Title: CYBER DEFENSE
 1CYBER DEFENSE
  2Cyber security
Our technological advantage is a key . But our 
defense and military networks are under constant 
attack. .... Indeed, in today's world, acts of 
terror could come not only from a few extremists 
but from a few key strokes on the computer -- a 
weapon of mass disruption. ... it's now clear 
that this cyber threat is one of the most serious 
economic and national security challenges we face 
as a nation. 
- President Barack Obama, 
- May 29, 2009
3Public Value national security 
PUBLIC VALUE IN NATIONAL SECURITY CYBERSECURITY
ULTIMATE BUSINESS GOAL
EXECUTIVE KPI(Direction) CORE FINANCIAL 
 KPI(Direction) 
 TRUST 
INFORMATION ASSURANCE 
 EFFICIENCY --------------- 
 OUTCOMES --------- 
- Citizens Trust 
- Privacy 
- Civil Liberties 
- Protection / Security 
- Govt Transparency
-  Strengthen Security and Resilience at Home 
-  Secure Cyberspace 
-  Critical Infrastructure Protection
-  Services delivered quickly 
-  Agencies operate within budgets 
-  Leverage Technology 
-  Incidents / Attacks Prevented 
-  Infrastructure Protection 
-  Access to Services
-  Coordinate with Emergency Mgt., Public Safety / 
 Justice Agencies
Capital Investment Management
Budget, Labor, Operating Cost Management
BUSINESSINITIATIVES(Strategy/Priority Language)
Develop Intelligence Capabilities
Reduce Network Intrusions/ Internet Crime
Improve Incident Response
Increase IT Efficiency and Effectiveness
OPERATING KPIs--------------------------------PR
OCESS/FUNCTION
Reduce Network Attacks / Internet Crime 
Rates Risk Assessments / Awareness _______________
 Forensics / Law Enforcement
Improve Incident Response ______________ Detecti
on, Response, Recovery
Reduce IT Operating Costs ______________ Budget, 
Capital, HR, Procurement, Training
Prevent Critical System Intrusions __________ Cybe
r Security Intelligence 
HP SOLUTION Cybersecurity
Business Continuity / Recovery
Identity / Access Management
Network / Datacenter Security
Security Operations
Risk Management / Compliance 
Application / Data Security 
 4The Threat
- Military, Intelligence, Homeland Security 
- Federal, state, local and tribal governments 
- Businesses  Consumers 
- Nation states 
- Ideological Movements 
- Organized Criminal Elements 
- Fame Seekers 
- Industry Competitors 
- Insiders 
- Merely Curious 
- Economic security 
- National security 
- Competitive Advantage 
- Public safety 
- Personal Information, intellectual property, 
 privacy
- Critical infrastructure (e.g. power grids, 
 transportation)
5HP Security Services 
Cyber Dominance
Mission Integration
Situational Awareness
Cyber Control to Achieve Mission
Cyber/Network Analytics  Prediction
Informed Decision Making 
 6Comprehensive Cyber Security services portfolio
- Proven integrated building blocks
Application Security Services for testing applications (including vulnerability assessment and penetration testing) and for building security and privacy controls into applications
Data  Content Security Services for data encryption, key management, data loss prevention, secure e-mail, and web content filtering
End Point Security Services including anti-virus, anti-spyware, mobile device security, and host intrusion detection  prevention
Network Security Services for protecting the network, including firewalls, wireless security, remote access, network access control, etc.
Data Center Security Security services for servers, storage, virtualization, and cloud computing
Risk Management  Compliance Services to train clients in security policies and procedures, to measure and manage risk, to define appropriate security controls and governance, and to achieve and sustain compliance
Security Operations Services for managing security events including log management, security incident response, reporting and root cause analysis
Business Continuity  Recovery Services for ensuring the continuity of IT-based business processes
Identity  Access Management Services for establishing authentication and authorization of user access to business assets 
Research  Development Working with clients to develop next generation approaches to cyber security. 
Research  Development 
 7HP Security Services Portfolio
- End Point Threat Mgmt (AV, AS, HIDS, Personal 
 F/W)
- End Point Application  Device Control 
- Host Intrusion Detection  Prevention Services 
- Mobile Device Security
- Application Penetration Testing 
- Application and Code Testing/Scanning 
- Web Application Security Assessments 
- Web Application Penetration Testing 
- Web Application Firewalls 
- SOA Security 
- SAP Security 
- Middleware  Mainframe Security 
- Midrange/Server Security
- Network Intrusion Detection  Prevention Services 
- Adaptive Network Architecture 
- Managed Firewall 
- VPN, UTM 
- Network Access Control 
- Wireless Security 
- Managed Proxy / Cache / Filtering
- Web Content Filtering 
- Email Security
- Disk/File Encryption 
- Database Security 
- Data Loss Prevention 
- Enterprise Rights Management 
- PKI 
- Key Management
- Server Threat Management 
- Storage Security 
- Virtualization Security 
- Cloud Computing Security 
- Fusion Center 
8HP Security Services Portfolio
- IT Governance, Risk  Compliance (GRC) 
- eDiscovery  Archiving 
- Customer Specific Training and Awareness 
- Operational Risk and Exceptions to Policy 
- Account Delivery Continuity 
- ISO 27001 Certification 
- Information Risk Advisory Service 
- PCI Compliance Scanning 
- PCI Managed Compliance 
- C  A NIST SP 800-37 
- C  A DIACAP 
- SCADA/Process Control System Security Assessment 
- NERC CIP Design, Audit and Implementation 
- IVV Test and Evaluation 
- Compliance Assessments 
- Threat  Risk Assessments 
- MCSS Capabilities
- PKI Management 
- Token Management 
- Managed Remote Access 
- Directory Services 
- Meta  Virtual Directory 
- Active Directory 
- User administration 
- IDAM - Current State Assessment 
- IDAM - Architecture Blueprint 
- IDAM Design  Implement 
- Web SSO 
- Federation 
- Provisioning 
- E-SSO 
- Risk Based Authentication 
- PAM Management 
9HP Security Services Portfolio
- Research, Development, Test  Evaluation services 
- DARPA, IARPA and Military Department research 
 agency opportunity
- DOE National Labs support 
- NMCI Research  Analysis capabilities and support 
- Large comprehensive cyber security pursuits
- Enterprise Security Information  Event 
 Management
- Log Management 
- Compliance Management 
- Security Dashboard 
- System Hardening Services 
- Security Incident Response 
- Forensics 
- Threat Monitoring  Alerting 
- Live Network Service 
- Vulnerability Scanning 
- Vulnerability Detection  Management Services 
- Security Configuration Management 
- Global Security Operations Centers (GSOC) 
- Mainframe Platform/OS Security 
- Midrange/Server Platform/OS Security
10Vulnerability Assessment Services
- Network Assessments (Internet  Intranet) 
- Network Vulnerability Scanning (State of Art 
 Tools)
- Network Penetration Testing 
- System and Host Vulnerability Testing (White Box 
 Black Box)
- Wireless Network Surveys and Penetration Testing
- Application Assessments (COTS and Custom) 
- Application Development Life Cycle Security Gap 
 Analysis
- Application Development/Design Training 
- Application Code Analysis (From C to Cobol) 
- Application Cyber Red Team 
- Application Automated Vulnerability Scanning (Web 
 Database)
- Application Regression Testing 
- Independent Validation and Verification (IVV)
11HP Comprehensive Applications Threat Analysis
- Fast Facts 
- 40,000 vulnerabilities in National 
 Vulnerabilities Database
- Estimate 800,000 vulnerabilities not yet 
 exploited
- Vulnerabilities patched late cost some 30X more 
 that those patched early
- 70 of all successful attacks have exploited 
 application vulnerabilities (Gartner, Microsoft)
- Typical security audits find 20 issues, 
 uncovering dozens or hundreds of vulnerabilities
- One action which avoids a single data breach pays 
 for itself 100 fold
- Services  Solutions 
- Security Requirements Gap Analysis 
- Architectural Threat Analysis
Building security in, not merely testing it 
 12HP Assured IdentityTM Plus Services
End-to-end Security Solutions
Run
Business Readiness Workshop
Detailed Design  Architecture
Implementation
Strategy  Roadmap
Assured Identity ManagementTM
Assessment Service
Fed SecureTM
Services Offered
Audit Compliance  Validation
Gate SecureTM
Assured Identity TM
Strategic  Technology Partnerships
Industry Frameworks 
 13HP Assured IdentityTM Plus 
- Assured Identity 
- Credential Enrollment 
- Credential Issuance 
- FIPS 201 Compliance 
- PIV.XX Support
- Gate Secure 
- Physical Security 
- Automated PACS provisioning system 
- New, single use, common credentials across 
 multiple agencies
- Fed Secure 
- Federation in a Box 
- Cross Credentialing 
- Federation Broker 
- Access Management Services
- Assured Identity Management 
- Life Cycle Management 
- User Provisioning 
- Workflow 
- Delegated Admin 
- Self-Service
Consulting Services
Managed Security Services 
 14Cross Industry Experience
- Deep HP Security experience in all industries 
- Industry focused security consultants 
We serve/manage critical cyber infrastructures 
across all US Critical Infrastructure/Key 
Resource sectors  
 15HP Personnel Dedicated to Cyber Security 
- Over 2,500 cyber security professionals worldwide 
- Includes specialists for advisory and consulting 
 engagements
- Certified security staff with CISSP, CISM, CAP, 
 CIS, CSSLP or GSEC
16Global Reach and Support
US Dept. of Defense US Government Comptroller of 
the Currency Defense Logistics Agency US Dept. of 
Agriculture US Dept of Justice US Dept. of 
Education US Dept. of Energy US Dept. of Health 
  Human Services US Dept. of Homeland 
Security US Dept. of Housing  Urban 
Development NHIC/ Medicare US Dept. of 
Treasury Dept. of the Army Dept. of the Navy Dept 
. Of Veterans Affairs DFAS DISA US Postal Food  
Drug Administration Social Security 
Administration US Dept. of State 
Alberta Sustainable Resource Div. BC Ministry of 
Labour BC Ministry of Provincial Revenue  
Citizen Services Edmonton Delivery PWGSC  
Pension Modernization Government of Manitoba 
Sweden Post
Ministry of the Flemish Govt.
INAIL IPZS Minesterio di Grazia e Guist Ministro 
Pubblica Intruzione 
State of California City of Anaheim State of 
Michigan State of Ohio Commonwealth of 
 Pennsylvania
European Space Agency
Federal Reserve World Bank
IDA of Singapore
Consulting ATP
UK Ministry of Defence UK Dept. For Work  
Pensions UK Justice  Offender Management 
Tax Administration Service of Mexico (SAT) 
Israel Ministry of Justice
South Australian Government 
 17QA