DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

SCADA Security, DNS Phishing
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
Information Warfare Theory of Information Warfare
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Network Security of The United States of America By: Jeffery T. Pelletier.
Cyber-Warfare: The Future is Now!
China Hacks Pentagon Computers September 3 rd, 2007.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
Maritime Cyber Risks – What is real, what is fiction?
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Cyber-Attack On Department Of Defense. Overview Washington has reported that there has been a widespread attack on Defense Department computers that may.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Cyber Threats Scenarios and Defense Model Principles ASSOCHAM Cyber Security Conference April 2011 Presented by Dr. Nimrod Kozlovski, Chairman,
Information Warfare Playgrounds to Battlegrounds.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Understanding the Threats of and Defenses Against Cyber Warfare.
Hurdles in implementation of cyber security in India.
Advanced Persistent Threats (APT) Sasha Browning.
CYBER WARFARE What is it and what does the future hold?
Information Warfare Playgrounds to Battlegrounds.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Security Mindset Lesson Introduction Why is cyber security important?
China: Five Years and Beyond in Space Space is the “focal point for advanced Science and Technology” Drives economic development and military power Outer.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
Chapter 17: Foreign Policy and National Defense Section 2.
How to Make Cyber Threat Intelligence Actionable
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Proactive Incident Response
Industrial Control System Cybersecurity
Nation State Actors Lex Dunlap.
International Conflict & Cyber Security
The Economics of Cyber Security
Stuxnet By Shane Serafin.
“Existing world order is being redefined.” Henry Kissinger Jan 2015
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Security Risk Profiles – Tips and Tricks
Today’s Risk. Today’s Solutions. Cyber security and
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Four Generations of Security Devices Putting IDS in Context
Evolution Of Cybersecurity
CRITICAL INFRASTRUCTURE CYBERSECURITY
Assessing Deterrence Options for Cyberweapons
LO1 - Know about aspects of cyber security
Presentation transcript:

DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas

Objective The threat landscape A closer look at China Lessons learned Demystify the Cyber Realm so that we can understand it and then do something about it.

Threat landscape new pieces of malware are discovered... of fortune 500 companies have admitted they've been hacked of malicious hacks are for financial gain.

Threat landscape Internet of things Using internet enabled devices to operate our world. Shift from using the internet to communicate. With 40 billion new devices connecting to the internet in the next 5 years, devices will be communicating with themselves. Allows hackers to penetrate further into our lives.

Threat landscape Cyberspace, a Military Zone? 100 governments have created military units to fight and win cyber wars STUXNET Computer worm designed to attack programmable logic controllers Reportedly ruined almost one-fifth of Iran's nuclear centrifuges WIPER: Two destructive threads Overwrites data Interrupts execution processes

China along with ‘one or two’ other countries had the capability to successfully launch a cyber attack that could shut down the electric grid in parts of the United States. U.S. adversaries are performing electronic ‘reconnaissance,’ on a regular basis so that they can be in a position to attack the industrial control systems that run everything from chemical facilities to water treatment plants. —November 20, 2014 – Admiral Michael Rogers, Director National Security Agency (NSA) NSA Director: China can damage US power grid

People’s Liberation Army, Unit May 2014: U.S. Justice Department indicted five members of the People’s Liberation Army (PLA) General Staff Department (GSD), Unit This unit was "assigned" to deploy a widespread spear-phishing (or "spearfishing") campaign to allegedly hack into leading US companies Unit requires its personnel to be trained in computer security and computer network operations and also requires its personnel to be proficient in the English language

People’s Liberation Army, Unit Unit is partially situated on Datong Road ( 大同路 ) in Gaoqiaozhen ( 高桥镇 ), which is located in the Pudong New Area ( 浦东新区 ) of Shanghai ( 上海 ). The central building in this compound is a 130,663 square foot facility that is 12 stories high and was built in early 2007.

People’s Liberation Army, Unit Since 2006, Mandiant has observed Unit compromise 141 companies spanning 20 major industries. Unit maintained access to victim networks for an average of 356 days. The longest time period Unit maintained access to a victim’s network was 1,764 days, or four years and ten months. Of the 141 APT1 victims, 87% of them are headquartered in countries where English is the native language. The industries APT1 targets match industries that China has identified as strategic to their growth, including four of the seven strategic emerging industries that China identified in its 12th Five Year Plan. WHAT DOES THIS INFER?

PLA GSD third department Located in Xianghongxi community in the western hills of Beijing‘s Haidian District. Manages a vast communications intercept infrastructure and cyber surveillance system. Targets foreign diplomatic communications, military activity, economic entities, public education institutions, and individuals of interest. Responsible for PLA Computer Network Defense (CND).

Lessons learned 1.Traditional Detection and Incident Response Methods are Proving Ineffective Organizations cannot stop every attack What have we learned from 9/11? What do examples like Target, Home Depot, and Ferguson MO teach us? Must be able to maneuver through the attacks 2.We are now operating in a Military Domain Texas Is and Will be a target, must change the Culture of Blame Network Defense is Two-Fold: First line of Defense is focused on Deterrence Second line of Defense is focused on Incident Response Change from Remediation to Investigation Who, What, When, Where, and WHY?