Cyber Physical Systems Security at NSF

Size: px
Start display at page:

Download "Cyber Physical Systems Security at NSF"

Transcription

1 Cyber Physical Systems Security at NSF David Corman CISE Directorate National Science Foundation Image Credit: Exploratorium.

2 National Science Foundation s mission To promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense... Champions Research and Education Across All Fields of Science and Engineering

3 CPS Security Support across NSF CISE Core Programs Expeditions Cyber- Physical Systems (CPS) Secure and Trustworthy Computing (SaTC) Cyber-Physical Systems Smart Health & Wellbeing National Robotics Initiative (NRI) Smart and Connected Communities (SCC)

4 What are Cyber-Physical Systems Deeply integrating computation, communication, and control into physical systems Characteristics of CPS Pervasive computation, sensing and control Networked at multi- and extreme scales Dynamically reorganizing/reconfiguring High degrees of automation Dependable operation with potential requirements for high assurance of reliability, safety, security and usability With / without human in on-the-loop Conventional and unconventional substrates / platforms Ranges from the very small BioCPS (DNA and Micro-robots) to the large (Boeing 787 / Airbus 380 ) to the very large (city scale) Application Domains Transportation Faster and safer vehicles (airplanes, cars, etc) Improved use of airspace and roadways Energy efficiency Manned and un-manned Energy and Industrial Automation Homes and offices that are more energy efficient and cheaper to operate Distributed micro-generation for the grid Healthcare and Biomedical Increased use of effective in-home care More capable devices for diagnosis New internal and external prosthetics Critical Infrastructure More reliable power grid Highways that allow denser traffic with increased safety

5 NSF Cyber Physical Systems Research Model Abstract from sectors to more general principles and apply these to problems in new sectors Build a CPS community over 350+ current funded researchers Multiple agency participation (USDA, DHS, DoT, and NIH) Investment Over $300M in current awards 300+ awards Over $40M in each of FY14- FY17 Automotive Energy Aeronautics Control Autonomy Data Analytics Real-time Systems Security Smart & Connected Communities Manufacturing Safety CPS Core Medical Information Management IoT Verification Human in the Loop Privacy Materials Application Sectors Design Networking Agriculture Civil

6 Community Building - Cyber-Physical Systems Virtual Organization A source of virtually all information on CPS Agency Partners (Past / Present) National Science Foundation National Security Agency Department of Transportation / FHWA (past) DARPA META program Collaborative web-site building Membership and Group Management File sharing, Metadata search Technical Approach and Key Innovations Provides virtual organization technologies to facilitate electronic community building Connects researchers, students, educators and industry practitioners Presentations and video from past PI meetings and poster sessions Long-Term Research Vision --- Make the VO an action destination Design competitions including design of small UAV Integration with test beds Integrate research tools and artifacts for download Virtual Organization Content/Usage +140 special interest groups 14,000 web pages 21,000 versioned file artifacts uploaded 4,000 active users 2 terabytes of data served 6,000 community announcements posted On-Site Community Events Supported +80 CPS-related conferences, planning meetings, seminars, and workshops organized Annual CPS PI meetings, HCSS Conferences, Science of Security Conferences, SaTC

7 How Our can Goal: we How design, can build we design, and verify build reliable, and verify predictable, reliable, safe predictable, and secure safe cyber-physical and secure cyber-physical systems upon systems which people upon which people can - and can will - and - bet will their - bet lives? their lives?

8 Cyber-Physical Security Considerations Systems may be processor and network constrained Human operated no system admin Can the physical world be our friend? Systems not always connected Potentially enormous economic impact Law Enforcement Communications Control Systems Embedded Medical Devices Automobiles

9 Society s overwhelming reliance on this complex cyberspace has exposed its fragility and vulnerabilities A truly secure cyberspace must address both scientific and engineering problems and vulnerabilities that arise from human behaviors SaTC is NSF s flagship research program: Approaches security and privacy as a multidisciplinary subject Goal: Find fundamentally new ways to Design, build and operate cyber systems Protect existing infrastructure Motivate & educate individuals about cybersecurity 9

10 SaTC: Approximately 1000 active awards spread through 5 directorates on a broad range of topics access control authentication usability cloud cyber physical systems cryptography economics engineering Data Science forensics Formal Methods hardware security human aspects social networks mathematical sciences intrusion detection network security privacy internet of things social and behavioral sciences programming languages software security statistics system security biometrics

11 Example CPS (funded) Security Projects Award # Project Title Institution Breakthrough: CPS-Security: Towards provably correct distributed attackresilient control of unmanned-vehicleoperator networks Penn State , CPS: Synergy: Collaborative Research: Virginia Tech, Cyber-physical Approaches to Advanced Vanderbilt, VT-ARC Manufacturing Security CPS: Synergy: Information Flow Analysis Carnegie-Mellon for Cyber-Physical System Security University , , CPS: Medium: Quantitative Contract- Based Synthesis and Verification for CPS Security CPS: Synergy: Collaborative Research: Support for Security and Safety of Programmable IoT Systems CPS:Synergy:Security of Distributed Cyber-Physical Systems with Connected Vehicle Applications CPS: Medium: Collaborative Research: Security vs. Privacy in Cyber-Physical Systems CPS: Medium: Security Certification of Autonomous Cyber-Physical Systems Risk Modeling and Cyber Defense Exercise for Critical Infrastructures Security CPS: Synergy: High-Fidelity, Scalable, Open-Access Cyber Security Testbed for Accelerating Smart Grid Innovations and Deployments EAGER: Collaborative: Toward a Test Bed for Heavy Vehicle Cyber Security Experimentation CPS: Medium: Distorting the adversary's view: a CPS approach to privacy and security CPS: Medium: Collaborative Research: Security vs. Privacy in Cyber-Physical Systems CPS: Breakthrough: Collaborative Research: Securing Smart Grid by Understanding Communications Infrastructure Dependencies University of California- Berkeley University of Michigan, Univ Illinois Clemson University University of Maryland College Park University of Florida Iowa State University Iowa State University University of Tulsa, Colorado State University of California- Los Angeles University of Texas at Dallas Temple, Missouri S&T

12 CPS: Synergy: Collaborative Research: Cyber-Physical Approaches to Advanced Manufacturing Security # Award Date: 06/15/2015 Dr. Christopher B. Williams 1, Dr. Jamie Camelio 1, Dr. Jules White 2, Dr. Lee Wells 3 1 Virginia Tech, 2 Vanderbilt University, 3 Western Michigan University Challenge: Industry 4.0 is increasing attack space for manufacturing systems Product design, performance, and/or overall quality can be targeted with attack Traditional quality control not designed for attack detection Manufacturing Security Assessment Modeling Scientific Impact: Identification of cyber-physical vulnerabilities in manufacturing Modeling tool to inform decision making for interconnected MFG Novel side-channel detection in machining and AM Solution: Develop taxonomy of attacks to understand problem Build modeling tools to perform vulnerability assessment for manufacturing systems Creation of process monitoring techniques for attack detection # , Virginia Tech, Vanderbilt University, Western Michigan University cbwill@vt.edu Partin CNC G-code h CNCsetup CNCout Partout Attack Detection Normal Attack 1 Attack 2 Cyber + Physical Broader Impact: Development of industrial standards incorporating CPS Cyber-Physical Security for Aerospace Manufacturing Workshop on next-generation cyber-physical security defense and quality control considerations Dissemination of CPS for manufacturing to various industry OEMs

13 Security and Privacy-Aware Cyber Physical Systems NSF / Intel CPS Security Solicitation Lead PI: Miroslav Pajic Investigating CPS Security in ground vehicle domain with applications spanning other spaces Platform-Aware Design Framework for Attack-Resilient CPS Security-Aware Scheduling in CPS Co-design reduces security-related overhead Control-level techniques Attack detection and identification using redundant sensing and model of the system s dynamics Attack-resilient control architectures Code-level techniques Ensure that the control code is correctly implemented and integrated Preventing malicious code injection into the controller Goal: Ensure that the system maintains a degree of control even when the system is under cyber and/or physical attack Trajectory tracking with <15% of authenticated messages Pajic, Security-Aware Scheduling of Embedded Control at EMSOFT Pajic, Network Scheduling for Secure Cyber-Physical NSF #

14 STARSS: Small: Collaborative: Specification and Verification for Secure Hardware Challenge: Processors and SoCs increasingly built from untrusted components Systems software can be compromised growing need for trusted hardware platforms Solution: Security-aware hardware/ software verification Analysis and inference of specifications of hardware components and software-hardware interfaces Key innovation this year: Techniques for verifying software running on trusted hardware (e.g. Intel SGX) STARSS Awards , S. A. Seshia (UC Berkeley), R. E. Bryant (CMU). Scientific Impact: Developing a foundation for formal and semiformal specification and verification of secure hardware and softwarehardware platforms Developing theories, threat models, tools, and benchmarks for securityaware hardware design Broader Impact: Significantly improve security and privacy guarantees by enhancing trust in platforms Develop modules to teach students to design systems with formal security mindset

15 Active SaTC Frontier Projects data privacy Privacy Tools for Sharing Research Data (2012); Harvard University $4.8M for 4 years healthcare Enabling Trustworthy Cybersystems for Health and Wellness (2013) Dartmouth, UIUC, JHU, Michigan $10M for 5 years outsourced computation Modular Approach to Cloud Security (2014) BU, MIT, Northeastern, U. Connecticut $10M for 5 years trust in cloud Rethinking Security in the Era of Cloud Computing (2013) ; UNC, NCSU, Stony Brook, Duke, Wisconsin-Madison $6M for 5 years socio-economics Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives (2012); UCSD, Berkeley, GMU $10M for 5 years web privacy Towards Effective Web Privacy Notice and Choice (2013) CMU, Fordham, Stanford $3.75M for 4 years program obfuscation Center for Encrypted Functionalities (2014) UCLA, Stanford, Columbia, UT Austin, JHU $4.9M for 5 years machine learning Center for Trustworthy Machine Learning (2018) Penn State, Stanford, Berkeley, UCSD, Wisconsin- Madison, U. Virginia $10M for 5 years 15

16 Final Thoughts Multiple Venues for CPS Research CPS Program Solicitation being updated see NSF for previous year details Check cps-vo.org for lots of program info SaTC Program See NSF for current solicitation Broader than CPS security No deadlines Smart and Connected Community Solicitation being updated see NSF for previous year details Includes security and privacy within the context of SCC requires significant community engagement Check nsf.gov/cise/scc for program info We look forward to your interest in these and other NSF programs

Secure and Trustworthy Cyberspace Program (SaTC)

Secure and Trustworthy Cyberspace Program (SaTC) Secure and Trustworthy Cyberspace Program (SaTC) Sol Greenspan Program Director Directorate for Computer & Information Science & Engineering National Science Foundation (NSF) sgreensp@nsf.gov Overview

More information

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement

More information

What makes a hot topic hot? An NSF Perspective

What makes a hot topic hot? An NSF Perspective What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance

More information

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Internet, Things, and Smartness

Internet, Things, and Smartness Internet, Things, and Smartness Outline One-liners Definitions Footprint Natl. & Intl. Initiatives NSF Opportunities Samee U. Khan Program Director CISE/CNS SmartIoT & HotWeb October 16, 2017 One-liner

More information

CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF # ) April 26, 2017

CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF # ) April 26, 2017 CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF #1650445) April 26, 2017 1 CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP)

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

to Address Cyber Physical Systems Security (CPSSEC)

to Address Cyber Physical Systems Security (CPSSEC) Combating Threats: S&T is Building a Resilient Cyber Ecosystem to Address Cyber Physical Systems Security (CPSSEC) Follow us at dhsscitech CPS Security is Critical Smart cars, grids, medical devices, manufacturing,

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY

More information

Sharing of Information & Intelligence on the Importation & Transportation of Food

Sharing of Information & Intelligence on the Importation & Transportation of Food Sharing of Information & Intelligence on the Importation & Transportation of Food Dr. Sharon Thompson, Director Center for Agriculture & Food Security & Preparedness University of Tennessee College of

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives

More information

Integrated Security Destination Area Workshop May

Integrated Security Destination Area Workshop May Integrated Security Destination Area Workshop May 19 2017 Research Breakout Sessions Cyber Physical Systems Security 5/16/2017 Virginia Tech Integrated Security Destination Area Cyber Physical Systems

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

The Path to a Secure and Resilient Power Grid Infrastructure

The Path to a Secure and Resilient Power Grid Infrastructure The Path to a Secure and Resilient Power Grid Infrastructure Bill Sanders University of Illinois at Urbana-Champaign www.tcipg.org whs@illinois.edu 1 Power Grid Trust Dynamics Span Two Interdependent Infrastructures

More information

California Cybersecurity Integration Center (Cal-CSIC)

California Cybersecurity Integration Center (Cal-CSIC) California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine

More information

Picasso Panel Thinking Beyond 5 G David Corman

Picasso Panel Thinking Beyond 5 G David Corman Picasso Panel Thinking Beyond 5 G David Corman Program Director Directorate for Computer and Information Science and Engineering National Science Foundation June 19, 2018 Some Motivation: Toward Smart

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail

High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail November 20, 2008 Chris Greer Director, US National Coordination Office Networking and Information Technology Research

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

Research Strategies in Informatics at NSF

Research Strategies in Informatics at NSF Research Strategies in Informatics at NSF Ken Calvert Division Director, Computer and Network Systems Directorate for Computer & Information Science & Engineering 11 th SCJ Symposium on Informatics Image

More information

Smart Grid Security Illinois

Smart Grid Security Illinois Smart Grid Security Efforts @ Illinois TCIPG: Trustworthy Cyber Infrastructure for the Power Grid Drive the design of an resilient cyber infrastructure electric power which operates through attacks $18.8

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information

EU LEIT-ICT program and SE position on FP9

EU LEIT-ICT program and SE position on FP9 EU LEIT-ICT program 2018-2020 and SE position on FP9 Johan Harvard, Deputy Director, Ministry of Enterprise and Innovation Ministry of Enterprise and Innovation 1 Horizon 2020 A European Research & Innovation

More information

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart

More information

Strategic Transport Research and Innovation Agenda - STRIA

Strategic Transport Research and Innovation Agenda - STRIA Strategic Transport Research and Innovation Agenda - STRIA Brussels, 15 September 2016 Cristina Marolda DG Mobility & Transport European Commission Mobility & Transport Why do we need a new transport R&I

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

The Next Frontier in Medical Device Security

The Next Frontier in Medical Device Security The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($

More information

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat 2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation

More information

Power Affiliates Program Highlights. Pete Sauer

Power Affiliates Program Highlights. Pete Sauer Power Affiliates Program Highlights Pete Sauer 2014 Affiliates Ameren Bitrode CWLP Continental Automotive EMCWA Exelon Flanders Electric G&W Electric MidAmerican M.A. Pai PowerWorld S&C Electric Sargent

More information

Cyber Security CRA Overview

Cyber Security CRA Overview Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Trustworthy Information Systems Program

Trustworthy Information Systems Program Trustworthy Information Systems Program Joint Meeting of ASQ Software SIG, SSQ, SSIG/IEEE Computer Society 24 June 2008 Tom Rhodes, PM, TIS Program National Institute of Standards and Technology Information

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

About. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium

About. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium Supported by About Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration Industry Academia Cybersecurity Consortium Public Agencies National Cybersecurity R&D

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Midwest Big Data Hub Accelerating the Big Data Innovation Ecosystem

Midwest Big Data Hub Accelerating the Big Data Innovation Ecosystem Ed Seidel PI (Illinois) Beth Plale Co-PI (Indiana) Sarah Nusser Co-PI (Iowa State) Brian Athey Co-PI (Michigan) Josh Riedy Co-PI, (UND) Melissa Cragin ED (Illinois) SEEDCorn: Sustainable Enabling Environment

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018 DHS SCIENCE AND TECHNOLOGY CSD Project Overview March 13, 2018 Dr. Ann Cox Program Manager Cyber Security Division Science and Technology Directorate CSD Mission & Strategy REQUIREMENTS CSD MISSION Develop

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан)

Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Фарид Нахли, координатор программ, Региональный офис МСЭ 1 Санкт-Петербург, 19-20 июня 2017

More information

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Cybersecurity ecosystem and TDL Antonio F. Skarmeta Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

Department of Homeland Security Science & Technology

Department of Homeland Security Science & Technology Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T

More information

DISTRIBUTED BIG DATA & ANALYTICS INNOVATION WORKING GROUP Internet2

DISTRIBUTED BIG DATA & ANALYTICS INNOVATION WORKING GROUP Internet2 DISTRIBUTED BIG DATA & ANALYTICS INNOVATION WORKING GROUP 2016 Internet2 DBDA Innovation Working Group AGENDA Evolution of the DBDA Innovation Working Group: Marc Hoit, North Carolina State University

More information

Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative

Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative Research and education to enable renewable energy resources Dennis Ray Deputy Director Power Systems Engineering Research

More information

CyLab Mobility Research Center. Martin Griss & Priya Narasimhan

CyLab Mobility Research Center. Martin Griss & Priya Narasimhan CyLab Mobility Research Center Martin Griss & Priya Narasimhan July 1, 2008 1 Mobility Research Summit Agenda 11.30 Lunch Welcome, introductions 12.00 Background, goals 12.30 Faculty presentations 2.00

More information

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1 The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber

More information

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015 ICT Policy Perspective for APEC Ministry of Internal Affairs and Communications March 2015 Current Status in APEC Region 1 GDP Growth Rate Twice the global average Share of Global Communications Service

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness 2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

Presentation to ACSAC 2009 Cyber Security and Information Assurance R&D

Presentation to ACSAC 2009 Cyber Security and Information Assurance R&D Presentation to ACSAC 2009 Cyber Security and Information Assurance R&D Federal Networking and Information Technology Research and Development (NITRD) Program Tomas Vagoun Technical Coordinator vagoun@nitrd.gov

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

About Us. Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016

About Us. Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016 Supported by About Us Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016 Academia Vision: To set up a seamless platform for

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project

More information

Cybersecurity Risk Management:

Cybersecurity Risk Management: Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of

More information

Looking beyond IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia -

Looking beyond IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia - Looking beyond 2020 IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia - sandro.delia@ec.europa.eu The overall context of EU research Multiannual Financial Framework budget proposal

More information

Global Security Operation Center GSOC

Global Security Operation Center GSOC Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations

More information

An NSF Cybersecurity Center of Excellence to Support Research

An NSF Cybersecurity Center of Excellence to Support Research An NSF Cybersecurity Center of Excellence to Support Research Jim Basney, Tom Barton, and Kim Milford Internet2 Global Summit May 18 2016 trustedci.org Agenda Overview of CTSC (Jim) Cybersecurity for Science:

More information

The Road to Industry 4.0

The Road to Industry 4.0 The Road to Industry 4.0 Secure remote access and active cyber protection for industrial machinery Hamburg, May 22, 2017 Fabian Bahr G+D Group Business Units and Divisions G+D Mobile Security Financial

More information

Summary of Cyber Security Issues in the Electric Power Sector

Summary of Cyber Security Issues in the Electric Power Sector Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki

More information

A Living-Lab Model: Resilience Through Translational Technology and Policy Virginia Tech and Arlington County, as an example.

A Living-Lab Model: Resilience Through Translational Technology and Policy Virginia Tech and Arlington County, as an example. A Living-Lab Model: Resilience Through Translational Technology and Policy Virginia Tech and Arlington County, as an example November 17, 2014 Anne Khademian Director, School of Public & International

More information

Mass Big Data: Progressive Growth through Strategic Collaboration

Mass Big Data: Progressive Growth through Strategic Collaboration Massachusetts Technology Collaborative Mass Big Data: Progressive Growth through Strategic Collaboration Patrick Larkin, Executive Director The Innovation Institute at the Massachusetts Technology Collaborative

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

CINC UP: CYBERSECURITY RESEARCH ACCELERATION WORKSHOP AND SHOWCASE. Brought to you by CENIC and Internet2. JOHN DUNDAS VP and CTO, CENIC

CINC UP: CYBERSECURITY RESEARCH ACCELERATION WORKSHOP AND SHOWCASE. Brought to you by CENIC and Internet2. JOHN DUNDAS VP and CTO, CENIC CINC UP: CYBERSECURITY RESEARCH ACCELERATION WORKSHOP AND SHOWCASE Brought to you by CENIC and Internet2 JOHN DUNDAS VP and CTO, CENIC FLORENCE HUDSON SVP & Chief Innovation Officer, Internet2 CINC UP:

More information

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology 1 Speaker

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Challenges and Opportunities in Cyber Physical System Research

Challenges and Opportunities in Cyber Physical System Research Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information