Presentation is loading. Please wait.

Presentation is loading. Please wait.

DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North.

Similar presentations


Presentation on theme: "DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North."— Presentation transcript:

1 DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North Charleston, SC 29406 T: 843-576-1850 F: 843-576-1879 www.emergentcorporation.com

2 DKW Proprietary Information 2 Emergent Proprietary Information 2 Agenda  Introduction  Cyber Security  Cyber Warfare  Platforms  Conclusion

3 DKW Proprietary Information 3 Emergent Proprietary Information 3 Curtis Merriweather  Graduate of USC – 2003  BS in Computer Engineering  Government Tenure with SSC – 2004  Business Development, Dir. – 2010  President of Mid-Atlantic Region  2011 MBA candidate – The Citadel  Manage(d) a Cyber Security Portfolio

4 DKW Proprietary Information 4 Emergent Proprietary Information 4 Introduction  Founded in 2008 as a professional services firm  Cleared Facility and personnel  Composed of three primary Business Units  Research and Development  Information Technology  Intelligence Operations  8(a) pending

5 DKW Proprietary Information 5 Emergent Proprietary Information 5 Organization Intelligence Community, US Army Centers of Excellence Research & Development Intelligence Community, SPAWAR, US Army Information Technology Intelligence Community, SPAWAR, VA Senior VP, Operations Executive Vice President President/CEO Intelligence Operations

6 DKW Proprietary Information 6 Emergent Proprietary Information 6 Research & Development (R&D)  Innovating solutions with a cyber security focus.  Partnered with Academia  Supporting several federal agencies to solve NEW problems  Technology Transfer process

7 DKW Proprietary Information 7 Emergent Proprietary Information 7 Information Technology  Any-time, anywhere, ubiquitous access to information  Cyber Security  Computer Forensics  Media Exploitation  Computer Network  Attack  Defense  Exploit

8 DKW Proprietary Information 8 Emergent Proprietary Information 8 Intelligence Operations Emergent provides support in the following ways:  Collections  All-Source Analysis  CIDNE Operators and Managers  Collection Managers  HUMINT Analysis  SIGINT Analysis  Processing  Exploitation The maxim 'nothing avails but perfection' can be spelled 'paralysis' -- Winston Churchill

9 DKW Proprietary Information 9 Emergent Proprietary Information 9 Core Capabilities Customers Intelligence Community US Army SPAWARSYSCEN Services Provided Commercialization ATCD/JTCD Support Technology Transfer Services Provided Collections Processing Exploitation Customers Intelligence Community INSCOM Services Provided Tier 1 – Service/Help Desk Support Tier 2 – Technical Support Tier 3 – Network Engineering and IT System Support Services Provided Computer Forensics Computer Network Defense/ Attack/Exploit Media Exploitation NIST 800 Series Certification & Accreditation DITSCAP/DIACAP C&A Customers Intelligence Community SPAWARSYSCEN Charleston Customers Intelligence Community Services Provided Architecture Development – EA, Use Cases, etc.. Software Engineering and Development Web Portal Design, Implementation and Maintenance System Implementation, Training and Documentation Support Customers Intelligence Community US Coast Guard, Veteran Affairs Research & Development (R&D) Intelligence Operations Information Technology Management Cyber Security Application Development

10 DKW Proprietary Information 10 Emergent Proprietary Information 10 Cyber Security  Cyber Security - measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack  Cyber Security Standards – are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  ISA 99, NIST, etc..

11 DKW Proprietary Information 11 Emergent Proprietary Information 11 Cyber Warfare  "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption. – Richard A. Clark  “The Fifth Domain of warfare,“ – The Economist  The DoD has formally recognized cyberspace as a new domain in warfare... [which] has become just as critical to military operations as land, sea, air, and space.“ - Defense Secretary

12 DKW Proprietary Information 12 Emergent Proprietary Information 12 World Events  Adobe  Google  Intel  Juniper  Yahoo  Government Institutions  State Department, etc..

13 DKW Proprietary Information 13 Emergent Proprietary Information 13 Exploited Platforms  Computers  Mobile Phones  Android  IPhone  Blackberry  Satellite Systems  Social Networking  GPS Technologies  OnStar, ENav  Video Game Platforms – offensive and defensive

14 DKW Proprietary Information 14 Emergent Proprietary Information 14 Exploits  Bluetooth Hijacking  Brute Force Attack Methods  Software Exploits  War Driving  Wireless Exploits  Pushed Advertisements - Phones  Hotspots  Trojan/Virus Generators  Phishing Schemes

15 DKW Proprietary Information 15 Emergent Proprietary Information 15 Defensive Strategies  Increased Awareness  Common Defense Measures  Information Assurance  Patching  Secure Coding Methodologies - Developers  Software Updates  Active Defense Strategy  Cloudshield  IBM – Analytics Engine  Defense-in-Depth Strategy  Multi-Phase Authentication vs. Single Sign-On

16 DKW Proprietary Information 16 Emergent Proprietary Information 16 Situation Awareness – Defense Strategies  Honeypot Projects  Collection Agent  Hopefully uncover motives  Computer Forensics  Encase v.6  Log Collector  Media Exploitation  Specialized tools  DOMEX/MEDEX Experts

17 DKW Proprietary Information 17 Emergent Proprietary Information 17 Defensive Strategies  Certified Ethical Hackers (CEH)  White Hats  Complete Penetration Testing  Inside  Outside  Security Experts  Real World Experience  Certification Programs  Security+, CWSP, CISSP, etc…

18 DKW Proprietary Information 18 Emergent Proprietary Information 18 Partnerships  Academia  Government  Industry Industry and Academia have to lead the charge


Download ppt "DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North."

Similar presentations


Ads by Google