Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Size: px
Start display at page:

Download "Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte"

Transcription

1 Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012

2 About CyberDNA Vision CyberDNA Center is to enable assurable and usable security and privacy for a smart open society by making cyber defense provable, measurable, and automated. (1) promoting automated analytics and synthesis of designing, configuration and evaluation of mission oriented security systems, (2) offering leap ahead research by integrating multidisciplinary research from security, networking, reliability, risk management, economical, behavioral and physical world communities, and (3) developing deployable tools to facilitate technology transfer and workforce (students) education and preparation. Application Domains Enterprise & Clouds networks Cyber Physical Systems & Critical infrastructure (e.g., secure systems fir smart planet) Software defined network environment

3 Research Team Scale of Expertise Domains Team Objectives Secure Coding Application Security Policies Security Protocols OS / VM Network MAC Physical Ehab Al-Shaer Bill Chu Heather Lipford Mohamed Shehab Weichao Wang Yongge Wang Xintao Wu Cryptology/ Privacy Integrity Availability/ Dependability Usage / Authorization Usability/ Complexity

4 CyberDNA Research Themes Security Configuration Analytics Automated security Configuration verification, diagnosis and hardening (bottom up approach) Automated configuration synthesis(top down approach) Proactive Security for Smart Grid Moving Target Defense Mutable Random Configurations (Host IP, Routes etc) MTD Effectiveness Analysis Secure Remote Health Care Home based assistant living health care Secure and dependable telesurgery Data Mining and Privacy Usable Security Management of Smart phone access control Social networks privacy interfaces

5 On the Effectiveness of Mutable Hosts for Moving Target Defense TO appear in SIGCOMM SDN 2012

6 MTD (IP Mutation) 3D Goals Attack Distribution completely or partially. Attack Deception (e.g., network mapping or fingerprinting). Attack Deterrence (e.g., slow down worms; increase required scanning) to make attacks more observable. Creating metrics and techniques to measure and evaluate MTD according to these goals is still an open challenging problem.

7 MTD for Countering Reconnaissance Attacks Network reconnaissance is a precursory step for any attackers Reconnaissance Attacks include external scanners, worm scanning, and network mappers. Reconnaissance techniques have many different strategies and parameters. E.g., Many worms propagation techniques exist

8 Objectives Mutation: assign/change hosts virtual IPs (VIP) randomly and synchronously over time while preserving the system requirements. Random mutation to increase the uncertainty on the adversary Frequent mutation to outperform powerful automated scanners Safety: Correct mutation to preserve network configuration integrity Non-intrusiveness: Seamless mutation to minimize service disruption and traffic delays Transparency: Transparent architecture to deploy RHM on existing networks with no significant changes in the end-hosts or network infrastructure.

9 Architecure

10 RHM Optimization Problem Routing delay convergence Unpredictability Non-Similarity Mutation Speed Routing Table Size

11 Evaluation Objectives: How much MTD can protect? Given the scanning model, what is a the probability (θ) of that a MT host will not be identified/infected (Called MTD Protection Effectiveness (MPE)? How MTD parameters (such as speed, address space, random function, etc) can impact MPE? How scanning attack strategies (e.g., hit list, sequential, repeatable random, non repeatable random, intelligent, coordinated) can impact MPE? How to measure/assess the overhead (operational and management) of MTD? Our approach is to answer these questions analytically as well empirically (using simulation), and show that they match! Our ultimate goal is to balance MTD Effectiveness and Overhead.

12 MTD Evaluation Framework Modeling and Analysis We developed a flexible MTD simulator Low Frequency Mutation (LFM) for moving network ID IP address High Frequency Mutation for moving host ID IP address We developed many different classes of scan and worm propagation strategies: Repeatable vs. non Repeatable Random vs. intelligent Decentralized vs. coordinated Simulation Parameters: Network size, K (speed ratio), % of MT hosts,

13 MTD Effeteness with Repeatable Random Worms MTD Increasing MT Speed does not help Infection is inevitable but detectability is significantly increased (4 times)

14 NSF Industry & University Cooperative Research Center (I/UCRC) for Configuration Analytics and Automation (CCAA) 14

15 Universities and Principal Investigators (PI) University of North Carolina at Charlotte (lead) Dr. Ehab Al Shaer George Mason University Dr. Sushil Jajodia University of California Davis Dr. Felix Wu Pending: UNC Chapel Hill and NCSU 15

16 Center for Configuration Analytics and Automation (CCAA) Vision The internationally recognized collaborative research activity focused on configuration analytics and automation for complex information and communication networks/systems. Mission Enabling collaborative industry and government directed research in configuration analytics and automation capabilities and their integration for the efficient, accurate and timely operations management and defense of complex networked information systems and networks; and the encouragement and development of top quality graduates with knowledge and experience in this field. The CCAA objective is to address the pressing challenges and create leap ahead innovative research in configuration analytics and automation to improve manageability, assurability, security and sustainability of the following complex system of systems: Enterprise networking, clouds and data centers, Critical and mission oriented infrastructures Hybrid and cyber physical systems Smart configurable end services Virtual overlays and ubiquitous systems. 16

17 Center for Configuration Analytics and Automation (CCAA) Initial Goals Establish a multi university research Center for Configuration Analytics and Automation under the National Science Foundation s (NSF s) Industry/University Cooperative Research Center (I/UCRC) Program. Begin industry and government center member directed research in the spring of Develop a collaborative framework and research roadmap to advance capabilities for enterprise level configuration management analytics and automated defense of targeted complex ICT environments and systems. Expand the participation in the CCAA activities through inclusion of multidiscipline researchers and members to achieve an integration of new techniques to yield broader commercial interest. 17

18 Center for Configuration Analytics and Automation (CCAA) Benefits to Prospective International Members Unique collaborative environment with academic, industry and government agencies Faculty and Students collaboration Providing opportunity to international universities to attract local industry and share resources Create and direct IP shared specific pre competitive research efforts required in this field. Opportunity to collaboratively guide and support a broad research capability through member developed research initiatives. Participate in a historically successful NSF approach that advances important capabilities needed by critical elements of societies. Influence ongoing research quality and future research efforts through annual advisory board reviews conducted twice a year by members. 18

19 High ROI 10% overhead Cost effective teaming Costeffective Timely problems Usable Deployable Case study Practical CCAA Innovation Long term/leapahead research Multi disciplinary High risk and high payoff High Impact Open source & Tech transfer Standardization Education and workforce 19

20 Examples of Potential Research Project Areas* Configuration Query Language (CQL) for Integrated Management (UNC Charlotte) Closing the Automation Loop (UNC Charlotte) Proactive/Dynamic Configuration Management (George Mason and UNC Charlotte) Security Considerations in Data Center Configuration Management (George Mason and UNC Charlotte) Usable Configurations for Trustworthy Social Informatics (UC Davis & UNC Charlotte) CNS: Configuration Nervous System (UNC Charlotte) Risk based IT Management Analytics (George Mason & UNC Charlotte) Automated Analytics of Smart Critical Infrastructures (UNC Charlotte) Automating Network Design (UNC Charlotte) Social Aware Cloud Computing (George Mason & UNC Charlotte) * See details at 20

J. Haadi Jafarian CV June J. Haadi Jafarian

J. Haadi Jafarian CV June J. Haadi Jafarian J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

The Path to a Secure and Resilient Power Grid Infrastructure

The Path to a Secure and Resilient Power Grid Infrastructure The Path to a Secure and Resilient Power Grid Infrastructure Bill Sanders University of Illinois at Urbana-Champaign www.tcipg.org whs@illinois.edu 1 Power Grid Trust Dynamics Span Two Interdependent Infrastructures

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

What makes a hot topic hot? An NSF Perspective

What makes a hot topic hot? An NSF Perspective What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance

More information

Smart Attacks require Smart Defence Moving Target Defence

Smart Attacks require Smart Defence Moving Target Defence Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Call for expression of interest in leadership roles for the Supergen Energy Networks Hub

Call for expression of interest in leadership roles for the Supergen Energy Networks Hub Call for expression of interest in leadership roles for the Supergen Energy Networks Hub Call announced: 4 th September 2017 Deadline for applications: Midday 29 th September 2017 Provisional decision

More information

Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative

Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative Benefiting from Interagency Funded I/UCRC Supplements: PSERC s Future Grid Initiative Research and education to enable renewable energy resources Dennis Ray Deputy Director Power Systems Engineering Research

More information

Information and Communication Technologies (ICT) thematic area

Information and Communication Technologies (ICT) thematic area Information and Communication Technologies (ICT) thematic area Network & Service Infrastructures 1.1 The Network of the Future (Call 4, Call 5) 2009-2010 a) Future Internet Architectures and Network Technologies

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21)

Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) NSF-wide Cyberinfrastructure Vision People, Sustainability, Innovation, Integration Alan Blatecky Director OCI 1 1 Framing the

More information

MOHAMMAD ASHIQUR RAHMAN

MOHAMMAD ASHIQUR RAHMAN 1033 NOTTINGHAM DR (APT: A), COOKEVILLE, TENNESSEE, USA Phone: +17042419165 (Cell) +19313723525 (Office) E-mail: marahman@tntech.edu; ashiq2503@gmail.com LinkedIn: http://www.linkedin.com/pub/mohammad-ashiqur-rahman/72/b71/a59/

More information

National Cyber R&D Framework: Changing The Game Recommendations from the NITRD Senior Steering Group on Cybersecurity R&D

National Cyber R&D Framework: Changing The Game Recommendations from the NITRD Senior Steering Group on Cybersecurity R&D Presentation to ACSAC 2009 National Cyber R&D Framework: Changing The Game Recommendations from the NITRD Senior Steering Group on Cybersecurity R&D Tomas Vagoun Technical Coordinator vagoun@nitrd.gov

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

Cloud computing 2015 Panel CLOUD/SERVICES

Cloud computing 2015 Panel CLOUD/SERVICES 1 Cloud computing 2015 Panel CLOUD/SERVICES From Services to Data Centers: What Do We Have to Consider for Standardizing in Cloud Computing? Yong Woo LEE, Ph.D. Professor, University of Seoul President,

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

Intelligent Buildings and Cybersecurity

Intelligent Buildings and Cybersecurity Intelligent Buildings and Cybersecurity March 14-18,2017 Frankfurt, Germany Ron Zimmer CABA President & CEO www.caba.org Connect to what s next 1 CABA Board of Directors and Vision CABA Vision Statement

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

IT Town Hall Meeting. IT Town Hall - October 6,

IT Town Hall Meeting. IT Town Hall - October 6, IT Town Hall Meeting Scott F. Midkiff Vice President for Information Technology and CIO Professor of Electrical and Computer Engineering Virginia Tech midkiff@vt.edu IT Town Hall - October 6, 2014 1 Agenda

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

School of Engineering & Computational Sciences

School of Engineering & Computational Sciences Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.

More information

UCLA RESEARCH INFORMATICS STRATEGIC PLAN Taking Action June, 2013

UCLA RESEARCH INFORMATICS STRATEGIC PLAN Taking Action June, 2013 UCLA RESEARCH INFORMATICS STRATEGIC PLAN Taking Action June, 2013 1 Project Motivation Addressing Research Informatics is among the greatest strategic requirements for UCLA s future research competitiveness

More information

Space Cyber: An Aerospace Perspective

Space Cyber: An Aerospace Perspective Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org

More information

India s National Policy On. Information Technology. Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT

India s National Policy On. Information Technology. Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT India s National Policy On Information Technology Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT Current Status of IT/ITES Industry in India Indian IT-BPO industry (excluding

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

Rethinking Cybersecurity from the Inside Out

Rethinking Cybersecurity from the Inside Out Rethinking Cybersecurity from the Inside Out An Engineering and Life Cycle-Based Approach for Building Trustworthy Resilient Systems Dr. Ron Ross Computer Security Division Information Technology Laboratory

More information

ConfigSynth: A Formal Framework for Network Security Design Synthesis

ConfigSynth: A Formal Framework for Network Security Design Synthesis ConfigSynth: A Formal Framework for Network Security Design Synthesis Mohammad Ashiqur Rahman and Ehab Al-Shaer CyberDNA Research Center, UNC Charlotte Motivation Complexity of Security Configuration is

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts

More information

Energy Action Plan 2015

Energy Action Plan 2015 Energy Action Plan 2015 Purpose: In support of the Texas A&M University Vision 2020: Creating a Culture of Excellence and Action 2015: Education First Strategic Plan, the Energy Action Plan (EAP) 2015

More information

National Open Source Strategy

National Open Source Strategy National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Faculty of Electronic Engineering Menoufya University MARCH 2015 1 st Edition Contents Introduction.....2

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

Information Security and Cyber Security

Information Security and Cyber Security Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information

More information

Standardization in the area of Cooperative systems in the MENA region

Standardization in the area of Cooperative systems in the MENA region Standardization in the area of Cooperative systems in the MENA region SAFE, SMART and SUSTAINABLE TRAFFIC VIA COOPERATIVE ITS 4th ETSI TC ITS Workshop 07-09 February 2012, Doha, Qatar Dr Muna Hamdi Director

More information

INFORMATION TECHNOLOGY ONE-YEAR PLAN

INFORMATION TECHNOLOGY ONE-YEAR PLAN INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by

More information

New CEPIS Mission

New CEPIS Mission New CEPIS Mission 2016-2020 Contents: 1 Introduction... 3 2 CEPIS Today... 3 3 CEPIS Tomorrow... 3 1.1 Mission Statement... 3 1.2 Target Audiences... 3 1.3 Strategy... 4 1.3.1 Promoting High Standards

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master

More information

Cyber Physical. Systems 27/09/2018. Presented by Nicolas and Ayman

Cyber Physical. Systems 27/09/2018. Presented by Nicolas and Ayman 1 Cyber Physical Systems 27/09/2018 Presented by Nicolas and Ayman Summary I - What are Cyber Physical Systems? II - Applications III - Technical Design IV - Design Challenges V Benefits and potential

More information

TEL2813/IS2621 Security Management

TEL2813/IS2621 Security Management TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information

More information

Pennsylvania s HIE Journey

Pennsylvania s HIE Journey Pennsylvania s HIE Journey Alix Goss, Executive Director Pennsylvania ehealth Partnership Authority William Buddy Gillespie Director Healthcare Solutions DSS What is HIE? Health Information Exchange puts

More information

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018 Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk

More information

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING MASTER OF SCIENCE DOCTORAL DEGREE GRADUATE CERTIFICATES STEVENS.EDU/GRAD-ECC MASTER OF SCIENCE IN Enterprise and Cloud Computing Enterprise and cloud

More information

Higher Education in Texas: Serving Texas Through Transformational Education, Research, Discovery & Impact

Higher Education in Texas: Serving Texas Through Transformational Education, Research, Discovery & Impact Higher Education in Texas: Serving Texas Through Transformational Education, Research, Discovery & Impact M. Dee Childs, Vice President for Information Technology & Chief Information Officer v Texas A&M

More information

Four Grand Challenges in Trustworthy Computing

Four Grand Challenges in Trustworthy Computing Overview Four Grand Challenges in Trustworthy Computing Reformatted from the presentation created and given by Dr. Gene Spafford, Purdue University. CS 6204 Spring 2005 2 Why Grand Challenges? Inspire

More information

The NeTS Program. NSF Programmable Wireless Networking Informational Meeting 5 February 2004 Arlington, Virginia

The NeTS Program. NSF Programmable Wireless Networking Informational Meeting 5 February 2004 Arlington, Virginia The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation NSF Programmable Wireless Networking Informational

More information

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. A NEW KIND OF NETWORK NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. W H Y Shortcomings of today s Internet The Missing

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018 Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral

More information

BS Electrical Engineering Program Assessment Plan By Dan Trudnowski Spring 2018

BS Electrical Engineering Program Assessment Plan By Dan Trudnowski Spring 2018 BS Electrical Engineering Program Assessment Plan By Dan Trudnowski Spring 2018 What is your program mission statement? The mission of the Electrical Engineering program at Montana Tech is to provide a

More information

ACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development

ACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development ACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development Jeremy Fischer Indiana University 9 September 2014 Citation: Fischer, J.L. 2014. ACCI Recommendations on Long Term

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

ENCS The European Network for Cyber Security

ENCS The European Network for Cyber Security ENCS The European Network for Cyber Security A not-for-profit European Public Private Partnership on cyber security for critical infrastructures Initial focus: smart grids and process control, to be extended

More information

College Of. Technological Innovation

College Of. Technological Innovation College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction

More information

Smart Grid Security Illinois

Smart Grid Security Illinois Smart Grid Security Efforts @ Illinois TCIPG: Trustworthy Cyber Infrastructure for the Power Grid Drive the design of an resilient cyber infrastructure electric power which operates through attacks $18.8

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Ontario Smart Grid Forum: Support Presentation. Tuesday, March 8 th 2011

Ontario Smart Grid Forum: Support Presentation. Tuesday, March 8 th 2011 Ontario Smart Grid Forum: Support Presentation Tuesday, March 8 th 2011 Agenda Item # 1 S.G.F. Minutes 2 Agenda Item # 1: Minutes January 17 th 2011 minutes: no further comments received. Recommended as

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

NEC Enterprise Overview

NEC Enterprise Overview NEC Enterprise Overview Huw Wilkins - NEC Enterprise Business Development NEC Enterprise Solutions EMEA March 2018 Agenda NEC Enterprise Portfolio Overview NEC Networking NEC VDI NEC High Availability

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

USE CASE STUDY. Connecting Data Through Mission. Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee

USE CASE STUDY. Connecting Data Through Mission. Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee USE CASE STUDY Connecting Data Through Mission Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee USE CASE STUDY: Department of VERSION Transportation 1.0 / 2015

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015 ICT Policy Perspective for APEC Ministry of Internal Affairs and Communications March 2015 Current Status in APEC Region 1 GDP Growth Rate Twice the global average Share of Global Communications Service

More information

Security & Trust in Smart Cities. A Min Tjoa Vienna University of Technology & SBA Research

Security & Trust in Smart Cities. A Min Tjoa Vienna University of Technology & SBA Research Security & Trust in Smart Cities A Min Tjoa Vienna University of Technology & SBA Research Overview General Intro Smart City / Digital Trust Activities Quest for Specific Smart City Activities Quest for

More information

Cybersecurity Risk Management:

Cybersecurity Risk Management: Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

GIIM. Global Institute for IT Management. A unique (outside-of-the-box) approach for educating executives

GIIM. Global Institute for IT Management. A unique (outside-of-the-box) approach for educating executives Institute Objective The 21st Century is marked by the continued penetration of Information Technology (IT) into all facets of the organization. Businesses, regardless of their size, cannot function without

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Fujitsu World Tour 2016

Fujitsu World Tour 2016 Fujitsu World Tour 2016 Human Centric Innovation in Action Utrecht 13 June 2016 0 Copyright 2016 FUJITSU Mobilizing the Enterprise One size does not fit all powered by 1 Copyright 2016 FUJITSU Speaker

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

Strategic Energy Institute Energy Policy Innovation Center EPICenter

Strategic Energy Institute Energy Policy Innovation Center EPICenter Strategic Energy Institute Energy Policy Innovation Center EPICenter Introduction & Overview Richard A. Simmons, PhD, PE November 28, 2016 Introduce the context for the GT-led energy policy center Key

More information

College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies

College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, 2009 Information Technologies UNIT STRATEGIC PLANNING UPDATES MARCH 2, 2009 Information Technologies Executive Summary Challenges

More information

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13

More information

CyLab Mobility Research Center. Martin Griss & Priya Narasimhan

CyLab Mobility Research Center. Martin Griss & Priya Narasimhan CyLab Mobility Research Center Martin Griss & Priya Narasimhan July 1, 2008 1 Mobility Research Summit Agenda 11.30 Lunch Welcome, introductions 12.00 Background, goals 12.30 Faculty presentations 2.00

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Agenda. 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions

Agenda. 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions 5G for Remote Areas Agenda 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions 5G Brazil Project Private autonomous project under Telebrasil

More information