Cyber Physical Systems Security at NSF
|
|
- Emily Mathews
- 5 years ago
- Views:
Transcription
1 Cyber Physical Systems Security at NSF David Corman CISE Directorate National Science Foundation Image Credit: Exploratorium.
2 National Science Foundation s mission To promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense... Champions Research and Education Across All Fields of Science and Engineering
3 CPS Security Support across NSF CISE Core Programs Expeditions Cyber- Physical Systems (CPS) Secure and Trustworthy Computing (SaTC) Cyber-Physical Systems Smart Health & Wellbeing National Robotics Initiative (NRI) Smart and Connected Communities (SCC)
4 What are Cyber-Physical Systems Deeply integrating computation, communication, and control into physical systems Characteristics of CPS Pervasive computation, sensing and control Networked at multi- and extreme scales Dynamically reorganizing/reconfiguring High degrees of automation Dependable operation with potential requirements for high assurance of reliability, safety, security and usability With / without human in on-the-loop Conventional and unconventional substrates / platforms Ranges from the very small BioCPS (DNA and Micro-robots) to the large (Boeing 787 / Airbus 380 ) to the very large (city scale) Application Domains Transportation Faster and safer vehicles (airplanes, cars, etc) Improved use of airspace and roadways Energy efficiency Manned and un-manned Energy and Industrial Automation Homes and offices that are more energy efficient and cheaper to operate Distributed micro-generation for the grid Healthcare and Biomedical Increased use of effective in-home care More capable devices for diagnosis New internal and external prosthetics Critical Infrastructure More reliable power grid Highways that allow denser traffic with increased safety
5 NSF Cyber Physical Systems Research Model Abstract from sectors to more general principles and apply these to problems in new sectors Build a CPS community over 350+ current funded researchers Multiple agency participation (USDA, DHS, DoT, and NIH) Investment Over $300M in current awards 300+ awards Over $40M in each of FY14- FY17 Automotive Energy Aeronautics Control Autonomy Data Analytics Real-time Systems Security Smart & Connected Communities Manufacturing Safety CPS Core Medical Information Management IoT Verification Human in the Loop Privacy Materials Application Sectors Design Networking Agriculture Civil
6 Community Building - Cyber-Physical Systems Virtual Organization A source of virtually all information on CPS Agency Partners (Past / Present) National Science Foundation National Security Agency Department of Transportation / FHWA (past) DARPA META program Collaborative web-site building Membership and Group Management File sharing, Metadata search Technical Approach and Key Innovations Provides virtual organization technologies to facilitate electronic community building Connects researchers, students, educators and industry practitioners Presentations and video from past PI meetings and poster sessions Long-Term Research Vision --- Make the VO an action destination Design competitions including design of small UAV Integration with test beds Integrate research tools and artifacts for download Virtual Organization Content/Usage +140 special interest groups 14,000 web pages 21,000 versioned file artifacts uploaded 4,000 active users 2 terabytes of data served 6,000 community announcements posted On-Site Community Events Supported +80 CPS-related conferences, planning meetings, seminars, and workshops organized Annual CPS PI meetings, HCSS Conferences, Science of Security Conferences, SaTC
7 How Our can Goal: we How design, can build we design, and verify build reliable, and verify predictable, reliable, safe predictable, and secure safe cyber-physical and secure cyber-physical systems upon systems which people upon which people can - and can will - and - bet will their - bet lives? their lives?
8 Cyber-Physical Security Considerations Systems may be processor and network constrained Human operated no system admin Can the physical world be our friend? Systems not always connected Potentially enormous economic impact Law Enforcement Communications Control Systems Embedded Medical Devices Automobiles
9 Society s overwhelming reliance on this complex cyberspace has exposed its fragility and vulnerabilities A truly secure cyberspace must address both scientific and engineering problems and vulnerabilities that arise from human behaviors SaTC is NSF s flagship research program: Approaches security and privacy as a multidisciplinary subject Goal: Find fundamentally new ways to Design, build and operate cyber systems Protect existing infrastructure Motivate & educate individuals about cybersecurity 9
10 SaTC: Approximately 1000 active awards spread through 5 directorates on a broad range of topics access control authentication usability cloud cyber physical systems cryptography economics engineering Data Science forensics Formal Methods hardware security human aspects social networks mathematical sciences intrusion detection network security privacy internet of things social and behavioral sciences programming languages software security statistics system security biometrics
11 Example CPS (funded) Security Projects Award # Project Title Institution Breakthrough: CPS-Security: Towards provably correct distributed attackresilient control of unmanned-vehicleoperator networks Penn State , CPS: Synergy: Collaborative Research: Virginia Tech, Cyber-physical Approaches to Advanced Vanderbilt, VT-ARC Manufacturing Security CPS: Synergy: Information Flow Analysis Carnegie-Mellon for Cyber-Physical System Security University , , CPS: Medium: Quantitative Contract- Based Synthesis and Verification for CPS Security CPS: Synergy: Collaborative Research: Support for Security and Safety of Programmable IoT Systems CPS:Synergy:Security of Distributed Cyber-Physical Systems with Connected Vehicle Applications CPS: Medium: Collaborative Research: Security vs. Privacy in Cyber-Physical Systems CPS: Medium: Security Certification of Autonomous Cyber-Physical Systems Risk Modeling and Cyber Defense Exercise for Critical Infrastructures Security CPS: Synergy: High-Fidelity, Scalable, Open-Access Cyber Security Testbed for Accelerating Smart Grid Innovations and Deployments EAGER: Collaborative: Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation CPS: Medium: Distorting the adversary's view: a CPS approach to privacy and security CPS: Medium: Collaborative Research: Security vs. Privacy in Cyber-Physical Systems CPS: Breakthrough: Collaborative Research: Securing Smart Grid by Understanding Communications Infrastructure Dependencies University of California- Berkeley University of Michigan, Univ Illinois Clemson University University of Maryland College Park University of Florida Iowa State University Iowa State University University of Tulsa, Colorado State University of California- Los Angeles University of Texas at Dallas Temple, Missouri S&T
12 CPS: Synergy: Collaborative Research: Cyber-Physical Approaches to Advanced Manufacturing Security # Award Date: 06/15/2015 Dr. Christopher B. Williams 1, Dr. Jamie Camelio 1, Dr. Jules White 2, Dr. Lee Wells 3 1 Virginia Tech, 2 Vanderbilt University, 3 Western Michigan University Challenge: Industry 4.0 is increasing attack space for manufacturing systems Product design, performance, and/or overall quality can be targeted with attack Traditional quality control not designed for attack detection Manufacturing Security Assessment Modeling Scientific Impact: Identification of cyber-physical vulnerabilities in manufacturing Modeling tool to inform decision making for interconnected MFG Novel side-channel detection in machining and AM Solution: Develop taxonomy of attacks to understand problem Build modeling tools to perform vulnerability assessment for manufacturing systems Creation of process monitoring techniques for attack detection # , Virginia Tech, Vanderbilt University, Western Michigan University cbwill@vt.edu Partin CNC G-code h CNCsetup CNCout Partout Attack Detection Normal Attack 1 Attack 2 Cyber + Physical Broader Impact: Development of industrial standards incorporating CPS Cyber-Physical Security for Aerospace Manufacturing Workshop on next-generation cyber-physical security defense and quality control considerations Dissemination of CPS for manufacturing to various industry OEMs
13 Security and Privacy-Aware Cyber Physical Systems NSF / Intel CPS Security Solicitation Lead PI: Miroslav Pajic Investigating CPS Security in ground vehicle domain with applications spanning other spaces Platform-Aware Design Framework for Attack-Resilient CPS Security-Aware Scheduling in CPS Co-design reduces security-related overhead Control-level techniques Attack detection and identification using redundant sensing and model of the system s dynamics Attack-resilient control architectures Code-level techniques Ensure that the control code is correctly implemented and integrated Preventing malicious code injection into the controller Goal: Ensure that the system maintains a degree of control even when the system is under cyber and/or physical attack Trajectory tracking with <15% of authenticated messages Pajic, Security-Aware Scheduling of Embedded Control at EMSOFT Pajic, Network Scheduling for Secure Cyber-Physical NSF #
14 STARSS: Small: Collaborative: Specification and Verification for Secure Hardware Challenge: Processors and SoCs increasingly built from untrusted components Systems software can be compromised growing need for trusted hardware platforms Solution: Security-aware hardware/ software verification Analysis and inference of specifications of hardware components and software-hardware interfaces Key innovation this year: Techniques for verifying software running on trusted hardware (e.g. Intel SGX) STARSS Awards , S. A. Seshia (UC Berkeley), R. E. Bryant (CMU). Scientific Impact: Developing a foundation for formal and semiformal specification and verification of secure hardware and softwarehardware platforms Developing theories, threat models, tools, and benchmarks for securityaware hardware design Broader Impact: Significantly improve security and privacy guarantees by enhancing trust in platforms Develop modules to teach students to design systems with formal security mindset
15 Active SaTC Frontier Projects data privacy Privacy Tools for Sharing Research Data (2012); Harvard University $4.8M for 4 years healthcare Enabling Trustworthy Cybersystems for Health and Wellness (2013) Dartmouth, UIUC, JHU, Michigan $10M for 5 years outsourced computation Modular Approach to Cloud Security (2014) BU, MIT, Northeastern, U. Connecticut $10M for 5 years trust in cloud Rethinking Security in the Era of Cloud Computing (2013) ; UNC, NCSU, Stony Brook, Duke, Wisconsin-Madison $6M for 5 years socio-economics Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives (2012); UCSD, Berkeley, GMU $10M for 5 years web privacy Towards Effective Web Privacy Notice and Choice (2013) CMU, Fordham, Stanford $3.75M for 4 years program obfuscation Center for Encrypted Functionalities (2014) UCLA, Stanford, Columbia, UT Austin, JHU $4.9M for 5 years machine learning Center for Trustworthy Machine Learning (2018) Penn State, Stanford, Berkeley, UCSD, Wisconsin- Madison, U. Virginia $10M for 5 years 15
16 Final Thoughts Multiple Venues for CPS Research CPS Program Solicitation being updated see NSF for previous year details Check cps-vo.org for lots of program info SaTC Program See NSF for current solicitation Broader than CPS security No deadlines Smart and Connected Community Solicitation being updated see NSF for previous year details Includes security and privacy within the context of SCC requires significant community engagement Check nsf.gov/cise/scc for program info We look forward to your interest in these and other NSF programs
Secure and Trustworthy Cyberspace Program (SaTC)
Secure and Trustworthy Cyberspace Program (SaTC) Sol Greenspan Program Director Directorate for Computer & Information Science & Engineering National Science Foundation (NSF) sgreensp@nsf.gov Overview
More informationNSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015
NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement
More informationWhat makes a hot topic hot? An NSF Perspective
What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance
More informationCyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte
Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationInternet, Things, and Smartness
Internet, Things, and Smartness Outline One-liners Definitions Footprint Natl. & Intl. Initiatives NSF Opportunities Samee U. Khan Program Director CISE/CNS SmartIoT & HotWeb October 16, 2017 One-liner
More informationCINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF # ) April 26, 2017
CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF #1650445) April 26, 2017 1 CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP)
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationto Address Cyber Physical Systems Security (CPSSEC)
Combating Threats: S&T is Building a Resilient Cyber Ecosystem to Address Cyber Physical Systems Security (CPSSEC) Follow us at dhsscitech CPS Security is Critical Smart cars, grids, medical devices, manufacturing,
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationIntroducing Cyber Resiliency Concerns Into Engineering Education
Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference
More informationNational Cybersecurity Center of Excellence
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY
More informationSharing of Information & Intelligence on the Importation & Transportation of Food
Sharing of Information & Intelligence on the Importation & Transportation of Food Dr. Sharon Thompson, Director Center for Agriculture & Food Security & Preparedness University of Tennessee College of
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationGovernment-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA
Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives
More informationIntegrated Security Destination Area Workshop May
Integrated Security Destination Area Workshop May 19 2017 Research Breakout Sessions Cyber Physical Systems Security 5/16/2017 Virginia Tech Integrated Security Destination Area Cyber Physical Systems
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationThe Path to a Secure and Resilient Power Grid Infrastructure
The Path to a Secure and Resilient Power Grid Infrastructure Bill Sanders University of Illinois at Urbana-Champaign www.tcipg.org whs@illinois.edu 1 Power Grid Trust Dynamics Span Two Interdependent Infrastructures
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationPicasso Panel Thinking Beyond 5 G David Corman
Picasso Panel Thinking Beyond 5 G David Corman Program Director Directorate for Computer and Information Science and Engineering National Science Foundation June 19, 2018 Some Motivation: Toward Smart
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationHigh Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail
High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail November 20, 2008 Chris Greer Director, US National Coordination Office Networking and Information Technology Research
More informationPanelists. Moderator: Dr. John H. Saunders, MITRE Corporation
SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure
More informationResearch Strategies in Informatics at NSF
Research Strategies in Informatics at NSF Ken Calvert Division Director, Computer and Network Systems Directorate for Computer & Information Science & Engineering 11 th SCJ Symposium on Informatics Image
More informationSmart Grid Security Illinois
Smart Grid Security Efforts @ Illinois TCIPG: Trustworthy Cyber Infrastructure for the Power Grid Drive the design of an resilient cyber infrastructure electric power which operates through attacks $18.8
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationEU LEIT-ICT program and SE position on FP9
EU LEIT-ICT program 2018-2020 and SE position on FP9 Johan Harvard, Deputy Director, Ministry of Enterprise and Innovation Ministry of Enterprise and Innovation 1 Horizon 2020 A European Research & Innovation
More informationMeasurement Challenges and Opportunities for Developing Smart Grid Testbeds
Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart
More informationStrategic Transport Research and Innovation Agenda - STRIA
Strategic Transport Research and Innovation Agenda - STRIA Brussels, 15 September 2016 Cristina Marolda DG Mobility & Transport European Commission Mobility & Transport Why do we need a new transport R&I
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationIOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT
IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationThe Next Frontier in Medical Device Security
The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($
More information2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat
2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation
More informationPower Affiliates Program Highlights. Pete Sauer
Power Affiliates Program Highlights Pete Sauer 2014 Affiliates Ameren Bitrode CWLP Continental Automotive EMCWA Exelon Flanders Electric G&W Electric MidAmerican M.A. Pai PowerWorld S&C Electric Sargent
More informationCyber Security CRA Overview
Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationTrustworthy Information Systems Program
Trustworthy Information Systems Program Joint Meeting of ASQ Software SIG, SSQ, SSIG/IEEE Computer Society 24 June 2008 Tom Rhodes, PM, TIS Program National Institute of Standards and Technology Information
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationDepartment of Homeland Security
Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationAbout. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium
Supported by About Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration Industry Academia Cybersecurity Consortium Public Agencies National Cybersecurity R&D
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationMidwest Big Data Hub Accelerating the Big Data Innovation Ecosystem
Ed Seidel PI (Illinois) Beth Plale Co-PI (Indiana) Sarah Nusser Co-PI (Iowa State) Brian Athey Co-PI (Michigan) Josh Riedy Co-PI, (UND) Melissa Cragin ED (Illinois) SEEDCorn: Sustainable Enabling Environment
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationSystemic Analyser in Network Threats
Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationCSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018
DHS SCIENCE AND TECHNOLOGY CSD Project Overview March 13, 2018 Dr. Ann Cox Program Manager Cyber Security Division Science and Technology Directorate CSD Mission & Strategy REQUIREMENTS CSD MISSION Develop
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationИтоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан)
Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Фарид Нахли, координатор программ, Региональный офис МСЭ 1 Санкт-Петербург, 19-20 июня 2017
More informationCybersecurity ecosystem and TDL Antonio F. Skarmeta
Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationDISTRIBUTED BIG DATA & ANALYTICS INNOVATION WORKING GROUP Internet2
DISTRIBUTED BIG DATA & ANALYTICS INNOVATION WORKING GROUP 2016 Internet2 DBDA Innovation Working Group AGENDA Evolution of the DBDA Innovation Working Group: Marc Hoit, North Carolina State University
More informationBenefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative
Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative Research and education to enable renewable energy resources Dennis Ray Deputy Director Power Systems Engineering Research
More informationCyLab Mobility Research Center. Martin Griss & Priya Narasimhan
CyLab Mobility Research Center Martin Griss & Priya Narasimhan July 1, 2008 1 Mobility Research Summit Agenda 11.30 Lunch Welcome, introductions 12.00 Background, goals 12.30 Faculty presentations 2.00
More informationThe Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1
The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber
More informationICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015
ICT Policy Perspective for APEC Ministry of Internal Affairs and Communications March 2015 Current Status in APEC Region 1 GDP Growth Rate Twice the global average Share of Global Communications Service
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationOutreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness
2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationPresentation to ACSAC 2009 Cyber Security and Information Assurance R&D
Presentation to ACSAC 2009 Cyber Security and Information Assurance R&D Federal Networking and Information Technology Research and Development (NITRD) Program Tomas Vagoun Technical Coordinator vagoun@nitrd.gov
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationAbout Us. Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016
Supported by About Us Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016 Academia Vision: To set up a seamless platform for
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationAn Overview of Mobile Security
An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationLooking beyond IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia -
Looking beyond 2020 IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia - sandro.delia@ec.europa.eu The overall context of EU research Multiannual Financial Framework budget proposal
More informationGlobal Security Operation Center GSOC
Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations
More informationAn NSF Cybersecurity Center of Excellence to Support Research
An NSF Cybersecurity Center of Excellence to Support Research Jim Basney, Tom Barton, and Kim Milford Internet2 Global Summit May 18 2016 trustedci.org Agenda Overview of CTSC (Jim) Cybersecurity for Science:
More informationThe Road to Industry 4.0
The Road to Industry 4.0 Secure remote access and active cyber protection for industrial machinery Hamburg, May 22, 2017 Fabian Bahr G+D Group Business Units and Divisions G+D Mobile Security Financial
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationFeatured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure
Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki
More informationA Living-Lab Model: Resilience Through Translational Technology and Policy Virginia Tech and Arlington County, as an example.
A Living-Lab Model: Resilience Through Translational Technology and Policy Virginia Tech and Arlington County, as an example November 17, 2014 Anne Khademian Director, School of Public & International
More informationMass Big Data: Progressive Growth through Strategic Collaboration
Massachusetts Technology Collaborative Mass Big Data: Progressive Growth through Strategic Collaboration Patrick Larkin, Executive Director The Innovation Institute at the Massachusetts Technology Collaborative
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationCINC UP: CYBERSECURITY RESEARCH ACCELERATION WORKSHOP AND SHOWCASE. Brought to you by CENIC and Internet2. JOHN DUNDAS VP and CTO, CENIC
CINC UP: CYBERSECURITY RESEARCH ACCELERATION WORKSHOP AND SHOWCASE Brought to you by CENIC and Internet2 JOHN DUNDAS VP and CTO, CENIC FLORENCE HUDSON SVP & Chief Innovation Officer, Internet2 CINC UP:
More informationThe Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,
The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology 1 Speaker
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationChallenges and Opportunities in Cyber Physical System Research
Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy
More informationSecurity and networks
Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,
More information