USING PUBLIC-PRIVATE PARTNERSHIPS TO INNOVATE AND REACH NEW PEOPLE

Similar documents
Membership

The U.S. Manufacturing Extension Partnership - MEP

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Commonwealth Cyber Initiative Blueprint Development

IT Town Hall Meeting. IT Town Hall - October 6,

Our Vision Professional Community

Mass Big Data: Progressive Growth through Strategic Collaboration

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

IT Town Hall Meeting

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

Sage Data Security Services Directory

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

GREEN DEFENCE FRAMEWORK

2nd National MBE Manufacturers Summit 2017

MOVING MISSION IT SERVICES TO THE CLOUD

National Strategy for CBRNE Standards

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Toronto s Resilience Strategy. Preliminary Resilience Assessment DRIE December

Open Tech Alliance. Case Study

Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland

LEADING WITH GRC. Common Controls Framework. Sundar Venkat, Sr. Director Technology Compliance Salesforce

Emerging Security Challenges November 22, 2012, Baku

Information Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011

Experiences in Data Quality

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Regional Resilience: Prerequisite for Defense Industry Base Resilience

Cisco on Cisco. Executive Overview. Version 2.0, Q1, FY 07. Cisco Public. Sal Pearce Cisco Systems, Inc. All rights reserved.

FXM Swedish Defence and Security Export Agency Exports and international cooperation for our future defence

Implementing 21st Century Smart Manufacturing

e-sens Nordic & Baltic Area Meeting Stockholm April 23rd 2013

Competency Definition

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations

STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE

Bringing Cybersecurity to the Boardroom Bret Arsenault

A Sustainable Strategy for Critical Infrastructures and Key Resources Partnering to Optimize the Security of Critical Infrastructure

The Art of the Ask. February 22, BDO KNOWLEDGE Webinar Series The Art of the Ask

NVTC Data Center and Cloud Infrastructure Committee

SDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND

Cybersecurity Risk Management:

Statement for the Record

Candidate Profile for the Position of Vice President, Education and Certification

Leveraging Existing Customers to Find New Revenue Streams

Senate Committee on Homeland Security and Governmental Affairs Full Committee Hearing

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

The Center of Innovation: Creating an Innovation

MARILLYN HEWSON: Lockheed Martin International is a key component of our growth strategy at Lockheed Martin. We are

Cyber Partnership Blueprint: An Outline

CYBERSECURITY RESILIENCE

Dell helps you simplify IT

Homeland Security Institute. Annual Report. pursuant to. Homeland Security Act of 2002

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

IUPUI eportfolio Grants Request for Proposals for Deadline: March 1, 2018

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

NAC Institutional Committee Meeting

Strategic Plan Report

Shaping the Department of Defense Engineering Workforce

CLOSING IN FEDERAL ENDPOINT SECURITY

How to choose the right Data Governance resources. by First San Francisco Partners

The New Security Heroes. Alan Paller

DOE OFFICE OF INDIAN ENERGY Program Overview May 5, Chris Deschene, Director

Be Like Water: Applying Analytical Adaptability to Cyber Intelligence

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Effective Partnerships: Security and Privacy in Smart Cities

Minneapolis Clean Energy Partnership Energy Vision Advisory Committee (EVAC) 4/16/2015

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs

Building a National Address Database. Presented by Steve Lewis, Department of Transportation Mark Lange, Census Bureau July 13, 2017

CONE 2019 Project Proposal on Cybersecurity

Cyber Strategy & Business Innovation: Integrating InfoSec Into Real Business

Future of the Data Center

NERC Staff Organization Chart

High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail

Challenges and Opportunities in Cyber Physical System Research

Presented at 2009 Michigan Digital Government Summit

February 21, pm ET

Implementation Plan FY

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

NERC Staff Organization Chart Budget 2019

USE CASE STUDY. Connecting Data Through Mission. Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Strategic Energy Institute Energy Policy Innovation Center EPICenter

ARRA State & Local Energy Assurance Planning & Implementation

Systems Engineering: MITRE & SERC D r. J. P r o v i d a k e s D i r e c t o r, S E Te c h C e n t e r

STRATEGY STATEMENT OF QUALIFICATIONS

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Bad Idea: Creating a U.S. Department of Cybersecurity

Critical Infrastructure Resilience

Media Kit. California Cybersecurity Institute

Collaborative Working presentation for CIPS. Bob Meakes I C W Associate Director

California s Public Libraries and CENIC: Frequently Asked Questions

Global Standards Information. Standards Simulation Training for the USG ICES Workshop. July 6, 2010

Sales Presentation Case 2018 Dell EMC

Aligning Your Chapter s Professional Development Program to the PMI Talent Triangle

AZTech Capability Maturity Model

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017

Agenda. What would a 30% reduction in energy use do for your budget? The next generation of energy and infrastructure projects in MI

Transcription:

USING PUBLIC-PRIVATE PARTNERSHIPS TO INNOVATE AND REACH NEW PEOPLE Dr. Joe Adams Vice President for Research and Cyber Security, Merit Network, Inc. 2015 Internet2

Using Public-Private Partnerships to Innovate and Reach New People CONTENTS Introduction What is a Public-Private Partnership? Why partner? What makes it work? How does it work? Examples [ 2 ] 2015 Internet2

Introduction Dr. Joe Adams Vice President of Research and Cyber Security for Merit Network Degrees in Computer Engineering from Virginia Tech, Univ. of Arkansas, and Syracuse Univ. 26 years Army Signal Corps Associate Professor at US Military Academy Senior Member IEEE Distinguished Fellow, Ponemon Institute [3]

Introduction Michigan Cyber Range Public-Private Partnership Provides basic cyber security education, training, and testing Start up to self-sustaining in 28 months [ 4 ]

What is a Public-Private Partnership? a coalition between for-profit, non-profit, and government to achieve a commonly-held beneficial goal requires active participation by all parties Examples Workforce/Job development & training Economic Development Environmental causes I m not talking about privatization of public services! [ 5 ]

Public-Private Partnerships The Good Alternative mechanisms to funnel public funds into community projects Must eventually become selfsustaining Forms coalitions of the willing to overcome common obstacles [ 6 ]

Public-Private Partnerships The Not So Good Competing with private business? So why is there a need? Loss of control Trying to please everyone means pleasing no one The Danger of Grants What happens when the money runs out? [ 7 ]

So why partner? Shared vision Shared requirements Shared responsibilities Everyone has a stake [ 8 ]

What makes it work? Common Vision Stick to it! Fight scope creep Shared Execution Adaptive, creative responses Solving the group s problems Then helping others with the same approach [ 9 ]

How does it work? Distill the mission statement from the vision Think like a start up Find the right person to lead Identify candidates to invite Set expectations What are you going to do? What aren t you going to do? [ 10 ]

How does it work? Getting Started Sponsorship Development costs Infrastructure establishment Service/Product catalog Showing versus telling Lots of hands out. How are you different? Talking concepts vs. delivering results Tangible examples vs. PowerPoint [ 11 ]

How does it work? What are the expectations? Development time Pilots Finding your way to the solution Timelines and managing expectations Strategic Plan Business Plan Communications Plan Ramping up to self-sustainment [ 12 ]

How does it work? Sustainment Contracts Expansion Stay consistent with your vision Where you want to go vs. Where you re pushed Beware of sponsorship s many forms Fickle budget priorities and lots of favors [ 13 ]

How does it work? Governance What roles are played? Fiduciary responsibility Management by committee Advisor or Partner? What s in a name? You ll need both Communication Meetings Un-meetings [ 14 ]

Timeline of the Michigan Cyber Range Oct 2011 Vision Statement Jan 2012 Assignment to Merit Jun 2012 Hiring the Director Nov 2012 Cutting the Ribbon Dec 2012 First Infrastructure Rental Mar 2013 First Class May 2013 First CTF Exercise Jul 2013 First Red/Blue Exercise Mar 2014 First Multi-Team Exercise Jul 2014 First Incident Response Exercise Oct 2014 Power Phoenix Nov 2014 First Multi-National Exercise [ 15 ]

1. Establishing the Vision Governor s Summit 2011 Merit Network gets involved Hire the Range Director [ 16 ]

2. Establishing the Mission Mission statement Design the Program Still no money yet! Build a trained workforce through: Accessible resources Experiential training Adaptable assessment Target the program Systems Analyst Security Analyst Build training programs [ 17 ]

3. Establishing the Range Get Sponsors Hire the Team, Buy the Gear, Build the Infrastructure Pilots, Trials, and Fishing Expeditions All about the Product All about the Brand [ 18 ]

3. Establishing the Range Grants NIST Michigan State Police & DHS Sponsors DTE Consumers Energy Plante Moran Juniper Networks First Adopters State of Michigan DTMB Current Customers include: Michigan National Guard State of Wisconsin General Dynamics Land Systems University of Montana Ixia, ISC8, SoarTech and others Current Engagements include Latvia National Governor s Association California National Guard [ 19 ]

4. Establishing the Base Product Catalog Create your own or outsource? Control vs. Variety Advisory Council Define their role Beware the words Partner or Board Strategic Plan Tell them where we re going Get their buy in and support [ 20 ]

5. Adoption Classes Exercises Demonstrations Games Assessments Infrastructure Test labs Classroom space [ 21 ]

6. Getting Imaginative Power Phoenix Incident Response for NERC CIP Arctic Eagle and Cyber Guard Cyber Injects for kinetic events Collegiate Cyber Defense Competition Remote teams for the tune up Virtual infrastructure [ 22 ]

7. Expanding the Mission Still in line with the Vision Adding collaborators Becoming an economic development engine Michigan Cyber Civilian Corps [ 23 ]

What s Next? National scope Renew, refresh, re-center 1 st contracts expiring Are our needs the same? Bring some things back in-house? Growing without losing the focus Stick to our values [ 24 ]

Conclusion What were the good parts? Building the Range from scratch Inventing stuff! Making movies! Serving an underserved need Cutting across verticals to get people involved [ 25 ]

Conclusion What were the hard parts? Finding sponsorship Sometimes you have to use the big guns Building the Brand Surviving the patronizing Let me tell you how to suck that egg Eating sausage is different from making it [ 26 ]

Conclusion What did we get right? Started Business Development early What do they want? Pilots lots of pilots Experimentation [ 27 ]

Conclusion What would I do different? More time for process development QA took second place to development More time for product development Don t hit the whole market at once Grow into the space [ 28 ]

Final Thoughts Public-Private Partnerships build Services that are needed Programs free from political ebbs and flows Bulk of the work on the Private part of the Partnership Be prepared to go it alone But so are the benefits Engaging new markets Re-engaging old collaborators in new ways [ 29 ]

Disaster Recover/ Business Continuity 12 May 2015 Ann Arbor, MI Marriott Eagle Crest www.merit.edu/mcrcon [ 30 ]

[ 31 ]

USING PUBLIC-PRIVATE PARTNERSHIPS TO INNOVATE AND REACH NEW PEOPLE Dr. Joe Adams Vice President for Research and Cyber Security, Merit Network, Inc. 2015 Internet2