National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

HR Manager – HR Business Partners Role Description
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
Transition Brand Messaging for Medtronic plc
Public Safety Communications Research Program A joint program between NIST’s Communications Technology Laboratory & NTIA’s Institute for Telecommunication.
Internet2, CENIC and Merit: Partnering to Deliver Cloud Services to California.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Executive Director, ICS April 30,
Techuk.org |#techuk Introducing techUK Volcrowe/ Nemode Workshop. 22/4/15.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
2014 CALTRANS DISTRICT 11 INNOVATION EXPO NOVEMBER 20, 2014 CEAL COMMITTEE PRESENTATION FEB. 11, 2015.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009.
365 IT CONSULTANCY AND PROJECTS PTY (LTD) 04 Smuts Park Corner Northey & Smuts Ave Witbank 1039 Phone: Fax:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Building National Cyberinfrastructure Alan Blatecky Office of Cyberinfrastructure EPSCoR Meeting May 21,
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Sapient Global Markets – Commodities Team Analytics, Advisory and Project Management.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Summary of the U.S. Task Force on United Way’s Economic Model & Growth.
Transition Brand Messaging for Medtronic plc. 2 | Medtronic Confidential Universal Messaging for Internal and External Audiences The foundation for all.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Brand Messaging February, 2015 Women’s Health Leadership TRUST.
Ecosystem approach to start and grow innovative technology companies Tony Bailetti, Ph.D. Carleton University Vitesse OTI August.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
ICAI International Conference 8 th January, 2012 Vision 2030.
COMMUNITY TECHNOLOGY ASSESSMENTS. WHY DO ASSESSMENTS? “The long term development of a community rests on its ability to uncover and build on the strengths.
SURFnet. We make innovation work0. 1 State-of-the-art Network IT InnovationLicensing.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Integral Health Solutions We make healthcare systems work in harmony.
Industry Outlook November Manufacturing Matters in Canada  A $620 billion industry  12% of GDP (18% in 2004)  1.7.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
The National Network Story March OUR STORY 1. The Challenge 2. The Solution 1. The Road Ahead.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
NIST Cyber-Physical Systems Public Working Group: Draft CPS Framework
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
A European Open Science Cloud
 TECHNOLOGIA is a startup company in Bangalore in 2007 which is completely owned by emirates telecommunication corporation- ETISALAT.  It has helped.
Simplifying IT, Empowering Business.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies NIST Industry Day February 10, 2016.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
AN OPPORTUNITY TO ENTER INTO A JOINT VENTURE PARTNERSHIP WITH NTIS FOR DATA INNOVATION NTIS Information Session Department of Commerce Auditorium and Webcast.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
The National Network Story March OUR STORY 1. The Challenge 2. The Solution 1. The Road Ahead.
Smart Cities: What’s in it for the consumer?
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
CONNECT: Sydney A New Platform for City Development
An Urgent National Imperative
Introduction to the Academic Health Science Network (AHSN NENC)
The People Ready Vision for Business in the Enterprise
INNOVATION SUPERCLUSTERS INITIATIVE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium November 2, 2015

2Welcome to the NCCoE STRATEGY GOAL 1 PROVIDE PRACTICAL CYBERSECURITY Help people secure their data and digital infrastructure by equipping them with practical ways to implement standards-based cybersecurity solutions that are modular, repeatable and scalable VISION ADVANCE CYBERSECURITY A secure cyber infrastructure that inspires technological innovation and fosters economic growth MISSION ACCELERATE ADOPTION OF SECURE TECHNOLOGIES Collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs GOAL 2 INCREASE RATE OF ADOPTION Enable companies to rapidly deploy commercially available cybersecurity technologies by reducing technological, educational and economic barriers to adoption GOAL 3 ACCELERATE INNOVATION Empower innovators to creatively address businesses’ most pressing cybersecurity challenges in a state-of-the-art, collaborative environment

3Welcome to the NCCoE PARTNERSHIPS Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the NCCoE meets businesses’ most pressing cybersecurity needs with reference designs that can be deployed rapidly. FOUNDATIONS NIST ITL The NCCoE is part of the NIST Information Technology Laboratory and operates in close collaboration with the Computer Security Division. As a part of the NIST family, the center has access to a foundation of prodigious expertise, resources, relationships and experience. NIST CYBERSECURITY THOUGHT LEADERSHIP Cryptography Identity management Key management Risk management Secure virtualization Software assurance Security automation Security for cloud and mobility Hardware roots of trust Vulnerability management Secure networking Usability and security

4Welcome to the NCCoE STAKEHOLDERS White House SPONSORS Advise and facilitate the center’s strategy TEAM MEMBERS Collaborate to build real-world cybersecurity capabilities for end users END USERS Work with center on use cases to address cybersecurity challenges National Institute of Standards and Technology U.S. Department of Commerce U.S. Congress Montgomery County State of Maryland NCCoE Tech firms AcademiaProject managers National Cybersecurity Excellence Partners (NCEP) IndustryGovernmentProject- specific collaborators Business sectors AcademiaCybersecurity IT community Government Systems integrators Individuals NIST ITL

5Welcome to the NCCoE TENETS Standards-based Apply relevant local, national and international standards to each security implementation and account for each sector’s individual needs; demonstrate reference designs for new standards Modular Develop reference designs with individual components that can be easily substituted with alternates that offer equivalent input-output specifications Usable Design usable blueprints that end users can easily and cost-effectively adopt and integrate into their businesses without disrupting day-to-day operations Repeatable Enable anyone to recreate the NCCoE builds and achieve the same results by providing a complete practice guide including a reference design, bill of materials, configuration files, relevant code, diagrams, tutorials and instructions Open and transparent Use open and transparent processes to complete work, and seek and incorporate public comments on NCCoE documentation, artifacts and results Commercially available Work with the technology community to identify commercially available products that can be brought together in reference designs to address challenges identified by industry

6Welcome to the NCCoE MODEL The NCCoE seeks problems that are: ‣ Broadly applicable across much of a sector, or across sectors ‣ Addressable through one or more reference designs built in our labs ‣ Complex enough that our reference designs will need to be based on the combination of multiple commercially available technologies Reference designs address: ‣ Sector-specific use cases that focus on a business-driven cybersecurity problem facing a particular sector (e.g., health care, energy, financial services) ‣ Technology-specific building blocks that cross sector boundaries (e.g., roots of trust in mobile devices, trusted cloud computing, software asset management, attribute based access control)

7Welcome to the NCCoE EXAMPLES OF UPCOMING CHALLENGES Sector Specific ‣ Healthcare – Wireless Infusion Pumps ‣ Energy – Cybersecurity situational awareness in IT/OT convergence ‣ Financial Services – Access rights management ‣ Consumer / Retail – point of sale security ‣ Transportation/maritime – applying the CSF to bulk liquid transport Technology-driven: ‣ Data integrity ‣ Using DNSSec to enable trustworthy ‣ Derived PIV Credentials ‣ Mobile device security

8Welcome to the NCCoE NATIONAL CYBERSECURITY EXCELLENCE PARTNERS

Gudelsky Drive Rockville, MD