Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems

Size: px
Start display at page:

Download "Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems"

Transcription

1

2 Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems 12/03/2014 Christopher Oster

3 About Me B.S. Computer Science, M.S. Computer Engineering Penn State University 11 years at Lockheed Martin Systems & Software Architect at Lockheed Martin Advanced Technologies Lab, Chief Architect for DARPA Insight Program Research Interests Analytics Systems Thinking Decision Analysis Engineering Methodologies Systems Architecture 3

4 Chair: Dr. Jon Wade Committee Chair and Members Members Dr. Rob Cloutier (Stevens, SSE) Dr. Souran Manoochehri (Stevens, Mechanical Engineering) Dr. Ricardo Valerdi (Arizona State) Mr. Sanford Friedenthal

5 Problem Statement Product line and platform-based design approaches can drive down the recurring cost of new unique mission systems, however traditional product line approaches do not work well for system families where each implementation has significantly unique operational requirements (i.e. aerospace & defense) Organizations developing complex cyber-physical systems have often struggled with realizing the full value of their organizational intellectual property as structured, managed reuse has proven elusive, especially within the Aerospace & Defense market Composable design is a systems architecture and development concept focusing on composing new systems from known components, designs, product lines and reference architectures as opposed to focusing on "blank sheet" designs based on requirements decomposition alone 5

6 Traditional Product Lines A set of [systems] that share a common, managed set of features satisfying the specific needs of a particular market segment or mission and that are developed from a common set of core assets in a prescribed way Carnegie Mellon SEI Bosch s Product Line Taxonomy [1] 6

7 Composable Architectures Capture variability through an overarching reference architecture, mathematical constraints (design rules) and a catalog of alternatives at the feature, component, subsystem (or system) level The system reference architecture establishes the design context for a composable, optimization-based decision support tool suite Mathematical rules indicate what selections are compatible with other selections, what requirements constrain specific design choices and what attribute values are allowed within the context of a valid system architecture The catalog model supports strategic reuse of existing components and designs by ensuring they are considered in context by architects during new system designs 7

8 Hypotheses Traditional product line design methods, centered on feature tree decomposition, do not scale well into markets and problem types where constraining system configurations to a limited set of variants is not desired, but where both commonality and reuse of system and infrastructure elements are. A composable design approach for managing this class of product lines provides a mechanism for strategically managing commonality while supporting high variability in final products. The specific value of implementing a composable design framework in a given organization will be tied to the impact of reuse of given elements (including design elements, supporting infrastructure, intellectual property, etc) by category. Specifically for the design, development, production and test of a cyber-physical system, this value will exceed 25% of the cost of a system, as compared to a design created from scratch. The implementation of a composable design framework for an organization will drive up the likelihood of reuse of a given component over more traditional reuse methodologies, increasing the value of a given reusable asset by greater than 25%.

9 Innovation and Contributions to Field Composable design provides a mechanism for applying product line concepts to families of solutions with widely varying mission use cases This research is providing the following contributions to the systems engineering field Formalizing a composable data modeling methodology for complex cyber-physical product families Developing and verifying a mathematical constraint language and toolkit extending SysML to capture variability rules and capability interfaces to ensure composed solutions are valid and mission compliant Designing and Implementing an optimization guided design synthesis capability applying a novel multi-tier design optimization approach 9

10 Composable Design Reference Architecture Composable System Reference Architecture Structural Architecture Model Architectural Variability Model Component Capabilities Model Variability Constraints Model System Verification Model System Optimization Model Descriptive Model Parametric Model Analysis Model SoS Mission/ SoS Threat Mission/ SoS Models Threat Mission/ Capability Models Performance Threat Models Models SoS Mission/ SoS Threat Mission/ SoS Models Threat Mission/ Mission Models Threat Analysis Models Models Cost Model 10

11 Constraint-based Design Input 1 Input 2 Input 3 Input 4 Input 5 Input 6 Constraints IC1: IC2: IC3: SC1: SC2: SC3: 1. Establish constraint order based on data dependency graph 2. Navigate model for constraint input values 3. Populate execution framework with known data values 4. Execute independent constraints 5. For each available configuration 1. Execute each selection-dependent constraint in the constraint set 2. If all constraints pass, configuration is valid 3. If any constraint fail, record which constraint resulted in failure and end 6. Populate results into output variables and establish valid configuration list for this constraint 7. Move to next constraint set and repeat Available Configs Valid Configs Required_Component_Bandwidth must be less than or equal to Total_Comms_Bandwidth SUM(Selected_Components_Bandwidth) Multiple sets of individual constraints allow architects to establish rules of design without pre-establishing a full feature tree common in product line approaches and variability modeling 11

12 Approach Guided Synthesis Component Technologies Representative Missions Reference Architecture Tier One: SoS Characterization Batch Mode (offline) Interactive Tier Two: Tradespace Trimming Mission Definition Selection Made Tier Three: Guided Optimization If we have Governing reference architecture Model-based relationships and constraints Links to digital design artifacts Analyses for system level KPPs Candidate Configuration(s) System Architect We can optimize a system design for a given mission need, but Finding an optimal design is computationally challenging for a sufficiently complex system given the combinatorics of the problem. This tiered approach is structured to allow for real-time assessment such that an architect can interactively design a near-optimal system. 12

13 Tool Architecture 13

14 Predicted benefits of Composable Design Faster turnaround time for bids and bid architectures Better handoff of information from bid to program start Better control of organizational reuse Drive cost out of supply chain through common parts Increase the value of infrastructure investments Limit the cost of engineering release Initial pilot effort underway with Lockheed Martin Results

15 Conclusions/Future Research Composable Design methods provide a mechanism for managing organizational intellectual property in a value-driven way Methods and framework will continue to be developed in accordance with the research design previously discussed True impact of the methodology will be measured through industry piloting. Lockheed Martin Space Systems pilot already underway Additional engagement from non-aerospace desired

16 Contact Christopher Oster

Attack Trees Red Teaming

Attack Trees Red Teaming Attack Trees Red Teaming who am i Matteo Beccaro Twitter: @_bughardy_ Chief Technology Officer at @_opposingforce. Conference speaker & trainer. Messing around with networks and protocols. Often flying

More information

The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance

The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance Dr. Richard Mark Soley Chairman and CEO Object Management Group, Inc. With thanks to the OMG Systems Assurance Domain Task

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Architecture-driven development of Climate Control Software LMS Imagine.Lab Embedded Software Designer Siemens DF PL

Architecture-driven development of Climate Control Software LMS Imagine.Lab Embedded Software Designer Siemens DF PL Architecture-driven development of Climate Control Software LMS Imagine.Lab Embedded Software Designer Siemens DF PL Restricted Siemens AG 2017 Realize innovation. Content 1 Overview 3 2 LMS Imagine.Lab

More information

Advancing Cyber Intelligence Practices Through the SEI s Consortium

Advancing Cyber Intelligence Practices Through the SEI s Consortium Advancing Cyber Intelligence Practices Through the SEI s Consortium SEI Emerging Technology Center Jay McAllister Melissa Kasan Ludwick Copyright 2015 Carnegie Mellon University This material is based

More information

Cyber Threat Prioritization

Cyber Threat Prioritization Cyber Threat Prioritization FSSCC Threat and Vulnerability Assessment Committee Jay McAllister Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information

More information

CLOUD RISK AND GOVERNANCE Professional services for the enterprise

CLOUD RISK AND GOVERNANCE Professional services for the enterprise cloud consulting CLOUD RISK AND GOVERNANCE Professional services for the enterprise Effectively gauge cloud risk to implement the proper security measures and reporting metrics for your journey to the

More information

State of Security Operations

State of Security Operations State of Security Operations Roberto Sandoval / September 2014 Security Intelligence & Operations Consulting Founded: 2007 The best in the world at building state of the art security operations capabilities/cyber

More information

NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview

NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview Network Centric Operations Industry Consortium NCOIC Interoperability Framework (NIF ) NCOIC Interoperability Framework (NIF ) and NCOIC Patterns Overview and NCOIC Patterns Overview August 2008 Approved

More information

Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST

Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST 800-171 Davidson Technologies Founded in 1996 by Dr. Julian Davidson Father of Missile Defense in America Sen. Jeff Sessions

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Code Harvesting with Zeligsoft CX

Code Harvesting with Zeligsoft CX Code Harvesting with Zeligsoft CX Zeligsoft November 2008 Code Harvesting with Zeligsoft CX Code harvesting with component modeling increases software reuse and improves developer efficiency for embedded

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Muhammad Ali Babar National ICT Australia Ltd. and University of New South

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

Mission Aware Cybersecurity

Mission Aware Cybersecurity Mission Aware Cybersecurity Cody Fleming (UVA) Scott Lucero (OSD) Peter Beling, Barry Horowitz (UVA), Calk Elks (VCU) October 2016 1 Systems Engineering Research Center (SERC) Overview DoD and the Intelligence

More information

Model Driven Development with xtuml and BridgePoint

Model Driven Development with xtuml and BridgePoint Model Driven Development with xtuml and BridgePoint xtuml Executable and Translatable UML Unified Modeling Language Industry standard notation Family of languages Executable UML Defines a method, including:

More information

Synergies of the Common Criteria with Other Standards

Synergies of the Common Criteria with Other Standards Synergies of the Common Criteria with Other Standards Mark Gauvreau EWA-Canada 26 September 2007 Presenter: Mark Gauvreau (mgauvreau@ewa-canada.com) Overview Purpose Acknowledgements Security Standards

More information

Cyber Semantic Landscape Ontology and Taxonomy

Cyber Semantic Landscape Ontology and Taxonomy The Cyber Semantic Landscape Ontology and Taxonomy (CSLOT) provides a structured approach to the dynamic needs of the Cyber security concepts, theories, standards, and compliance issues facing the 21st

More information

Smart Manufacturing and Standards: The NIST Role

Smart Manufacturing and Standards: The NIST Role Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October

More information

Adding Formal Requirements Modeling to SysML

Adding Formal Requirements Modeling to SysML Adding Formal Requirements Modeling to SysML Mark R. Blackburn www.markblackburn.com Abstract. This paper seeks to raise awareness on the SCR extensions derived from industry use, and discusses how an

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

Value & Risk in the New Energy Era: Rethinking Asset Investment Decisions

Value & Risk in the New Energy Era: Rethinking Asset Investment Decisions Value & Risk in the New Energy Era: Rethinking Asset Investment Decisions June 15, 2017 etsinsights.com 1 Value & Risk in the New Energy Era: Rethinking Asset Investment Decisions June 15, 2017 Agenda

More information

ASSURING DATA INTEROPERABILITY THROUGH THE USE OF FORMAL MODELS OF VISA PAYMENT MESSAGES (Category: Practice-Oriented Paper)

ASSURING DATA INTEROPERABILITY THROUGH THE USE OF FORMAL MODELS OF VISA PAYMENT MESSAGES (Category: Practice-Oriented Paper) ASSURING DATA INTEROPERABILITY THROUGH THE USE OF FORMAL MODELS OF VISA PAYMENT MESSAGES (Category: Practice-Oriented Paper) Joseph Bugajski Visa International JBugajsk@visa.com Philippe De Smedt Visa

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Enhancing Model-Based Systems Engineering with the Lifecycle Modeling Language

Enhancing Model-Based Systems Engineering with the Lifecycle Modeling Language Enhancing Model-Based Systems Engineering with the Lifecycle Modeling Language Warren K. Vaneman, Ph.D. Systems Engineering Department Naval Postgraduate School Monterey, CA Abstract As systems become

More information

Knowledge-based Systems for Industrial Applications

Knowledge-based Systems for Industrial Applications Knowledge-based Systems for Industrial Applications 1 The Topic 2 Tasks Goal: Overview of different tasks Systematic and formal characterization as a requirement for theory and implementation Script: Chap.

More information

Cybersecurity in Government

Cybersecurity in Government Cybersecurity in Government Executive Development Course: Digital Government Ng Lup Houh, Principal Cybersecurity Specialist Cybersecurity Group 03 April 2018 Agenda Cyber Threats & Vulnerabilities Cyber

More information

Threat Based Defence Alonso Jose da Silva II. GRC & Cyber Security Conference - Bringing the Silos

Threat Based Defence Alonso Jose da Silva II. GRC & Cyber Security Conference - Bringing the Silos Threat Based Defence Alonso Jose da Silva II Objectives What we will discuss Threat-based defence: principles and function Running a threat intelligence cycle Case study - financial services fraud About

More information

The Confluence of Physical and Cyber Security Management

The Confluence of Physical and Cyber Security Management The Confluence of Physical and Cyber Security Management GOVSEC 2009 Samuel A Merrell, CISSP James F. Stevens, CISSP 2009 Carnegie Mellon University Today s Agenda: Introduction Risk Management Concepts

More information

Best Practices for Model-Based Systems Engineering

Best Practices for Model-Based Systems Engineering Seminar / Workshop Best Practices for Model-Based Systems Engineering Hans-Peter Hoffmann, Ph.D. Chief Systems Methodologist, IBM Rational Software hoffmape@us.ibm.com Overview Successfully delivering

More information

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics

More information

Be Like Water: Applying Analytical Adaptability to Cyber Intelligence

Be Like Water: Applying Analytical Adaptability to Cyber Intelligence SESSION ID: HUM-W01 Be Like Water: Applying Analytical Adaptability to Cyber Intelligence Jay McAllister Senior Analyst Software Engineering Institute Carnegie Mellon University @sei_etc Scuttlebutt Communications

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Remarks to the HCI&IM-Sponsored National Workshop on Information Integration. Workshop Deliverables: Roadmap, Hard Problems, and Report

Remarks to the HCI&IM-Sponsored National Workshop on Information Integration. Workshop Deliverables: Roadmap, Hard Problems, and Report Federal Networking and Information Technology R&D Remarks to the HCI&IM-Sponsored National Workshop on Information Integration Workshop Deliverables: Roadmap, Hard Problems, and Report Philadelphia, Pennsylvania

More information

Industry role moving forward

Industry role moving forward Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013

More information

Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation

Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation Nov 2012 Page-1 Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation November 2012 Nov 2012 Page-2 DT&E for Complex Systems Performance Reliability Interoperability Information Security

More information

Components and Considerations in Building an Insider Threat Program

Components and Considerations in Building an Insider Threat Program Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Integrated modeling: Adopting Architecture Frameworks for Model-based Systems Engineering

Integrated modeling: Adopting Architecture Frameworks for Model-based Systems Engineering Integrated modeling: Adopting Architecture Frameworks for Model-based Systems Engineering Copyright 2014 by No Magic Inc. Published and used by The SSSE and INCOSE with permission. The author or assignee

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Organizational Readiness for Digital Transformation

Organizational Readiness for Digital Transformation IVI Community Event Organizational Readiness for Digital Transformation Dr. Marian Carcary June 22nd 2017 Introduction Digital business transformation goes beyond traditional process optimization, to leveraging

More information

Ontology Engineering for Product Development

Ontology Engineering for Product Development Ontology Engineering for Product Development Henson Graves Lockheed Martin Aeronautics Company Fort Worth Texas, USA henson.graves@lmco.com Abstract. This analysis is to identify requirements for a Description

More information

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Standard SOA Reference Models and Architectures

Standard SOA Reference Models and Architectures Standard SOA Reference Models and Architectures The Open Group Perspective 4 February 2009 Dr Christopher J Harding Forum Director Tel +44 774 063 1520 (mobile) c.harding@opengroup.org Thames Tower 37-45

More information

Collective Mind. Early Warnings of Systematic Failures of Equipment. Dr. Artur Dubrawski. Dr. Norman Sondheimer. Auton Lab Carnegie Mellon University

Collective Mind. Early Warnings of Systematic Failures of Equipment. Dr. Artur Dubrawski. Dr. Norman Sondheimer. Auton Lab Carnegie Mellon University Collective Mind Early Warnings of Systematic Failures of Equipment Dr. Artur Dubrawski Auton Lab Carnegie Mellon University Dr. Norman Sondheimer University of Massachusetts Amherst 1 Collective Mind Unique

More information

The University of Queensland

The University of Queensland UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment Mitigating Risk with Ongoing Cybersecurity Risk Assessment Scott Moser CISO Caesars Entertainment CSO50 Presentation Caesars Entertainment Cybersecurity Risk Management Scott Moser Chief Information Security

More information

DOMAIN ENGINEERING OF COMPONENTS

DOMAIN ENGINEERING OF COMPONENTS 4-02-55 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES DOMAIN ENGINEERING OF COMPONENTS Carma McClure INSIDE Definition of Components; Component-Based Development; Reuse Processes; Domain

More information

Cybersecurity & Risks Analysis

Cybersecurity & Risks Analysis Working Together to Build Confidence Cybersecurity & Risks Analysis Djenana Campara Chief Executive Officer Member, Object Management Group Board of Directors Co-Chair, System Assurance Task Force Cyber

More information

Air Force Test Center

Air Force Test Center Air Force Test Center Avionics Cyber Range (ACR) DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Bill L'Hommedieu ACR Chief Engineer 96 th Cyber Test Group 7 May 2018

More information

Space Cyber: An Aerospace Perspective

Space Cyber: An Aerospace Perspective Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org

More information

SAP security solutions Is your business protected?

SAP security solutions Is your business protected? www.pwc.com SAP security solutions Is your business protected? SAP security overview Background SAP Security is becoming more difficult to control due to a constantly evolving compliance landscape and

More information

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in

More information

SOFTWARE ARCHITECTURE INTRODUCTION TO SOFTWARE ENGINEERING PHILIPPE LALANDA

SOFTWARE ARCHITECTURE INTRODUCTION TO SOFTWARE ENGINEERING PHILIPPE LALANDA SOFTWARE ARCHITECTURE INTRODUCTION TO SOFTWARE ENGINEERING PHILIPPE LALANDA PURPOSE OF THIS CLASS An introduction to software architecture What is an architecture Why it is important How it is represented

More information

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.

More information

Retrofitting Ground Systems to improve Cyber Security

Retrofitting Ground Systems to improve Cyber Security Retrofitting Ground Systems to improve Cyber Security Michael Worden Security Engineer 25 February 2014 Copyright 2014 Raytheon Company. Published by The Aerospace Corporation with permission.. Customer

More information

Analyzing the Product Line Adequacy of Existing Components

Analyzing the Product Line Adequacy of Existing Components Analyzing the Product Line Adequacy of Existing Components Jens Knodel and Dirk Muthig Fraunhofer Institute for Experimental Software Engineering (IESE), Fraunhofer-Platz 1, D-67663 Kaiserslautern, Germany

More information

Systems 2020 Strategic Initiative Overview

Systems 2020 Strategic Initiative Overview Systems 2020 Strategic Initiative Overview Kristen Baldwin ODDR&E/Systems Engineering 13 th Annual NDIA Systems Engineering Conference San Diego, CA October 28, 2010 Oct 2010 Page-1 DISTRIBUTION STATEMENT

More information

Semantics-Based Integration of Embedded Systems Models

Semantics-Based Integration of Embedded Systems Models Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current

More information

Information Security Continuous Monitoring (ISCM) Program Evaluation

Information Security Continuous Monitoring (ISCM) Program Evaluation Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda

More information

What s a BA to do with Data? Discover and define standard data elements in business terms

What s a BA to do with Data? Discover and define standard data elements in business terms What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data

More information

The ERA of Enterprise Architecture 2.0

The ERA of Enterprise Architecture 2.0 The ERA of Enterprise Architecture 2.0 Aaron Tan Dani aarontan@atdsolution.com / aarontan@iasahome.org Founder and Chairman, IASA Asia Pacific / Chief Architect, ATD Solution Asia Pacific www.atdsolution.com

More information

Decision. Intelligent. Assistant: Research and Technical Background. Emergency. ENEA, July by C.Balducelli S.Bologna and A.M.

Decision. Intelligent. Assistant: Research and Technical Background. Emergency. ENEA, July by C.Balducelli S.Bologna and A.M. EIDA Project ( Proposal ) Emergency Intelligent Decision Assistant: Toolkit for Coordinated Emergency Management Research and Technical Background by C.Balducelli S.Bologna and A.M.Gadomski ENEA, July

More information

Implementing the Army Net Centric Data Strategy in a Service Oriented Environment

Implementing the Army Net Centric Data Strategy in a Service Oriented Environment Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support

More information

Engineered Resilient Systems Advanced Analytics and Modeling in Support of Acquisition

Engineered Resilient Systems Advanced Analytics and Modeling in Support of Acquisition Engineered Resilient Systems Advanced Analytics and Modeling in Support of Acquisition David R. Richards Lead Technical Director for ERS US Army Engineer Research and Development Center (ERDC) Research

More information

New Guidance on Privacy Controls for the Federal Government

New Guidance on Privacy Controls for the Federal Government New Guidance on Privacy Controls for the Federal Government IAPP Global Privacy Summit 2012 March 9, 2012 Dr. Ron Ross Computer Security Division, NIST Martha Landesberg, J.D., CIPP/US The Privacy Office,

More information

ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK

ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK Raul J. Diaz USAF, 50 th Network Operations Group, raul.diaz@us.af.mil ABSTRACT Our cultural expectation about technology continually

More information

Next-Generation Architecture for Virtual Prototyping

Next-Generation Architecture for Virtual Prototyping Next-Generation Architecture for Virtual Prototyping Dr. Bipin Chadha John Welsh Principal Member Manager Lockheed Martin ATL Lockheed Martin ATL (609) 338-3865 (609) 338-3865 bchadha@atl.lmco.com jwelsh@atl.lmco.com

More information

TEL2813/IS2621 Security Management

TEL2813/IS2621 Security Management TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information

More information

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework Prepared by: Larry Wilson lwilson@umassp.edu Chief Information Security Officer University

More information

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,

More information

RT-204: Systemic Security and the Role of Hierarchical Design in Cyber-Physical Systems

RT-204: Systemic Security and the Role of Hierarchical Design in Cyber-Physical Systems RT-204: Systemic Security and the Role of Hierarchical Design in Cyber-Physical Systems Sponsor: DASD(SE) By Dr. Valerie B. Sitterle Mr. Tom McDermott 10 th Annual SERC Sponsor Research Review November

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

Asya Campbell Kevin Wilson Dr. Lawrence Miller Don Sather Dr. Alan Unell Dr. Diana Webber

Asya Campbell Kevin Wilson Dr. Lawrence Miller Don Sather Dr. Alan Unell Dr. Diana Webber Applying Guiding Principles in the Development of Architectures, Acquisition Specifications, and Operating Practices for Affordable and Resilient Satellite Ground Systems Asya Campbell Kevin Wilson Dr.

More information

Systems Engineering Update/SD-22

Systems Engineering Update/SD-22 Systems Engineering Update/SD-22 Presented to the Parts Standardization & Management Committee October 30 - November 1, 2012 IDA 4850 Mark Center Drive Alexandria, Virginia 22311 Outline News from the

More information

Joint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC?

Joint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC? 21 st Annual National Defense Industrial Association Systems and Mission Engineering Conference Joint Federated Assurance Center (JFAC): 2018 Update Thomas Hurt Office of the Under Secretary of Defense

More information

System Security Engineering: Whose Job Is It Anyway?

System Security Engineering: Whose Job Is It Anyway? System Engineering: Whose Job Is It Anyway? NDIA SE Symposium SSE Track #18703 ctober 24, 2016 Ms Perri Nejib, Fellow, Northrop Grumman perri.nejib@ngc.com Approved For Public Release #16-1910; Unlimited

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella

Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers J. Kelly Stewart Steve Oplinger James Marcella 1 Session Description What exactly does a risk assessment mean to the integrator

More information

Modeling Requirements, Architectures, Behaviour...

Modeling Requirements, Architectures, Behaviour... Modeling Requirements, Architectures, Behaviour... The System Modeling Language (SysML) and the SYSMOD modeling approach Budapest University of Technology and Economics Department of Measurement and Information

More information

The Emerging Data Lake IT Strategy

The Emerging Data Lake IT Strategy The Emerging Data Lake IT Strategy An Evolving Approach for Dealing with Big Data & Changing Environments bit.ly/datalake SPEAKERS: Thomas Kelly, Practice Director Cognizant Technology Solutions Sean Martin,

More information

Supplier Training Excellence Program

Supplier Training Excellence Program Supplier Training Excellence Program Cybersecurity Webinar February 9, 2017 Agenda Why must my company complete the Cyber Questionnaire(s)? What are the Cyber Questionnaire(s)? How do I get help? What

More information

Test and Evaluation. The Key to Successful Acquisition Outcomes. Steve Hutchison. 3 October Director Office of Test and Evaluation

Test and Evaluation. The Key to Successful Acquisition Outcomes. Steve Hutchison. 3 October Director Office of Test and Evaluation Test and Evaluation The Key to Successful Acquisition Outcomes 3 October 2017 Steve Hutchison Director Office of Test and Evaluation DHS Test & Evaluation Year in Review USCG Fast Response Cutter FOT&E

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

Software Architecture Thoughts for the System Security Design

Software Architecture Thoughts for the System Security Design Software Architecture Thoughts for the System Security Design Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 James Ivers April 17, 2007 Role of Software Architecture If

More information

Governance for the Public Sector Cloud

Governance for the Public Sector Cloud Governance for the Public Sector Cloud Managing Cost and Ensuring Compliance Paving the Way to the Cloud Forecasting a potential 30% reduction in data infrastructure spend, the U.S. Government embarked

More information

Operationalizing Cyber Security Risk Assessments for the Dams Sector

Operationalizing Cyber Security Risk Assessments for the Dams Sector Operationalizing Cyber Security Risk Assessments for the Dams Sector Kevin Burns, Jason Dechant, Darrell Morgeson, and Reginald Meeson, Jr. The Problem To evaluate vulnerability to the postulated threat,

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface How to Underpin Security Transformation With Complete Visibility of Your Attack Surface YOU CAN T SECURE WHAT YOU CAN T SEE There are many reasons why you may be considering or engaged in a security transformation

More information

USING PUBLIC-PRIVATE PARTNERSHIPS TO INNOVATE AND REACH NEW PEOPLE

USING PUBLIC-PRIVATE PARTNERSHIPS TO INNOVATE AND REACH NEW PEOPLE USING PUBLIC-PRIVATE PARTNERSHIPS TO INNOVATE AND REACH NEW PEOPLE Dr. Joe Adams Vice President for Research and Cyber Security, Merit Network, Inc. 2015 Internet2 Using Public-Private Partnerships to

More information

Developing a Model for Cyber Security Maturity Assessment

Developing a Model for Cyber Security Maturity Assessment Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am

More information