Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI.

Slides:



Advertisements
Similar presentations
Balancing Cybersecurity and Trade
Advertisements

Scenario 2: Safety Critical Instruments. Threats/Risk Analysis o All the usual grid problems o Greater risk of overlapping resource usage o Risk of confidentiality.
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
2014 Key Issues – National Security John C. Rose Deputy Director, Public Policy Region 6 Chair, National Security Sub-Committee.
BRAC: GETTING THE NEXT ROUND RIGHT BASE REDEVELOPMENT FORUM NOVEMBER 2014.
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
DHS, National Cyber Security Division Overview
South Carolina Cyber.
Information Security Policies Larry Conrad September 29, 2009.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Integrated Pest Management Symposium Progress and Challenges With Integrating UAS Into the National Airspace System Robin Koch Program Director, Aviation.
(Geneva, Switzerland, September 2014)
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
The Issue of Technology Readiness Level One of the current issues being discussed by the Department of Energy’s Technology Transfer Working Group is the.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
© 2014 WESTERN DIGITAL CORP. ALL RIGHTS RESERVED. Company Confidential Legislative & Regulatory Activities Involving Cyber Security Bob Bowen May 2015.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Chapter Fifteen The Bureaucracy. Copyright © Houghton Mifflin Company. All rights reserved.14 | 2 Proxy Government “Government by proxy”--refers to the.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Page 1 NIGERIA REPORT Presented at World Bank South-South Learning Visit to India Friday February 20, 2009.
Clean, Green, and on the Same Team! How Economic and Workforce Development are Partnering to Serve an Emerging Regional Industry.
Association of Defense Communities June 23, 2015
Information Sharing Challenges, Trends and Opportunities
Webinar. Vice President, Government and Industry Affairs Your Hosts Kristen Moore Director, Legislative Affairs.
11 Aeronautical Information Exchange Model (AIXM) / Weather Information Exchange Model (WXXM) Conference Addressing the NextGen Challenge Charles A. Leader.
The Next Generation of Workforce Development Policy: Connecting Workforce and Economic Development Martin Simon Director, Workforce and Economic Development.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
2 2 Eleanor Spector Vice President, Contracts Lockheed Martin Corporation August 5, :30-10:15AM Industry Acquisition Issues.
Creating an Insider Threat Program.
Joint Planning and Development Office (JPDO) Col Mark Weadon Air Force Weather Deputy for Federal Programs May 17 th,
Accelerating Adoption of Sector Strategies A State Policy Development Assistance Project Funded by The Ford and C. S. Mott Foundations February 24, 2006.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
Enterprise Cybersecurity Strategy
Business Retention and Expansion What it is Why it is important How it works What makes it successful Business Retention and Expansion.
SPACE Act of 2015 Dr. Sarah J. Nilsson, Esq. A 3 ir Conference January 2016.
REPUBLIC OF MACEDONIA STATUS REPORT ON MEETING THE COMMITMENTS OF THE ATHENS MOU SEEERF IV PERMANENT HIGH LEVEL GROUP MEETING Athens, Greece September.
Chapter 17: Foreign Policy and National Defense Section 2.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
 Cooperation and information exchange amongst financial supervisors and regulators are essential for effective oversight in an integrated financial system.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
THE ROLE OF NON CUSTOMS AGENCIES IN A FULLY FLEDGED CUSTOMS UNION, EAC FORUM ON CUSTOMS UNION By Dr. Terry Kahuma, Executive Director, UNBS.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Department of Energy Energy Agency Reorganization Plan Little Hoover Commission Hearing on Governor Schwarzenegger’s Plan to Establish a Department of.
ACTE National Policy Seminar March 3, 2014 Washington, DC Policy Breakout Session: Workforce Investment Act (WIA)
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Law Firm Data Security: What In-house Counsel Need to Know
What is Happening in Washington?
2016 Cybersecurity Law If any one of these describes your company
Cyber attacks are increasing in number and severity every day…
California Cybersecurity Integration Center (Cal-CSIC)
Annual Plan Earlier this week, the SNA Board reviewed the progress we have made to date on the new Strategic Plan that was introduced last year.
Security challenges in the Balkans
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
U. S. Department of Homeland Security. Office for Civil Rights
Cybersecurity compliance for attorneys
The CISOs Role in Shaping Public Policy
Presentation transcript:

Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI

A CCELERATING THE I NTEGRATION OF UAV/UAS INTO THE N ATIONAL A IR S PACE (NAS) Drones doesnt = FAA Schedule RFP out 2012; first operational January 2013 Civilian Applications Teal: $89B worldwide UAV Market FAA Certificate Of Authorization

3 The FAA, in partnership with NASA and private industry should immediately accelerate efforts for established requirements and the development of technology to safely and adequately address sense and avoid concerns. The 2015 date for the development of an integration plan should be accelerated to avoid possible stagnation in the industry due to an inability for the technology to be utilized in the US NAS. A more robust and permanent certification process for domestic UAV/UAS use, that avoids the case by case review, must be established to support the momentum of increased usage. The FAA, along with operators, should establish a Code of Ethics and policies regarding the collection, storage, and dissemination of data collected by the operators. As required by the 2012 FAA Reauthorization Act, the FAA needs to issue, as soon as possible, the RFP for the six (6) test sites that will study UAV integration into the NAS. A CCELERATING THE I NTEGRATION OF UAV/UAS INTO THE N ATIONAL A IR S PACE (NAS)

W HY A R OBUST AND I NTEGRATED C YBERSECURITY P OLICY IS O NE OF O UR T OP N ATIONAL S ECURITY P RIORITIES America must also face the rapidly growing threat from cyber-attacks... Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy. Thats why, earlier today, I signed a new executive order that will strengthen our cyber defenses by increasing information sharing, and developing standards to protect our national security, our jobs, and our privacy. Now, Congress must act as well, by passing legislation to give our government a greater capacity to secure our networks and deter attacks State of the Union Address- The order, which does not have the same force as law, directs federal authorities to improve information sharing on cyber threats including some that may be classified with companies that provide or support critical infrastructure.

5 Congress needs to immediately pass the Cybersecurity Act of Both houses of congress need to work with opponents to find common ground on which to get the act passed. Until its passage, key parts of the US cybersecurity policy will be held in limbo. Past GAO report recommendations that highlight areas at risk in both USG networks and vulnerabilities in the critical infrastructure are still not fully implemented. All major federal agencies should immediately address noted weaknesses in their critical systems. Congress should work to consolidate cybersecurity policy and resources around a single USG agency that can best execute the mandate. Competing policy and funding requests will result in fragmented and counter-productive efforts amongst a variety of agencies. Congress needs to realize that multiple agencies will be competing for adequately trained and experienced cyber personnel from the same pool, likely resulting in shortages. Congress should work to create STEM minded, but cyber focused, programs that will allow for the right sized workforce to be developed. Congress should direct the FAA to verify and provide a report to Congress that the Next Generation Air Traffic Management systems (NextGen) is taking all necessary and conceivable steps to safeguard its system from DDOS and all other types of cyber attacks. The Senate should move to finalize its version of HR 3523 Cyber Intelligence Sharing and Protection Act and bring it up for immediate vote and passage as was done in the House. Recommendations: W HY A R OBUST AND I NTEGRATED C YBERSECURITY P OLICY IS O NE OF O UR T OP N ATIONAL S ECURITY P RIORITIES