1 / 14

June 16, 2009

Cyber Security: Current Events and White House Cyberspace Policy Review. June 16, 2009. Contents. Cyber Breach Snapshot Why Cyber Security Is Critical Moving Forward Current Events San Antonio – A Hub to Cyber Security Administrations Top Considerations Where are We Today.

susan-rush
Download Presentation

June 16, 2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security: Current Events and White House Cyberspace Policy Review June 16, 2009

  2. Contents Cyber Breach Snapshot Why Cyber Security Is Critical Moving Forward Current Events San Antonio – A Hub to Cyber Security Administrations Top Considerations Where are We Today

  3. Cyber Breach Snapshot Overall Breaches Federal Breaches • Breaches are wide-spread and growing. DHS estimates attacks up 800% 2005 – 2007—estimates often low. • Our company alone has thousands of attempted probes per week • Attacks cost more than $8 billion over 2 years; $100+ million in 6 months.

  4. Electricity Grid in U.S. Penetrated by Spies - WSJ Computer Spies Breach Fighter Jet - WSJ Estonia Denial of Service Attacks (2006)

  5. Why Cyber Security Is Critical Cyber space now recognized as critical to our lives and national defense Bank accounts Stock markets Insurance claims Medical records Nuclear/electric plants and utilities Attempts against U.S. critical assets are increasing Some are foreign government-sponsored. Some obviously successful Effects will be powerful and destructive .

  6. Moving Forward Federal, State, local governments should work with industry in advance to improve plans and resources to cyber security incidents. What needs to be done? Detect Prevent Respond Mitigate Cyberspace cannot be secured without regulation - Voluntary regulation is not the right solution

  7. Moving Forward We must do a better job in properly configuring software products Configuring software products for security is expensive and often produce new vulnerabilities We are spending more to ensure that software is securely configured and to patch software defects than what the product itself is worth We must improve the acquisition process for hardware/software

  8. Current Events… President Obama – “We’re not as prepared as we should be, as a Government or as a country.” NSA Director General Alexander “The United States must defend against a cyber attack by going after the botnets at their point of origin” General Schwartz USAF Chief of Staff – “We’ve regarded network protection and security as the “Comm Guy’s Job,” and as a user inconvenience. THIS MUST NOT LONGER BE THE CASE”. Johnnie Hernandez – “We don’t have enough trained people to mitigate all of the probes and attacks occurring in our network systems”

  9. San Antonio – A Hub to Cyber Security NSA West AF Cyber Command in San Antonio Birthplace of AF Information Warfare/Information Operations Wealth of talent in the local area Public/private partnerships with academia Ranked “The Most prepared community in the nation” for cyber security Plus, all the other great things SA has to offer (i.e. 2007 List of best cities…)

  10. Administrations Top Considerations Appoint a cyber security policy official responsible for coordinating the Nation’s cyber security policies and activities Initiation of a national public awareness and education campain to promote cyber security Develop a framework for research and development strategies

  11. Policy Analysis & Insights

  12. WHERE ARE WE TODAY - Leaders must all realize that hackers are constantly trying to steal information Adversaries are on a wartime footing Cyber security is a growth issue

  13. Questions?

  14. Cyber Security: Current Events and White House Cyberspace Policy Review June 16, 2009

More Related