s Cyberspace Policy Review May 2009

President’s Cyberspace Policy Review May 2009 Themes:  Lead from the top  Build capacity for a digital nation  Share responsibility for cybersecurity  Create effective information sharing and incident response  Encourage Innovation

 the American people;  our Nation’s critical infrastructure;  federal government networks and systems; and The proposal helps protect:  Privacy and civil liberties.

Protecting the American People  National Data Breach Reporting  Penalties for Cyber Criminals

Protecting our Nation’s Critical Infrastructure  Voluntary government assistance to industry, states, and local government  Voluntary information sharing with DHS  Critical infrastructure cybersecurity plans

Protecting Federal Computers & Networks  Management – FISMA update and roles  Personnel – Hiring authorities and exchange  Intrusion Prevention Systems – EINSTEIN  Data Centers – Promoting cloud innovation

Protecting Privacy and Civil Liberties  Privacy and civil liberties expert review and Attorney General (AG) approval  Limitation to cybersecurity threats and criminal law enforcement with AG review  Threat information shared without unrelated identifying information  Layered oversight programs and Congressional reporting

National Initiative for Cybersecurity Education NICE

President’s Cyberspace Policy Review May 2009 Themes:  Lead from the top  Build capacity for a digital nation  Share responsibility for cybersecurity  Create effective information sharing and incident response  Encourage Innovation

NICE Website:

Building Capacity for a Digital Nation  Increase public awareness  Enhance formal cybersecurity education  Expand, define, and train a world-class cybersecurity workforce

Cybersecurity Pipeline

National Cybersecurity Awareness  Lead: Department of Homeland Security (DHS)  Public service campaigns and awareness activities year round Formal Cybersecurity Education  Leads: Department of Education (ED), National Science Foundation (NSF)  Co-Leads: Department of Labor (DOL), DHS  STEM and cybersecurity education programs in accredited settings NICE Components

Cybersecurity Workforce Structure  Overall Lead: Department of Homeland Security (DHS)  Federal Workforce – Office of Personnel Management  Government Workforce (non-Federal) – DHS  Private Sector Workforce – Dept. Labor, National Institute of Standards and Technology Cybersecurity Workforce Training and Professional Development  Tri-Leads: Department of Defense (DoD), Office of the Director of National Intelligence (ODNI), Department of Homeland Security (DHS) Tri-Leads:  General IT Use – Federal Chief Information Officer Council and DHSIT  Infrastructure, Operations, Maintenance & Information Assurance – DoD, DHS  Domestic Law Enforcement and Counterintelligence – Department of Defense Cyber Crime Center (DC3), National Counterintelligence Executive (NCIX), Department of Justice, and DHS  Specialized Cybersecurity Operations - NSA NICE Components

National Initiative for Trusted Identities in Cyberspace NSTIC

President’s Cyberspace Policy Review May 2009 Themes:  Lead from the top  Build capacity for a digital nation  Share responsibility for cybersecurity  Create effective information sharing and incident response  Encourage Innovation

NSTIC Website:

 Passwords are inconvenient and insecure  Individuals are unable to prove their true identity online for significant transactions NSTIC Focus - Two Central Problems:

 Identity theft is costly, inconvenient and all-too common  Phishing continues to rise, with attacks becoming more sophisticated  Managing multiple passwords is expensive  Passwords are failing  Maintenance of multiple accounts is increasing as more services move online

Characteristics of the Identity Ecosystem  Led by the private sector  Allows consumers who want to participate to: o obtain a single digital credential for wide use o choose among a diverse market of credential providers o use their credential when needed and remain anonymous when desired  Enhances privacy through: o “need-to-know” restrictions o reduced identity theft o reduced instances of sensitive information sharing

Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program

President’s Cyberspace Policy Review May 2009 Themes:  Lead from the top  Build capacity for a digital nation  Share responsibility for cybersecurity  Create effective information sharing and incident response  Encourage Innovation

Encouraging Innovation Provide a framework for research and development strategies that focus on game-changing technologies that will help meet infrastructure objectives, building on the existing NITRD strategies …

 NITRD: Networking and Information Technology Research and Development Program o CSIA: Cyber Security and Information Assurance Working Group o SSG: Senior Steering Group for Cybersecurity  SCORE: Special Cyber Operations Research and Engineering Interagency Coordination

 Near Horizon o Moving Target Defense o Tailored Trustworthy Spaces o Cyber Economic Incentives o Designed-in Security  Over the Horizon o Science of Cybersecurity  Research for Results o Translation to practice Strategy Overview

 Near Horizon o Moving Target Defense o Tailored Trustworthy Spaces o Cyber Economic Incentives o Designed-in Security  Over the Horizon o Science of Cybersecurity  Research for Results o Translation to practice Strategy Overview

Cyber Economic Incentives - Examples  Economics of legislation and policy choices – Immunity, liability, safe harbor, incentives, material disclosure, audit and assessment  Cyber insurance – Actuarial analysis, quantitative risk assessment, moral hazard, catastrophic and interdependent risks, risk pooling  Market factors – Valuation, cost/benefit analyses, technology risk, standards and innovation, awareness, intellectual arbitrage, risk decision-making, criminal markets

Invest in the Building Blocks of American Innovation Strengthen and broaden American leadership in fundamental research Develop an advanced information technology ecosystem Source: President’s Strategy for American Innovation Comprehensive Cybersecurity Framework Trustworthy Cyberspace: Strategic Plan for Federal R&D Trustworthy Cyberspace: Strategic Plan for Federal R&D International Strategy for Cyberspace International Strategy for Cyberspace Administration Proposal for Cybersecurity Legislation National Strategy for Trusted Identities in Cyberspace National Initiative for Cybersecurity Education

Contact: Additional Information: