STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

Incident Response Managing Security at Microsoft Published: April 2004.
1 Protecting the Long Island Business Community A Public Safety Partnership.
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
Defence and Cyber Growing Threats - Changing Security Models The Need for a Change in Mindset ? The Kokoda Foundation Cyber Security Study
South Carolina Cyber.
Cyber Principles November 2010 Bob Gourley. The 12 Principles of Cyber Conflict 1. Know the enemy: Bad actors in the world are bad actors in cyberspace.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Storage Security and Management: Security Framework
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Study Results Advanced Persistent Threat Awareness.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
Summer,
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Wrap-up. Goals Have fun! Teach you about Cyber Defense so that you can: –Interest your students in Cyber Defense –Teach your students about Cyber Defense.
By Jim White WiredCity, Div. of OSIsoft Copyright c 2004 OSIsoft Inc. All rights reserved. Cyber Security Tools.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Systematic Survey of Self-Protecting Software Systems
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
NTT Com Security - Welcome to the “Attack Detection & Incident Response” Security Brunch Tom Hager Country Manager.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Security ROI and Conclusions Cisco commissioned custom research project.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Overview of Network Security. Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole.
Paul Beraud, Alen Cruz, Suzanne Hassell, Juan Sandoval, Jeffrey J Wiley November 15 th, 2010 CRW’ : NETWORK MANEUVER COMMANDER – Resilient Cyber.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Coast Guard Cyber Command
How to Make Cyber Threat Intelligence Actionable
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Proactive Incident Response
Security Operations Update
Team 1 – Incident Response
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
DISA Global Operations
Advanced Threat Protection
Detection and Analysis of Threats to the Energy Sector (DATES)
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Cyber Security Fingerprint Secure systems, protect production
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Operational Cyber Warfare
JMU GenCyber Boot Camp Wrap up
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Information Operations Conditions (INFOCONs) In The Real World
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Cyber Security in a Risk Management Framework
Honeypots Visit for more Learning Resources 1.
Improving Data Security & Protection Using Data Provenance Figure 1
Presentation transcript:

STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224

Section 4: Future Threats and Cyber Security 18. National Cyber Defense Strategy, Pg. 224 A solid national cyber defense strategy must be based on the understanding that although risk can be minimized, the threat can never be completely eliminated. The attack surface will always be present no matter how many layers of defense one implements. Defense in depth in conjunction with situational awareness and active defense when properly implemented can take any nation from being reactive to proactive. Defense in depth is nothing but the active deployment of computer network defense (CND). According to the U.S. Joint Chiefs publication “Joint Pub 3-13, Information Operations,” CND involves actions taken via computer networks to protect, monitor, analyze, detect, and respond to network attacks, intrusions, disruptions, or other unauthorized actions that would compromise or cripple defense information systems and networks. According to the U.S. Department of Defense, defense depth is also “the sitting of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial observations of the whole position by the enemy, and to allow the commander to maneuver the reserve.”

Section 4: Future Threats and Cyber Security 18. National Cyber Defense Strategy, Pg. 224 Solid defense operating concepts in the cyber domain will take into consideration the fluid nature of cyberspace and keep up with its rapid pace of change. When speaking about defense, a phrase often heard from cyber security professionals is “in near-real time” or even defense “in real time.” What does it mean to be able to defend one's systems and data in real time? Is it even possible? Most cyber security vendors want potential clients to believe that such capabilities rest upon their technological solutions, when in reality the solution is a combination of technologies and human capabilities. The gap found in most cyber defense strategies is the lack of human capabilities, the lack of proper trained cyber security professionals, and the lack of SA. A current global trend is for cyber security professionals, so-called cyber warriors, to have their training focus on specific technologies, tools, and segmented methodologies that apply only to defensive matters. In the physical domain, soldiers are trained to both defend and attack; the same reality must be applied in cyberspace by training our cyber warriors to be battle focused.