t he us cybe r cha lle ng e
play

T he US Cybe r Cha lle ng e U S Cyb e r Cha lle ng e : De ve lo - PowerPoint PPT Presentation

T he US Cybe r Cha lle ng e U S Cyb e r Cha lle ng e : De ve lo p ing the Ne xt Ge ne ra tio n o f Cyb e r Gua rd ia ns Ka re n S. E va ns Na tio na l Dire c to r F ISSE A Co nfe re nc e Ma rc h 16, 2011 Ag e nd a T he Critic a


  1. T he US Cybe r Cha lle ng e U S Cyb e r Cha lle ng e : De ve lo p ing the Ne xt Ge ne ra tio n o f Cyb e r Gua rd ia ns Ka re n S. E va ns Na tio na l Dire c to r F ISSE A Co nfe re nc e Ma rc h 16, 2011

  2. Ag e nd a  T he Critic a l Sho rta g e o f T e c hnic a l T a le nt  Whic h skills ma tte r mo st  Ca n Co mpe titio ns F ind T a le nt  T he U.S. Cyb e r Cha lle ng e

  3. Ho w Critic a l is the Sho rta g e ?  Jim Go sle r (first dire c to r o f the CIA’ s Cla nde stine Info rma tio n T e c hno lo g y Offic e ) in a me e ting in the Pe nta g o n (Oc to b e r 08) with se nio r NSA, Do D, SANS a nd White Ho use o ffic ia ls: “T he US has no mo re than 1,000 pe o ple with the advanc e d se c urity skills to c o mpe te in c yb e rspac e at wo rld c lass le ve ls – we ne e d 20,000 to 30,000!”  No o ne disa g re e d!

  4. Whic h Skills Ma tte r Most?

  5. Se tting the Sta g e Subcommittee on Emerging Threats, Cybersecurity, and Science & Technology April 17, 2007 Chairman: Jim Langevin “We don’t know who’s inside our networks. We don’t know what information has been stolen. We need to get serious about this threat to our national security.”  Sta te De pt witne ss: Do n Re id, Se nio r Co o rdina to r fo r Se c urity Infra struc ture  Co mme rc e De pa rtme nt witne ss: Da ve Ja rre ll, Ma na g e r, Critic a l Infra struc ture Pro te c tio n Pro g ra m

  6. Sta rkly Co ntra sting Re spo nse s Commerc e Sta te 1. No ide a whe n it g o t in, ho w 1. De te c te d it imme dia te ly it g o t in, o r whe re it spre a d 2. Put e ffe c tive filte r in pla c e 2. T o o k 8 da ys to filte r within 24 ho urs; sha re d (ine ffe c tive ) filte r with o the r a g e nc ie s 3. Una b le to c le a n the 3. F o und two ze ro -da ys syste ms; fo rc e d to re pla c e 4. He lpe d Mic ro so ft a nd AV the m c o mpa nie s c re a te 4. Do no t kno w whe the r the y pa tc he s a nd sig na ture s ha ve fo und o r g o tte n rid o f 5. Cle a ne d infe c te d syste ms, the infe c tio ns c o nfide nt a ll ha d b e e n fo und

  7. Wha t wa s the Diffe re nc e ?  Wa s it to o ls? No  Almo st sa me c o mme rc ia l to o ls – Co mme rc e ha d mo re c o mme rc ia l IPS/ IDS  Wa s it skills? Ye s  Co mme rc e – o nly e xpe rie nc e wa s fire wa ll o pe ra tio ns no t e ve n fire wa ll e ng ine e ring . No tra ining o the r tha n pre p fo r Se c urity + a nd la te r fo r CISSP  Sta te – e xpe rie nc e a nd tra ining in fo re nsic s, vulne ra b ilitie s a nd e xplo its, de e p pa c ke t inspe c tio n, lo g a na lysis, sc ript de ve lo pme nt, se c ure c o ding , re ve rse e ng ine e ring . Plus c o unte r inte llig e nc e . And ma na g e rs with stro ng te c hnic a l se c urity skills

  8. Whic h Skills Ma tte r Mo st?  Se c urity skills:  Syste m fo re nsic s; ne two rk fo re nsic s a nd de e p pa c ke t inspe c tio n; Windo ws, UNIX, a nd PDA de fe nsive c o nfig ura tio n; lo g a na lysis; sc ript de ve lo pme nt; e xplo its a nd pe ne tra tio n te sting ; se c ure c o ding ; re ve rse e ng ine e ring . Plus c o unte r inte llig e nc e  F o unda tio ns:  Ne two rking a nd ne two rk a dministra tio n; c o mpute r o pe ra tio ns a nd syste m a dministra tio n; Ja va a nd C/ C+ pro g ra mming inc luding the 25 mo st da ng e ro us pro g ra mming e rro rs

  9. Pre pa re fo r F a st Gro wing Jo b s  Ne two rk, syste ms, a nd da ta c o mmunic a tio ns a na lysts (53%)  Co mpute r so ftwa re e ng ine e rs: a pplic a tio ns (34%)  Co mpute r so ftwa re e ng ine e rs: syste ms so ftwa re (30%)

  10. Gre a t jo b o ppo rtunitie s: # 2, 15 a nd 24 o n the “30 F a ste st Gro wing Oc c upa tio ns”

  11. T he U.S. Cybe r Cha lle ng e Ide ntifying a nd Nur tur ing 10,000 Ve r y T a le nte d Pe ople

  12. Q&A to Pro ve the Va lue Q. Yo u’ re in yo ur se nio r ye a r in hig h sc ho o l – ha d yo u a lre a dy ta ke n c o mpute r c o urse s a t sc ho o l? A. I e nrolle d to ta ke Introduc tion to Prog ra mming this ye a r, but the y c a nc e lle d it; the y c ouldn’t find a suita ble te a c he r. Q. Ho w do pe o ple de mo nstra te a nd te st the ir skills if the y do no t ha ve the o ppo rtunity to pla y in the Ne tWa rs ro unds? A. T he re a re n’t ma ny options for kids with lots of c ybe r skill to be a ble to e xe rc ise a nd furthe r de ve lop those skills. Most would just simply ta rg e t ra ndom se rve rs a nd ha c k ille g a lly, so it wa s g re a t tha t I found Ne tWa rs.

  13. Who is suppo rting the U.S. Cyb e r Cha lle ng e ?

  14. Pro po se d U.S. Cyb e r Cha lle ng e F ra me wo rk Competitions Public Sector Camps K-12 Private Sector Virtual Weekend Skills Communities Community Programs Needed Critical “Future Cyber Colleges Infrastructure Professionals” Pathway to: Scholarships Universities Tech Industry Internships Jobs Talent Bank

  15. Ac tivitie s  F o re nsic s Cha lle ng e (Do D Cyb e r Crime Ce nte r)  Cyb e rPa trio t De fe nse Co mpe titio n (AFA)  Ne tWa rs Cha lle ng e (SANS) ST EP 1  Cyb e r Que st (SANS)  Cyb e r F o unda tio ns (SANS a nd CK SF .o rg )  Cyb e r Ca mps  Co urse s a nd Exe rc ise s ST EP 2  T o urna me nts  Inte rnships ST EP 3  Sc ho la rships  Co nne c t with Emplo ye rs ST EP 4  T a le nte d Cyb e r Se c urity Pe o ple

  16. Cyb e r Se c urity F o und a tio ns  A se rie s o f q uizze s (Ma rc h/ April 2011)  T uto ria ls with vide o s a nd q ue stio ns o n a spe c ia l we b site  Ne two rking ; syste ms (inc luding finding hidde n b a d stuff), se c ure pro g ra mming  Prize s, a wa rds a nd re c o g nitio n  Pro g re ssive ly mo re c ha lle ng ing c o mpe titio ns to de ve lo p a nd de mo nstra te yo ur skills  18 Sta te s with 135 sc ho o ls re g iste re d

  17. Cyb e r Que st Co mpe titio n  A first q ue st in a se rie s: Ma rc h 16  T a rg e t syste m to a na lyze  De mo nstra te s yo ur a b ility in vulne ra b ility a na lysis skills; fo re nsic a na lysis; pa c ke t c a pture a na lysis  Prize s, a wa rds a nd re c o g nitio n  Pro g re ssive ly mo re c ha lle ng ing c o mpe titio ns to de ve lo p a nd de mo nstra te yo ur skills  Cha lle ng e fo r Cyb e r Ca mp invita tio n: April 18

  18. Build ing the Hig hwa y: Ac tio n Pla n  E nc o ura g e ta le nte d kids to c o mpe te  Suppo rt a hig h sc ho o l pro g ra m  Se rve a s a te a c he r/ a id a t the summe r c a mps  Build a c o mpe titio n  Suppo rt a c o lle g e te a m  Spo nso r a summe r c a mp  Spo nso r a c o lle g e  Spo nso r the U.S. Cyb e r Cha lle ng e

  19. T AK E T HE CHAL L E NGE http:/ / www.usc ybe r c halle nge .or g

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend