Homeland Security Advanced Research Projects Agency
A View from Washington: The Latest in Cyber Security
November 7, 2013
TCIPG Annual Meeting Douglas Maughan Division Director
http://www.dhs.gov/cyber-research
Latest in Cyber Security November 7, 2013 TCIPG Annual Meeting - - PowerPoint PPT Presentation
Homeland Security Advanced Research Projects Agency A View from Washington: The Latest in Cyber Security November 7, 2013 TCIPG Annual Meeting Douglas Maughan Division Director http://www.dhs.gov/cyber-research Presentation Outline
Homeland Security Advanced Research Projects Agency
November 7, 2013
TCIPG Annual Meeting Douglas Maughan Division Director
http://www.dhs.gov/cyber-research
Presenter’s Name June 17, 2003
2
Environment: Greater Use of Technology, More Threats, Less Resources
Globalization & Transportation Natural Disasters & Pushing Beyond Design Limits Misuse of Technology Border Security & Immigration Cyber Domain
L E S S R E S O U R C E S MORE THREATS
Violent Extremism Nature of Innovation Both sides get to innovate Predictive & Reactive Aviation as an example … Low cost
Strategic potential Anywhere in the world in 24 hours Historical Perspective Tenuous balance Insider Threat
“Cyber” – Where is it used?
Business / Personal
DHS provides advice and alerts to the 16 critical infrastructure areas … … DHS collaborates with sectors through Sector Coordinating Councils (SCC)
Presenter’s Name June 17, 2003
Nation States Hackers/Hacktivists Cyber Criminals Insider Threats Terrorists, DTOs, etc.
Presenter’s Name June 17, 2003
6
Presenter’s Name June 17, 2003
7
Presenter’s Name June 17, 2003
DHS is through phishing emails
with a foothold for complete network access
Targeted Malicious Email Detection and Response
2012 - Average new campaign every 3.6 days
Presenter’s Name June 17, 2003
“The interdependent network of information and communications technology infrastructures, including the Internet, telecommunications networks, computer systems and networks, and embedded processors and controllers in facilities and industries.” White House Cyberspace Policy Review, May 2009
1) Executive Order 13636: Improving Critical Infrastructure Cybersecurity 2) Presidential Policy Directive – 21: Critical Infrastructure Security and Resilience
dependent upon the operation of critical infrastructure that are increasingly at risk to the effects of cyber attacks
and operated by private companies
indispensible to reducing the risk to these vital systems
Presenter’s Name June 17, 2003
Critical Infrastructure Cybersecurity directs the Executive Branch to:
voluntary cybersecurity framework
adoption of cybersecurity practices
quality of cyber threat information sharing
liberties protections into every initiative to secure our critical infrastructure
regulation to promote cyber security
Critical Infrastructure Security and Resilience replaces Homeland Security Presidential Directive-7 and directs the Executive Branch to:
capability that addresses both physical and cyber aspects of how infrastructure is functioning in near- real time
consequences of infrastructure failures
private partnership
Protection Plan
and development plan (CSD / RSD)
11
Presenter’s Name June 17, 2003
120 days – June 12, 2013
150 Days - July 12, 2013
240 Days – October 10, 2013
365 days – February 12, 2014
Beyond 365 - TBD
12
Presenter’s Name June 17, 2003
managing cybersecurity risk
using industry-known standards and best practices
management;
Tiers, and Framework Profiles
13
Presenter’s Name June 17, 2003
Function Category IDENTIFY Asset Management Business Environment Governance Risk Assessment Risk Management PROTECT Access Control Awareness and Training Data Security Information Protection Processes and Procedures Protective Technology DETECT Anomalies and Events Security Continuous Monitoring Detection Processes RESPOND Communication Analysis Mitigation Improvements RECOVER Recovery Planning Improvements Communication
14
Presenter’s Name June 17, 2003
Areas:
“While these reports do not yet represent a final Administration policy, they do offer
an initial examination of how the critical infrastructure community could be incentivized to adopt the Cybersecurity Framework as envisioned in the Executive
Framework and Program are completed.” Michael Daniel,
Special Assistant to the President and Cybersecurity Coordinator
White House Blog, August 6, 2013
Industries
15
Presenter’s Name June 17, 2003
D&A, shall provide to the President a National Critical Infrastructure Security and Resilience R&D Plan that takes into account the evolving threat landscape, annual metrics, and other relevant information to identify priorities and guide R&D requirements and investments…plan issued every 4 years …updates as needed.
Commerce and other Federal D&A, shall provide input to align those Federal and Federally-funded R&D activities that seek to strengthen the security and resiliency
infrastructure and more secure accompanying cyber technology;
infrastructure design features that strengthen all-hazards security and resilience;
16
Presenter’s Name June 17, 2003
17
Strengthen America’s security and resiliency by providing knowledge products and innovative technology solutions for the Homeland Security Enterprise
1) Create new technological capabilities and knowledge products 2) Provide Acquisition Support and Operational Analysis 3) Provide process enhancements and gain efficiencies 4) Evolve US understanding of current and future homeland security risks and
18
FOCUS AREAS
Presenter’s Name June 17, 2003
international partners
19
Presenter’s Name June 17, 2003
Exercises (recent Quantum Dawn II exercise)
Authentication Credentials and Technology Transition
20
Presenter’s Name June 17, 2003
International Bilateral Agreements
COUNTRY PROJECTS MONEY IN JOINT MONEY OUT Australia 3 $300K $400K Canada 11 $1.8M Germany 1 $300K Israel 2 $100K Netherlands 7 $450K $1.2M $150K Sweden 4 $650K United Kingdom 3 $1.2M $400K European Union 1 Japan 1
Over $6M of International co-funding
Presenter’s Name June 17, 2003
22
R&D Sources
Labs
Funded R&D Centers)
Transition processes
evaluation
deployments
Utilization
cyber
analysts
sector adoption
use
Implement Presidential Memorandum – “Accelerating Technology Transfer and Commercialization of Federal Research in Support
Presenter’s Name June 17, 2003
to assess a student’s depth of understanding and
inherent in protecting a corporate network infrastructure and business information systems.
workforce capable of meeting current and future cybersecurity challenges;
cybersecurity talent.
23
Presenter’s Name June 17, 2003
Practice, Foundational Research
24
Presenter’s Name June 17, 2003
and actuators that are designed to sense and interact with the physical world (including the human users), and support real-time, guaranteed performance in safety-critical applications”
25
Presenter’s Name June 17, 2003
26
technologies that demonstrate the potential for significant improvement in homeland security missions and operations
submission that is reviewed by an S&T Program Manager
Opportunities website (www.fbo.gov) (Solicitation #:DHSS- TLRBAA12-07)
27
Cybersecurity Initiative and Federal R&D Strategic Plan topics
Infrastructure
Technology
enforcement
Flow technologies.
education and curriculum development.
Critical Infrastructure Security
Attack Modeling
workforce
systems
evaluation in experimental operational environments to facilitate transition.
Incentives
techniques, visualization,
– trust negotiation, app anonymity
28
Presenter’s Name June 17, 2003
support our global economic and national security futures
research agenda
future) infrastructure and systems
datasets
and experimental deployments
aspects of our current and future cybersecurity workforce
29
Presenter’s Name June 17, 2003
30
Presenter’s Name June 17, 2003
For more information, visit
Douglas Maughan, Ph.D. Division Director Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) douglas.maughan@dhs.gov 202-254-6145 / 202-360-3170
31