Why TRUST? Why this team? Ken Birman TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.

Slides:



Advertisements
Similar presentations
Localizing and Strengthening Internet Policy and Governance A proposal for regional capacity building workshops.
Advertisements

Bringing All of Alameda Excellence and Equity Through New Programs in Career Technical Education Sean McPhetridge, AUSD Director of ROP and Post-Secondary.
USING BROADBAND TO TRANSFORM THE WORLD NEED FOR JOINT EFFORTS ITU FORUM KIGALI, 9-11 May 2012 & Dr. Speranza Ndege Director, Open, Distance & e-Learning,
Maines Sustainability Solutions Initiative (SSI) Focuses on research of the coupled dynamics of social- ecological systems (SES) and the translation of.
Or: Another Tool For Brainstorming. The students will use a graphic organizer to plan an essay The students will use the information from the graphic.
 Truths About Change  Work Smarter, Not Harder  Lean Processing  Wants and Needs  How do we begin?
Top Tips on Funding Bids Maximizing your organisation’s chances.
DOE Cybersecurity Grassroots Roundtable: Scientific Evaluation Ingredients for Presentation to DOE/Laboratory Management Jackson Mayo February 24, 2010.
Enterprise Architectures
1 AEP Perspectives on Development and Commercialization of CCS Technology for Natural Gas Power Generation Matt Usher, P.E. Director – New Technology Development.
Public Affordable Housing and Community Training (PAHCT) Engagement Study High-Level Findings Report.
A post recession management strategy Peter Scott PETER SCOTT CONSULTING
Spatial Decisions INNOVATING GEOSPATIAL INTELLIGENCE PLENARY II 17 September GIS Asia. Hanoi Kapil Chaudhery Spatial Decisions.
Careers in CS & Engineering. CS & Engineering careers are not all this….
SPA Control A systematic process to manage the SPA process JIGSAW SYSTEMS INC.
BETTER LIFE SOLUTIONS is an unmatched unique business opportunity for every individual. Its opportunity has been created for the uncommon people to.
Software Fundamentals Done by Shakila Sattar. Scenario and the Main Stakeholders Everybody now-a-days are linked to internet either for their work purpose.
ADDING VALUE - BRINGING VALUE A Presentation from RD and D Sales Engineering.
IT Job Roles Task 20. Software Engineer Job Description Software engineers are responsible for creating and maintaining software of various different.
Westpac Banking Corporation ABN NEEOPA FORUM OCTOBER 2013 MAINSTREAMING FLEXIBILITY AT WESTPAC GROUP.
California Common Operating Picture (Cal COP) for Public Safety
Technology Innovation Centres (TICs): Background Duncan Bremner.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
[Name / Title] [Date] Effective Threat Protection Strategies.
Introduction A GENERAL OVERVIEW OF THE WCD FINDINGS, RECOMMENDATIONS & APPLICATION Alex Muhweezi & Chihenyo Mvoyi IUCN Uganda Country Office.
The Common Core Curriculum By Dean Berry, Ed. D. Gregg Berry, B.A.
TEN STEPS TO WRITING A SUCCESSFUL OPINION COMPOSITION
our digital memory accessible tomorrow A future with no history meets a history with no future: perspectives on how much we should know.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
A presentation of key findings from a national survey of 800 registered voters conducted September 10-12, 2007.
How to Franchise Your Business Speaker: Tony Fitzpatrick Managing Partner
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Please sit so you can talk in small groups. Whose side are you on: Balancing the interests of different partners within professional experience. Helen.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
APPROACH AND CONTACT (STEP 2 OF THE SYSTEM MANUAL)
Planning for Extraordinary Change for Business Catawba County Chamber of Commerce October 2, 2009.
Calumet County Government Strategic Plan Voting results of Vision, mission, values, and strategic directions September 30, 2009.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
TRANSFORMING U.S. INVENTION INTO INNOVATION Bridging the Commercialization Gap at U.S. Universities and Federal Research Institutions Presentation to Boston.
ONC’s Proposed Strategy on Governance for the Nationwide Health Information Network Following Public Comments on RFI HIT Standards Committee Meeting September.
Problem Solving. Problem Solving – An Approach Fraser Shaw Consulting, 1990.
Leading an Innovation-driven Organization Sanjay Nayak CEO & MD.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Emergency Preparedness Planning: Middle East January 9 th -11 th.
Leaders in the Making Teamwork – Lesson 14 Competent.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
TRUST September 13, 2004 NSF STC Review TRUST:Team for Research in Ubiquitous Secure Technologies Developing Human Resources Connections to the Critical.
1. Why do we need to change the way we generate energy? In 2005 the UK generated 70% of its energy from coal, oil and gas.
Example Commentary Report Research results Big Data Analytics - the extent of deployment and the accuracy of the insight 1.
BEHAVIORAL INTERVIEWS
Hurricanes, Earthquakes, and Threat Intelligence
“Self-Sustaining Innovation Ecosystems for European Leadership”
Enterprise risk management
ASSET - Automotive Software cyber SEcuriTy
TRUST:Team for Research in Ubiquitous Secure Technologies
COLLABORATIVE SECURITY An approach to tackling Internet
Metro-North Railroad Strategic Plan
Big Data, Education, and Society
CREATING A CULTURE FOR SUCCESSFUL CLIENT TRANSITIONS
TRUST:Team for Research in Ubiquitous Secure Technologies
CRITICAL INFRASTRUCTURE CYBERSECURITY
TRUST:Team for Research in Ubiquitous Secure Technologies
Considerations in Development of the SBSTA Five Year Programme of Work on Adaptation Thank Mr. Chairman. Canada appreciates this opportunity to share.
Maintaining order and safety in a city is no small task
Problem solving and decision making
PD Goals Program Overview December, 2012
PD Goals Program Overview December, 2012
Presentation transcript:

Why TRUST? Why this team? Ken Birman TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review

Why should NSF do TRUST Arguments against? –NSF presumably gets many strong STC proposals –The country has fretted about cybersecurity for ages, yet has never had an actual “Internet 9/11” –Maybe a nationwide multi-participant center is more than we need. Perhaps just one or two small centers, or per-industry centers would do the job just as well (and cheaper!) TRUST September 13th 2004 NSF STC Review 2

The 9/11 Analogy In fact, for at least a decade the US intelligence community warned about the emergence of small, religiously-motivated, terrorist organizations –We knew we were being complacent –The fact is that 9/11 was predicted, many times, by many teams. Even the details were among scenarios that had been floated Are we in the same situation on TRUST? TRUST September 13th 2004 NSF STC Review 3

The mundane threat Actually, terrorists are just part of the story Consider the 2003 East Coast blackout –Tremendous economic cost –Many lives lost Bottom line: if the industry had better technologies to monitor and control the grid, it wouldn’t have happened! TRUST September 13th 2004 NSF STC Review 4

2004 GAO Report to Congress Finds a serious (and growing) threat –Explosion of critical infrastructure dependence on cyber solutions, standard platforms –Exposures up and down the stack, to disruptions of every imaginable kind –Growing range of concerns (accident, malicious insider, intruders of other kinds, terrorists) We’ve been trying to respond for years. And yet we seem to be losing ground! TRUST September 13th 2004 NSF STC Review 5

A parable Ken’s neighbor’s house was in a gully Flash flood threatened the house last week –We rushed to sandbag the local creek –Raging waters, huge logs rocketing past… And then someone discovered that a half mile up the hill, a different creek had become dammed and overflowed its banks We tackled that dam… and the downstream problem was quickly under control TRUST September 13th 2004 NSF STC Review 6

TRUST is an upstream solution The GAO cites TRUST (uniquely so) in its “what can we do?” discussion (p. 117) By tackling the cybersecurity challenge in a top- rate national undertaking, we’ll –Solve the core technical problems, show industry how to embed solutions in their platforms –Educate new generations of students both ourselves, and by showing how to do so –Help the guys in the trench with their problems The alternative is a thousand “ad hoc” patches TRUST September 13th 2004 NSF STC Review 7

Where are we going wrong? The real issue is the tendency of industry to bet on standards that enshrine mediocre decisions –Researchers need to focus on high-value opportunities – such high value that industry will clamor for them –They must demonstrate real innovation in thinking –Close the gap by showing that our innovations can co- exist with standard platforms –And help critical infrastructure stake-holders that our solutions can change their lives Ultimately, we need a sea change in the way reliability and security are taught and perceived TRUST September 13th 2004 NSF STC Review 8

A “dream team” The United States couldn’t assemble a better team if it hand-picked the players –We already include many of the most visible researchers in the field (and were limited by money: with more funds we’ll expand to include more players) –We’re geographically (and otherwise) diverse –And we have the depth and breadth to tackle the problem more broadly than any previous effort in the history of computing TRUST September 13th 2004 NSF STC Review 9

The questions to ask Does the nation face a serious problem? –The GAO report is just the latest in a long series Can we do anything about it? –We think we can win this battle. But it will take a concerted national response. –We have great ideas that can change the game –TRUST is a unique response to a pressing issue Does this outweigh other NSF priorities? –We need your help to make that case! TRUST September 13th 2004 NSF STC Review 10