Cyber Security In the Global Marketplace - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security In the Global Marketplace

Description:

Title: Team FCBS Author: fcbs-consultant-ds37 Last modified by: mgv Created Date: 5/31/2005 3:06:38 PM Document presentation format: On-screen Show (4:3) – PowerPoint PPT presentation

Number of Views:538
Avg rating:3.0/5.0
Slides: 19
Provided by: fcbsc
Learn more at: https://cse.sc.edu
Category:

less

Transcript and Presenter's Notes

Title: Cyber Security In the Global Marketplace


1
Cyber Security In the Global Marketplace
Emergent, Inc. 6650 Rivers Avenue Suite 132 North
Charleston, SC 29406 T 843-576-1850 F
843-576-1879 www.emergentcorporation.com
2
Agenda
  • Introduction
  • Cyber Security
  • Cyber Warfare
  • Platforms
  • Conclusion

3
Curtis Merriweather
  • Graduate of USC 2003
  • BS in Computer Engineering
  • Government Tenure with SSC 2004
  • Business Development, Dir. 2010
  • President of Mid-Atlantic Region
  • 2011 MBA candidate The Citadel
  • Manage(d) a Cyber Security Portfolio

4
Introduction
  • Founded in 2008 as a professional services firm
  • Cleared Facility and personnel
  • Composed of three primary Business Units
  • Research and Development
  • Information Technology
  • Intelligence Operations
  • 8(a) pending

5
Organization
President/CEO
Executive Vice President
Senior VP, Operations
Research Development
Intelligence Community, SPAWAR, US Army
Intelligence Community, SPAWAR, VA
Information Technology
Intelligence Community, US Army
Centers of Excellence
Intelligence Operations
6
Research Development (RD)
  • Innovating solutions with a cyber security focus.
  • Partnered with Academia
  • Supporting several federal agencies to solve NEW
    problems
  • Technology Transfer process

7
Information Technology
  • Any-time, anywhere, ubiquitous access to
    information
  • Cyber Security
  • Computer Forensics
  • Media Exploitation
  • Computer Network
  • Attack
  • Defense
  • Exploit

8
Intelligence Operations
  • Emergent provides support in the following ways
  • Collections
  • All-Source Analysis
  • CIDNE Operators and Managers
  • Collection Managers
  • HUMINT Analysis
  • SIGINT Analysis
  • Processing
  • Exploitation

The maxim 'nothing avails but perfection' can be
spelled 'paralysis' -- Winston Churchill
9
Core Capabilities
Research Development (RD)
  • Customers
  • Intelligence Community
  • US Army
  • SPAWARSYSCEN
  • Services Provided
  • Commercialization
  • ATCD/JTCD Support
  • Technology Transfer
  • Services Provided
  • Collections
  • Processing
  • Exploitation

Intelligence Operations
  • Customers
  • Intelligence Community
  • INSCOM
  • Services Provided
  • Tier 1 Service/Help Desk Support
  • Tier 2 Technical Support
  • Tier 3 Network Engineering and IT System
    Support

Information Technology Management
  • Customers
  • Intelligence Community
  • SPAWARSYSCEN Charleston

Cyber Security
  • Services Provided
  • Computer Forensics
  • Computer Network Defense/ Attack/Exploit
  • Media Exploitation
  • NIST 800 Series Certification Accreditation
  • DITSCAP/DIACAP CA
  • Customers
  • Intelligence Community

Application Development
  • Services Provided
  • Architecture Development EA, Use Cases, etc..
  • Software Engineering and Development
  • Web Portal Design, Implementation and
    Maintenance
  • System Implementation, Training and
    Documentation Support
  • Customers
  • Intelligence Community
  • US Coast Guard,
  • Veteran Affairs

10
Cyber Security
  • Cyber Security - measures taken to protect a
    computer or computer system (as on the Internet)
    against unauthorized access or attack
  • Cyber Security Standards are security standards
    which enable organizations to practice safe
    security techniques to minimize the number of
    successful cyber security attacks.
  • ISA 99, NIST, etc..

11
Cyber Warfare
  • "actions by a nation-state to penetrate another
    nation's computers or networks for the purposes
    of causing damage or disruption. Richard A.
    Clark
  • The Fifth Domain of warfare, The Economist
  • The DoD has formally recognized cyberspace as a
    new domain in warfare . . . which has become
    just as critical to military operations as land,
    sea, air, and space. - Defense Secretary

12
World Events
  • Adobe
  • Google
  • Intel
  • Juniper
  • Yahoo
  • Government Institutions
  • State Department, etc..

13
Exploited Platforms
  • Computers
  • Mobile Phones
  • Android
  • IPhone
  • Blackberry
  • Satellite Systems
  • Social Networking
  • GPS Technologies
  • OnStar, ENav
  • Video Game Platforms offensive and defensive

14
Exploits
  • Bluetooth Hijacking
  • Brute Force Attack Methods
  • Software Exploits
  • War Driving
  • Wireless Exploits
  • Pushed Advertisements - Phones
  • Hotspots
  • Trojan/Virus Generators
  • Phishing Schemes

15
Defensive Strategies
  • Increased Awareness
  • Common Defense Measures
  • Information Assurance
  • Patching
  • Secure Coding Methodologies - Developers
  • Software Updates
  • Active Defense Strategy
  • Cloudshield
  • IBM Analytics Engine
  • Defense-in-Depth Strategy
  • Multi-Phase Authentication vs. Single Sign-On

16
Situation Awareness Defense Strategies
  • Honeypot Projects
  • Collection Agent
  • Hopefully uncover motives
  • Computer Forensics
  • Encase v.6
  • Log Collector
  • Media Exploitation
  • Specialized tools
  • DOMEX/MEDEX Experts

17
Defensive Strategies
  • Certified Ethical Hackers (CEH)
  • White Hats
  • Complete Penetration Testing
  • Inside
  • Outside
  • Security Experts
  • Real World Experience
  • Certification Programs
  • Security, CWSP, CISSP, etc

18
Partnerships
  • Academia
  • Government
  • Industry
  • Industry and Academia have to lead the charge
Write a Comment
User Comments (0)
About PowerShow.com