1 / 18

Cyber Security In the Global Marketplace

Cyber Security In the Global Marketplace. Emergent, Inc. 6650 Rivers Avenue Suite 132 North Charleston, SC 29406 T: 843-576-1850 • F: 843-576-1879 www.emergentcorporation.com. Agenda. Introduction Cyber Security Cyber Warfare Platforms Conclusion. Curtis Merriweather.

wgable
Download Presentation

Cyber Security In the Global Marketplace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North Charleston, SC 29406 T: 843-576-1850 • F: 843-576-1879 www.emergentcorporation.com

  2. Agenda • Introduction • Cyber Security • Cyber Warfare • Platforms • Conclusion

  3. Curtis Merriweather • Graduate of USC – 2003 • BS in Computer Engineering • Government Tenure with SSC – 2004 • Business Development, Dir. – 2010 • President of Mid-Atlantic Region • 2011 MBA candidate – The Citadel • Manage(d) a Cyber Security Portfolio

  4. Introduction • Founded in 2008 as a professional services firm • Cleared Facility and personnel • Composed of three primary Business Units • Research and Development • Information Technology • Intelligence Operations • 8(a) pending

  5. Organization President/CEO Executive Vice President Senior VP, Operations Research & Development Intelligence Community, SPAWAR, US Army Intelligence Community, SPAWAR, VA Information Technology Intelligence Community, US Army Centers of Excellence Intelligence Operations

  6. Research & Development (R&D) • Innovating solutions with a cyber security focus. • Partnered with Academia • Supporting several federal agencies to solve NEW problems • Technology Transfer process

  7. Information Technology • Any-time, anywhere, ubiquitous access to information • Cyber Security • Computer Forensics • Media Exploitation • Computer Network • Attack • Defense • Exploit

  8. Intelligence Operations Emergent provides support in the following ways: • Collections • All-Source Analysis • CIDNE Operators and Managers • Collection Managers • HUMINT Analysis • SIGINT Analysis • Processing • Exploitation The maxim 'nothing avails but perfection' can be spelled 'paralysis' -- Winston Churchill

  9. Core Capabilities Research & Development (R&D) • Services Provided • Commercialization • ATCD/JTCD Support • Technology Transfer • Customers • Intelligence Community • US Army • SPAWARSYSCEN • Services Provided • Collections • Processing • Exploitation Intelligence Operations • Customers • Intelligence Community • INSCOM Information Technology Management • Services Provided • Tier 1 – Service/Help Desk Support • Tier 2 – Technical Support • Tier 3 – Network Engineering and IT System Support • Customers • Intelligence Community • SPAWARSYSCEN Charleston Cyber Security • Services Provided • Computer Forensics • Computer Network Defense/ Attack/Exploit • Media Exploitation • NIST 800 Series Certification & Accreditation • DITSCAP/DIACAP C&A • Customers • Intelligence Community Application Development • Services Provided • Architecture Development – EA, Use Cases, etc.. • Software Engineering and Development • Web Portal Design, Implementation and Maintenance • System Implementation, Training and Documentation Support • Customers • Intelligence Community • US Coast Guard, • Veteran Affairs

  10. Cyber Security • Cyber Security - measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack • Cyber Security Standards – are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. • ISA 99, NIST, etc..

  11. Cyber Warfare • "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption. – Richard A. Clark • “The Fifth Domain of warfare,“ – The Economist • The DoD has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.“ - Defense Secretary

  12. World Events • Adobe • Google • Intel • Juniper • Yahoo • Government Institutions • State Department, etc..

  13. Exploited Platforms • Computers • Mobile Phones • Android • IPhone • Blackberry • Satellite Systems • Social Networking • GPS Technologies • OnStar, ENav • Video Game Platforms – offensive and defensive

  14. Exploits • Bluetooth Hijacking • Brute Force Attack Methods • Software Exploits • War Driving • Wireless Exploits • Pushed Advertisements - Phones • Hotspots • Trojan/Virus Generators • Phishing Schemes

  15. Defensive Strategies • Increased Awareness • Common Defense Measures • Information Assurance • Patching • Secure Coding Methodologies - Developers • Software Updates • Active Defense Strategy • Cloudshield • IBM – Analytics Engine • Defense-in-Depth Strategy • Multi-Phase Authentication vs. Single Sign-On

  16. Situation Awareness – Defense Strategies • Honeypot Projects • Collection Agent • Hopefully uncover motives • Computer Forensics • Encase v.6 • Log Collector • Media Exploitation • Specialized tools • DOMEX/MEDEX Experts

  17. Defensive Strategies • Certified Ethical Hackers (CEH) • White Hats • Complete Penetration Testing • Inside • Outside • Security Experts • Real World Experience • Certification Programs • Security+, CWSP, CISSP, etc…

  18. Partnerships • Academia • Government • Industry Industry and Academia have to lead the charge

More Related