Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.

Slides:



Advertisements
Similar presentations
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Advertisements

State of play and activities in 2014 March 2014
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
Brian Connett, LCDR, USN US NAVAL ACADEMY
The U.S. Coast Guard’s Role in Cybersecurity
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
DHS, National Cyber Security Division Overview
Summary of “Challenges in International Cyber Security” NDU Conference Report Charles Barry Center for Technology and National Security Policy The National.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
South Carolina Cyber.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Advanced Systems and Concepts Office 20-Sep-15 What are National Security Threats? 2 nd Annual JTAC Workshop 4 April 2006 ASCO and DTRA Update and Welcome.
Managing Risks, Countering Threats: Protecting Critical National Infrastructure Against Terrorism Martin Rudner Canadian Centre of Intelligence and Security.
Results IGF African Survey United Nations Economic Commission for Africa (ECA)
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Information Warfare Playgrounds to Battlegrounds.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Warfare Case Study: Estonia
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Cyber Security Nevada Businesses Overview June, 2014.
Workshop Positions Data Collection /Assessment Thursday, June 2 nd How Can We Make “International Strategy for Cyberspace” Acceptable?
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Situation Critical: The War Room. Greetings delegates. It gives me great pleasure to welcome you all to India Calling I will be the director.
Economic growth Chapter 8 4/23/2017 4/23/
China’s Rise and Cyberspace: Strategic Challenges for the U.S. James Mulvenon, Ph.D. 10 September 2009.
Prague, April 16, 2009 Future-plating the new Framework: View from a European-born Internet success on making the most of the web 2.0/3.0 world of innovation.
THE REPUBLIC OF SLOVENIA MINISTRY OF HIGHER EDUCATION, SCIENCE AND TECHNOLOGY e: Kotnikova 38, 1000 Ljubljana p:
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
What is it the European Youth Forum? What do we do?
Larry Howard Sr. Research Scientist Eric Imsand 1, Larry Howard 2, Ken Pence 2, Mike Byers 3, Dipankar Dasgupta.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Work Group 3 Outbrief: (Governance Innovation for Security and Development) Peacekeeping and Stability Operations Training and Education Workshop 2014.
Information Warfare Playgrounds to Battlegrounds.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Chapter 17: Foreign Policy and National Defense Section 2.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
Coast Guard Cyber Command
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Information Management System Ali Saeed Khan 29 th April, 2016.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Maritime Security as an Integral Part of an
QUANTICO POTOMAC AFCEA
Cyber attacks are increasing in number and severity every day…
Homeland Security v. Homeland Defense: The Big Gap
(Discussion – The Department of Defense)
Forth International Forum
Information Operations Conditions (INFOCONs) In The Real World
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
WCIT12 Update Planning & International Relations Department
Director - Mr. Wayne Raabe
ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U
Presentation transcript:

Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network Warfare Center US European Command And Lockheed Martin &

All Statements Made in this Talk are Personal Opinion of the Author and Do Not Necessarily Represent the Views of the U.S. Government including U.S. European Command, or Lockheed Martin Corporation

This Workshop International Cyber Security Governance Policy, technology, human factors in cyber security Cyber warfare, intelligence, defense and preparedness Cyber risk assessment and reduction Cyber crime and other malicious activity

A Cyber Threat Assessment Gen. Alexander, USCYBERCOM Commander’s quote (see source below): – “The military simply lacks a common operational picture (situation awareness) of its network.. [and] our networks are not secure” Questions this Raises: – Does an adversary have inside awareness of US DOD networks? – How much critical top secret information has already been stolen? – How many “Bots” have been planted in our Government and Private Networks, that we are not aware of because they have not activated yet? – Do our adversaries have command and control “Bots” hidden in our networks? – What would our response be (Rules of Engagement) if networks attacked Source: speaks/#ixzz0rTYRzXPY Source: speaks/#ixzz0rTYRzXPY

The Threat: Perceived or Real? CCDCOE, George C. Marshall Center, Black Hat, DEFCOM etc & here are forums and resources to get the hard facts One talk at CCDCOE 2010 – Argument made that N. Korea Could Bring Down the US: Only needs 500 hackers and $46 million Needless to say this generated considerable debate and evidence for/against this argument – This talk by “Kim Jon-il (joke) and Charlie Miller titled How to Build a Cyber Army to Attack the US” – Kim Jon-il, N. Korea Supreme Commander: "The liquidation of colonialism is a trend of the times which no force can hold back.“ – Argument: Cyber threat is greatly exaggerated based on the data (probability), e.g. Bruce Schneier, BT, CCDCOE 2010 – Counter-Argument: fact remains that networks are not adequately secured and are being widely exploited as reported continuously by Governments, Industry ISPs, etc, in numerous publications and presentations, etc.

Example CCDCOE 2010 Talk Bryan Krekel & George Bakos of Northrup Grumman talk titled “Chinese Cyber Warfare and Computer Network Exploitation” – They cited 100 page report (I have not seen it) – If you don’t understand your adversary you can not do attribution – Need to know who is doing espionage They will not go away until you go away Need better network security and situation awareness We need the usual deterrence (to Cyber Warfare)

My View of US EUCOM Protection of U.S. Military Networks & Operations Military Support to NATO Cyber Security Focused on area of responsibility (AOR) – Cyber Security and Threat Deterrence – International and US Policy Making Support – Science and Technology Enablers Contribution to and Maintenance of International Law with NATO, and US Policy for Cyber Security and Privacy

Need Greater International Dialog The intent is to foster communication & cooperation between nation states for cyber security and stability (wishful thinking?) Venues include the George C. Marshall Center (with GMU CIP?) Cooperative Cyber Defense CoE (CCDCOE) International Cyber Center, GMU Others?

Cooperative Cyber Defense CoE

United Nations & Cyber Security? UN Plan to Expand Global Broadband Access UN Plan to Expand Global Broadband Access. “4 June – The United Nations telecommunications agency’s quadrennial development conference wrapped up today with participants adopting a plan of action to promote the global development of information and communication technology (ICT) networks and services.” Source

US Cyber Command Discussion of these issues in relation to – The recently formed US Cyber Command (CYBERCOM), a sub unified command under the US Strategic Command (STRATCOM) – CYBERCOM together with USEUCOM has the lead role of the US forces To protect networks and global stability To be adequately prepared for cyber defense, exploitation and attack, if needed to maintain peace AFCEA CYBERCOM Conference April 2010 Full Videos of Presentations (See next slide)

More Than Most Want to Know About USCYBERCOM Full Videos of Each AFCEA CYBERCOM Presentation

Global Cyber Security Imperative Obvious: A Common Goal of Peaceful Use of Internet by All and Global Stability of Internet – An analogy is the International Space Station – Especially important to have uniform cooperation of governments with international laws & enforcement Unlikely in our life-times (again my personal opinion) – Involves Embracing Academia & Industry Important to development of new, innovative technology to make our networks more secure International Conferences, Meetings, Workshops, like this Includes product developers and Internet Service Providers

Obvious Need to Bring Governments, Academia & Industry Together for Global Cyber Security: Our Imperative!

Some References bersecurity.html bersecurity.html

Questions & Comments?