1 / 5

CUBIC DEFENSE APPLICATIONS

CUBIC DEFENSE APPLICATIONS. Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications. Cyber Attacks Up 300% Since 2005. Threats diverse and expanding. Incidents Reported to US-CERT. Foreign government sanctioned and/or financed

osgood
Download Presentation

CUBIC DEFENSE APPLICATIONS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications

  2. Cyber Attacks Up 300% Since 2005 Threats diverse and expanding Incidents Reported to US-CERT • Foreign government sanctioned and/or financed • Politically/militarily/economically motivated • Domestic and International • Organizations as well as individual actors • Shift from “nuisance” attacks to intent to damage • Goal: disruption, destruction and theft • Must also consider “collateral damage” • Information disruption caused by some unrelated physical disruption Source: GAO • Attacks continue to rise • Up 200% since 2006 (& over 300% since 05) • Increasing in complexity and coordination

  3. Cyber Threats Causing Market Changes Comprehensive National Cyber Initiative (CNCI) has 12 Key Elements that will be the Focus for Protecting the Nation’s Critical Infrastructures.

  4. Cyber Threats Causing Market Changes Civilian Initiatives Span Several Agencies • Established by President Bush in 1/2008 • Goal of improving efforts to protect against intrusion attempts and anticipate future threats across federal computer networks • Estimated budget of $40b over several years Comprehensive National Cyber Initiative (CNCI) • Federal Desktop Core Configuration (FDCC) • Established by OMB in 2007 Collaboration with DHS NSC Division/US-CERT and NIST Established March 2009 Allows agencies to obtain TIC-compliant Internet services through Networx GSA’s program for improving, streamlining and automating IT systems for lender processing systems GSA’s SmartBUY GSA’s MTIPS OMB’s FDCC OMB’s Information Systems Security Line of Business (ISS LoB) • National Cyber Security Center (NCSC) • U.S. Computer Emergency Readiness Team (US-CERT) • EINSTEIN • Trusted Internet Connections (TIC) • Cyber Storm • Cyber Security R&D Center • Established as part of President Bush’s eGov Initiative • Goal of improving the level of information systems security across the federal government, and to gain cost efficiencies by sharing functions and processes for managing information security Department of Homeland Security Initiatives

  5. Key Cyber Activities to Benefit Industry • IPv6 Tools & Processes to Address Cyber Security Implications • Intrusion Detection Sensor (IDS) to Intrusion Prevention Sensor (IPS) Technologies to “Predict” the Threat • Cyber Information Correlation, Analysis, and Course of Action Response • Standardized Cyber Simulation, Training, and Exercise System System • More Robust Insider Threat Tools • Cyber Workforce Modernization and Expansion

More Related