Download presentation
Presentation is loading. Please wait.
1
DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North Charleston, SC 29406 T: 843-576-1850 F: 843-576-1879 www.emergentcorporation.com
2
DKW Proprietary Information 2 Emergent Proprietary Information 2 Agenda Introduction Cyber Security Cyber Warfare Platforms Conclusion
3
DKW Proprietary Information 3 Emergent Proprietary Information 3 Curtis Merriweather Graduate of USC – 2003 BS in Computer Engineering Government Tenure with SSC – 2004 Business Development, Dir. – 2010 President of Mid-Atlantic Region 2011 MBA candidate – The Citadel Manage(d) a Cyber Security Portfolio
4
DKW Proprietary Information 4 Emergent Proprietary Information 4 Introduction Founded in 2008 as a professional services firm Cleared Facility and personnel Composed of three primary Business Units Research and Development Information Technology Intelligence Operations 8(a) pending
5
DKW Proprietary Information 5 Emergent Proprietary Information 5 Organization Intelligence Community, US Army Centers of Excellence Research & Development Intelligence Community, SPAWAR, US Army Information Technology Intelligence Community, SPAWAR, VA Senior VP, Operations Executive Vice President President/CEO Intelligence Operations
6
DKW Proprietary Information 6 Emergent Proprietary Information 6 Research & Development (R&D) Innovating solutions with a cyber security focus. Partnered with Academia Supporting several federal agencies to solve NEW problems Technology Transfer process
7
DKW Proprietary Information 7 Emergent Proprietary Information 7 Information Technology Any-time, anywhere, ubiquitous access to information Cyber Security Computer Forensics Media Exploitation Computer Network Attack Defense Exploit
8
DKW Proprietary Information 8 Emergent Proprietary Information 8 Intelligence Operations Emergent provides support in the following ways: Collections All-Source Analysis CIDNE Operators and Managers Collection Managers HUMINT Analysis SIGINT Analysis Processing Exploitation The maxim 'nothing avails but perfection' can be spelled 'paralysis' -- Winston Churchill
9
DKW Proprietary Information 9 Emergent Proprietary Information 9 Core Capabilities Customers Intelligence Community US Army SPAWARSYSCEN Services Provided Commercialization ATCD/JTCD Support Technology Transfer Services Provided Collections Processing Exploitation Customers Intelligence Community INSCOM Services Provided Tier 1 – Service/Help Desk Support Tier 2 – Technical Support Tier 3 – Network Engineering and IT System Support Services Provided Computer Forensics Computer Network Defense/ Attack/Exploit Media Exploitation NIST 800 Series Certification & Accreditation DITSCAP/DIACAP C&A Customers Intelligence Community SPAWARSYSCEN Charleston Customers Intelligence Community Services Provided Architecture Development – EA, Use Cases, etc.. Software Engineering and Development Web Portal Design, Implementation and Maintenance System Implementation, Training and Documentation Support Customers Intelligence Community US Coast Guard, Veteran Affairs Research & Development (R&D) Intelligence Operations Information Technology Management Cyber Security Application Development
10
DKW Proprietary Information 10 Emergent Proprietary Information 10 Cyber Security Cyber Security - measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Cyber Security Standards – are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. ISA 99, NIST, etc..
11
DKW Proprietary Information 11 Emergent Proprietary Information 11 Cyber Warfare "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption. – Richard A. Clark “The Fifth Domain of warfare,“ – The Economist The DoD has formally recognized cyberspace as a new domain in warfare... [which] has become just as critical to military operations as land, sea, air, and space.“ - Defense Secretary
12
DKW Proprietary Information 12 Emergent Proprietary Information 12 World Events Adobe Google Intel Juniper Yahoo Government Institutions State Department, etc..
13
DKW Proprietary Information 13 Emergent Proprietary Information 13 Exploited Platforms Computers Mobile Phones Android IPhone Blackberry Satellite Systems Social Networking GPS Technologies OnStar, ENav Video Game Platforms – offensive and defensive
14
DKW Proprietary Information 14 Emergent Proprietary Information 14 Exploits Bluetooth Hijacking Brute Force Attack Methods Software Exploits War Driving Wireless Exploits Pushed Advertisements - Phones Hotspots Trojan/Virus Generators Phishing Schemes
15
DKW Proprietary Information 15 Emergent Proprietary Information 15 Defensive Strategies Increased Awareness Common Defense Measures Information Assurance Patching Secure Coding Methodologies - Developers Software Updates Active Defense Strategy Cloudshield IBM – Analytics Engine Defense-in-Depth Strategy Multi-Phase Authentication vs. Single Sign-On
16
DKW Proprietary Information 16 Emergent Proprietary Information 16 Situation Awareness – Defense Strategies Honeypot Projects Collection Agent Hopefully uncover motives Computer Forensics Encase v.6 Log Collector Media Exploitation Specialized tools DOMEX/MEDEX Experts
17
DKW Proprietary Information 17 Emergent Proprietary Information 17 Defensive Strategies Certified Ethical Hackers (CEH) White Hats Complete Penetration Testing Inside Outside Security Experts Real World Experience Certification Programs Security+, CWSP, CISSP, etc…
18
DKW Proprietary Information 18 Emergent Proprietary Information 18 Partnerships Academia Government Industry Industry and Academia have to lead the charge
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.