Bringing governments industry and academia closer together to assure global cyber security
This presentation is the property of its rightful owner.
Sponsored Links
1 / 16

Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security PowerPoint PPT Presentation


  • 58 Views
  • Uploaded on
  • Presentation posted in: General

Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security. Terry L. Janssen, PhD Science and Technology Advisor Network Warfare Center US European Command And Lockheed Martin t [email protected] & [email protected]

Download Presentation

Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Bringing governments industry and academia closer together to assure global cyber security

Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security

Terry L. Janssen, PhD

Science and Technology Advisor

Network Warfare Center

US European Command

And Lockheed Martin

[email protected] & [email protected]


Bringing governments industry and academia closer together to assure global cyber security

All Statements Made in this Talk are Personal Opinion of the Author and Do Not Necessarily Represent the Views of the U.S. Government including U.S. European Command, or Lockheed Martin Corporation


This workshop

This Workshop

• International Cyber Security Governance

• Policy, technology, human factors in cyber security

• Cyber warfare, intelligence, defense and preparedness

• Cyber risk assessment and reduction

• Cyber crime and other malicious activity


A cyber threat assessment

A Cyber Threat Assessment

  • Gen. Alexander, USCYBERCOM Commander’s quote (see source below):

    • “The military simply lacks a common operational picture (situation awareness) of its network.. [and] our networks are not secure”

  • Questions this Raises:

    • Does an adversary have inside awareness of US DOD networks?

    • How much critical top secret information has already been stolen?

    • How many “Bots” have been planted in our Government and Private Networks, that we are not aware of because they have not activated yet?

    • Do our adversaries have command and control “Bots” hidden in our networks?

    • What would our response be (Rules of Engagement) if networks attacked

  • Source: http://defensetech.org/2010/06/03/new-cybercom-chief-speaks/#ixzz0rTYRzXPY


The threat perceived or real

The Threat: Perceived or Real?

  • CCDCOE, George C. Marshall Center, Black Hat, DEFCOM etc & here are forums and resources to get the hard facts

  • One talk at CCDCOE 2010

    • Argument made that N. Korea Could Bring Down the US:

      • Only needs 500 hackers and $46 million

      • Needless to say this generated considerable debate and evidence for/against this argument

    • This talk by “Kim Jon-il (joke) and Charlie Miller titled How to Build a Cyber Army to Attack the US”

    • Kim Jon-il, N. Korea Supreme Commander: "The liquidation of colonialism is a trend of the times which no force can hold back.“

  • Argument: Cyber threat is greatly exaggerated based on the data (probability), e.g. Bruce Schneier, BT, CCDCOE 2010

  • Counter-Argument: fact remains that networks are not adequately secured and are being widely exploited as reported continuously by Governments, Industry ISPs, etc, in numerous publications and presentations, etc.


Example ccdcoe 2010 talk

Example CCDCOE 2010 Talk

  • Bryan Krekel & George Bakos of Northrup Grumman talk titled “Chinese Cyber Warfare and Computer Network Exploitation”

    • They cited 100 page report (I have not seen it)

    • If you don’t understand your adversary you can not do attribution

    • Need to know who is doing espionage

      • They will not go away until you go away

      • Need better network security and situation awareness

      • We need the usual deterrence (to Cyber Warfare)


My view of us eucom

My View of US EUCOM

  • Protection of U.S. Military Networks & Operations

  • Military Support to NATO

  • Cyber Security Focused on area of responsibility (AOR)

    • Cyber Security and Threat Deterrence

    • International and US Policy Making Support

    • Science and Technology Enablers

  • Contribution to and Maintenance of International Law with NATO, and US Policy for Cyber Security and Privacy


Need greater international dialog

Need Greater International Dialog

  • The intent is to foster communication & cooperation between nation states for cyber security and stability (wishful thinking?)

  • Venues include the

    • George C. Marshall Center (with GMU CIP?)

    • Cooperative Cyber Defense CoE (CCDCOE)

    • International Cyber Center, GMU

    • Others?


Cooperative cyber defense coe

Cooperative Cyber Defense CoE


United nations cyber security

United Nations & Cyber Security?

UN Plan to Expand Global Broadband Access .

“4 June – The United Nations telecommunications agency’s quadrennial development conference wrapped up today with participants adopting a plan of action to promote the global development of information and communication technology (ICT) networks and services.” Source http://www.un.org


Us cyber command

US Cyber Command

  • Discussion of these issues in relation to

    • The recently formed US Cyber Command (CYBERCOM), a sub unified command under the US Strategic Command (STRATCOM)

    • CYBERCOM together with USEUCOM has the lead role of the US forces

      • To protect networks and global stability

      • To be adequately prepared for cyber defense, exploitation and attack, if needed to maintain peace

  • http://www.af.mil/news/story.asp?id=123205877

  • AFCEA CYBERCOM Conference April 2010

    • Full Videos of Presentations (See next slide)


More than most want to know about uscybercom

More Than Most Want to Know About USCYBERCOM

Full Videos of Each

AFCEA

CYBERCOM

Presentation


Global cyber security imperative

Global Cyber Security Imperative

  • Obvious: A Common Goal of Peaceful Use of Internet by All and Global Stability of Internet

    • An analogy is the International Space Station

    • Especially important to have uniform cooperation of governments with international laws & enforcement

      • Unlikely in our life-times (again my personal opinion)

    • Involves Embracing Academia & Industry

      • Important to development of new, innovative technology to make our networks more secure

      • International Conferences, Meetings, Workshops, like this

      • Includes product developers and Internet Service Providers


Bringing governments industry and academia closer together to assure global cyber security

Obvious Need to Bring Governments, Academia & Industry Together for Global Cyber Security: Our

Imperative!


Some references

Some References

  • http://www.af.mil/news/story.asp?id=123205877

  • http://www.afcea.org/events/pastevents/

  • http://www.ccdcoe.org/conference2010/

  • http://www.eucom.mil

  • http://www.internationalcybercenter.org

  • http://www.lockheedmartin.com/isgs/capabilities/cybersecurity.html

  • http://cip.gmu.edu

  • http://www.defcon.org/

  • http://www.blackhat.com


Questions comments

Questions &Comments?


  • Login