Cyber Perspectives. Science and Technology Roadmap

Similar documents
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Mission Aware Cybersecurity

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

The Perfect Storm Cyber RDT&E

Securing Content in the Department of Defense s Global Information Grid

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

DoD Strategy for Cyber Resilient Weapon Systems

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead

Information Warfare Industry Day

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

to-end System Test Architecture

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Space Cyber: An Aerospace Perspective

Net-Centric Systems Design and Requirements Development in today s environment of Cyber warfare

Cisco Connected Factory Accelerator Bundles

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

DEFENSE LOGISTICS AGENCY

align security instill confidence

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

Cyber Security Maturity Model

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Net-centric Characteristics

Defense Engineering Excellence

UNCLASSIFIED R-1 ITEM NOMENCLATURE

AMRDEC CYBER Capabilities

IT Security vs. Defensive Cyber Operations: The evolution of CAF Cyber

Test & Evaluation/Science & Technology (T&E/S&T) Cyberspace Test Technology (CTT) Project Overview. 2nd Annual ITEA Cyber Security Workshop

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Introducing Cyber Resiliency Concerns Into Engineering Education

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) February 2000

Forecast to Industry 2016

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14

Integrated C4isr and Cyber Solutions

Acquisition and Intelligence Community Collaboration

Federal Mobility: A Year in Review

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyberspace: New Frontiers in Technology Insertion

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Angela McKay Director, Government Security Policy and Strategy Microsoft

Exploring threats and opportunities through Mega Trends in the Space 4.0 era

Global Security Operation Center GSOC

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Cloud and Cyber Security Expo 2019

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Department of Homeland Security Science and Technology Directorate

Principles for a National Space Industry Policy

Cybersecurity in Acquisition

THE POWER OF TECH-SAVVY BOARDS:

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

The Kill Chain for the Advanced Persistent Threat

Designing and Building a Cybersecurity Program

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Exhibit R-2, RDT&E Budget Item Justification

Your Challenge. Our Priority.

Next Generation Enterprise Network- Recompete (NGEN-R) Industry Day

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

FAA Cybersecurity Test Facility (CyTF) By: Enterprise Information Security Team ANG-B31 Patrick Hyle, William J Hughes Technical Center

Cyber Challenges and Acquisition One Corporate View

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

ICS Security Innovation Asia Pacific ICS Security Summit. Singapore 2013

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure

INFORMATION ASSURANCE DIRECTORATE

National Cyber Incident Response - Architectural Concepts

U.S. Army Cyber Center of Excellence and Fort Gordon

NCSF Foundation Certification

Securing Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017

Systems 2020 Strategic Initiative Overview

The State of Cybersecurity and Digital Trust 2016

THE INTERNET OF THINGS FOR THE INTELLIGENCE COMMUNITY

Cyber Security on Commercial Airplanes

I n t e g r i t y - S e r v i c e - E x c e l l e n c e

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Navy Cyber Resilience

Implementing Executive Order and Presidential Policy Directive 21

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

ROS-M Summary NDIA GRCC 2017

Building a Resilient Security Posture for Effective Breach Prevention

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Accelerating Innovation and Collaboration for the Next Stage

DHS Cybersecurity: Services for State and Local Officials. February 2017

NASSCOM Cyber Security Task Force 1 st Meeting. May 25, 2015

Industry role moving forward

Shaping the Department of Defense Engineering Workforce

Commonwealth Cyber Declaration

HELLO, MOSCOW. GREETINGS, BEIJING. ADDRESSING RISK IN YOUR IT SUPPLY CHAIN

Transcription:

Cyber Perspectives Science and Technology Roadmap NDIA S&T Conference 14 April 2010 Pat Sullivan SSC Pacific

Cyber Warfare Capabilities, Opportunities and Challenges Capabilities: Global, 24x7 Network Operations Largest corporate internet NMCI Blue and Red Team Attack Sensing and Warning Cyberspace awareness Fusion of sensor data Opportunities / Challenges: Every platform a sensor Every sensor a network Network more important than ever C2 Information is an element of power Non-kinetic options as a force multiplier Information free-flow without borders Physical effects from virtual action Recruit, train and maintain cyber workforce Building the right capability and capacity to achieve prominence and dominance in the information age 2

Navy Comms/ Electronic Warfare/ Sensor Networks Intel/ Operational Nets SIPRNET JWICS Special Access Non-Kinetic Weapons SSEE Inc F (Comms EA; CNO) SLQ-32 (EA), follow-on ISCRS/ TROLL (Subs) Banshee (Air) Unclassified Nets MWR Supply Data Flow (Physical Layer around the ship) Fiber Optic Copper Voice Nets V/UHF HF SATCOM Cellphone Sensor Nets Tomahawk Targeting Link 16 Link 11 Other fire control nets RADAR SONAR Data Flow (Physical Layer On/ Off the Ship) SATCOM HF/ VHF/ UHF/ SHF Multi-Dimensional Networks 3

Cyber evolution looking forward All the buzz is about cyber Cyberwarfare, Cyberspace, US Cyber Command, C10F, CNCI but it s misplaced, cyber is but just one means that networks use, they also use others Networks are pervasive in all aspects of life: biological, physical, and social. They are indispensable to the workings of a global economy and to the defense of the United States against both conventional military threats and the threat of terrorism. - National Research Council, 2005, Network Science The real buzz should be about what cyber will become: It will be ubiquitous: u-computing u-networking u-sensors u-linking u-information Networks converge: Social + Physical + Biological Networks The human aspect: how will we interact with a converged & ubiquitous network? Technology drivers: miniaturization, nanotechnology, machine learning, GPS, data farms, virtualization, cloud computing and the exponential pace at which it is developing 4

Cyber s Future Operating Environment Network Convergence Ubiquity Biological Networks u-computing u-collaboration 5

Cyber Roadmap Technical Elements Ubiquitous Dynamic Network Defense Operations Network Operations Computer Network Defense (traditional) Computer Network Exploitation Computer Network Attack Ubiquitous Assured Wireless and Wired Communications Ubiquitous Assured Space Capabilities Electronic Warfare Signals Intelligence Integrated Adaptive Planning Systems to incorporate above into conventional planning capabilities Policy Items Expanded Public Private Partnerships 6

Roadmapping Process Start with the End in Mind Revolutionary vs Evolutionary Technology Development Transdisciplinary Sciences as the keystone Execute process to build a revolutionary S&T Roadmap for 2025 7

Cyber s S&T Grand Challenge Transparently protect Warfighters and their information Decreased staffing levels, Increased autonomy Ubiquitous robust, secure information generation and flow Ability to operate under known level of risk when parts of the system are compromised Cyber elements/options tightly integrated into planning Isolate and mitigate Cyber threats in real time Attribution and reactive Action Real time situational awareness of the Cyber battlespace throughout all phases of operations Live and breathe in the cyber domain Actionable and secure information sharing Trusted information always available 8

Functional Characteristics for Cyber Challenge Area Transparently protect Warfighters and their information Ubiquitous robust, secure information generation and flow Isolate and mitigate Cyber threats in real time Near-real-time situational awareness of the Cyber battlespace Functional Characteristics Overall Self-directed and self-aware Transparent User confidence Prepared Integrated system Information Ubiquitous, robust info integration and flow Real-time info and action Tell me what I need to know Trusted Predictive Action Adaptable threat detection and identification Automated response actions Logistics Sustainable at reasonable cost Trusted supply chain 9

Required Capabilities and Strategy Technical Capabilities Challenge: Actionable and secure information sharing Trusted information always available Capability Strategy: Dynamically, proactively and predictably defend critical information and information systems Capabilities required to support strategy 2010-2030. These capabilities spell out the Capability Strategy. Trusted computing from untrusted platforms Operate with known level of risk Reconstitution of trust Risk-adaptive information sharing and access Dynamic reconfigurable levels of tolerance Ubiquitous cross domain solutions Automatic metadata from different content/context Context and content validation in CDS Steganography detection and protection Self-decontaminating systems RT threat classification/anticipation/estimate Decentralized, autonomous analysis Actively sense and develop countermeasures Dynamic use of intel Tiered data fusion Predictive models for attack patterns Present cognitively appropriate info Self protecting resilient platforms Trusted supply chain for hardware and software Platforms to support computationally intensive IA 10

Going forward Cross disciplinary science will be key to developing new and innovative capabilities Utility of Cyber Roadmap: Information for Program Planning/ POM Guidance Framework for S&T planning and investments Basis for planning of human capital development Internal S&T community Focus for small business development SBIR topics Identify leveraging and partnering opportunities E.g. DOE, DHS, NSF, NIST, DOD 11

Questions and Discussion 12