Cyber Security: Threats and Needed Actions
John M. Gilligan
DoD National Security Studies Program
George Washington University
April 1, 2009
Topics
• Historical Perspectives
• Cyber Security Threats--A National Crisis
• Cyber Security Commission Recommendations
• Near Term Opportunities
• Longer-Term Game Changing Initiatives
• Closing Thoughts
Historical Perspectives
• Internet, software industry, (personal)
computers—rooted in creativity not
engineering
• Security in the Cold War Era
– Security “Gurus”—Keepers of the Kingdom
• The World Wide Web changes the security
landscape-- forever
• Post Cold War: The Age of Information Sharing
Legacy of the past is now our “Achilles Heel”
Cyber Security Threats Today--A New “Ball Game”
• Our way of life depends on a reliable cyberspace
• Intellectual property is being downloaded at an
alarming rate
• Cyberspace is now a warfare domain
• Attacks increasing at an exponential rate
• Fundamental network and system vulnerabilities
cannot be fixed quickly
• Entire industries exist to “Band Aid” over
engineering and operational weaknesses
Cyber Security is a National Security Crisis!
DoD Perspectives
• Any future military engagement will have cyber component
• Cyberspace has interrelated military disciplines
– Network defense
– Network attack
– Information exploitation
• Cyberspace necessarily involves private sector and international
communities
• Fragmented management and inadequate discipline of cyberspace
compounds effective threat deterence
• DoD organization and career development issues
– What organization structure is appropriate
– Who are the cyber operators
– What is the command, control and coordination “rules”
– Unique role of NSA as an “operator”
– How do you grow cyber warriors
Commission Cyber Security for the 44th Presidency:
Key Recommendations
• Create a comprehensive national security
strategy for cyberspace
• Lead from the White House
• Reinvent public-private partnerships
• Regulate cyberspace
• Modernize authorities
• Leverage government procurement
• Build on recent progress with CNCI
Near-Term Opportunities
• Use government IT acquisitions to change IT business
model
• Enhance public-private partnerships
• Adopt the Consensus Audit Guidelines (CAG)
• Update Federal Information Security Management Act
(FISMA)
• Implement more secure Internet protocols
• Implement comprehensive, federated authentication
strategy
• Leverage Stimulus Package to improve cyber security
Longer-Term: IT Reliably Enabling Economy
• Change the dialogue: Reliable, resilient IT is
fundamental to future National Security and
Economic Growth
• New business model for software industry
• Redesign the Internet
• Get the “man out of the loop”—use automated
tools (e.g., SCAP)
• Develop professional cyberspace workforce
• Foster new IT services models
Need to Fundamentally “Change the Game” to Make Progress
President’s 60-Day Cyber Security
Initiative
• Broad outreach to government and private sector
• Tie cyber security to economic and national
security (w/ attention to privacy and civil
liberties)
– Digital maturity
– Interconnection of related efforts
• Identify priorities and options
• Likely to recommend NSC office for cyber security
• Answer question: What is role of government?
Closing Thoughts
• Government and Industry need to treat cyber
security as an urgent priority
• Near-term actions important but need to
fundamentally change the game to get ahead of
threat
• IT community needs to reorient the dialogue on
cyber security—the objective is reliable and
resilient information
• Cyber Security in DoD is more mature—but still
woefully inadequate
Cyber Security is Fundamentally a Leadership Issue!
Contact Information
jgilligan@gilligangroupinc.com
www.gilligangroupinc.com
John M. Gilligan
Use Government IT Procurement
• Cyber security needs to be reflected in our
contractual requirements
• Many “locked down” configuration defined
• Use government-industry partnership to
accelerate implementation of secure
configurations
• Get started now, improve configuration
guidelines over time and leverage SCAP!
Build on FDCC Successes and Lessons Learned
Security Content Automation Protocol (SCAP)
• What is it: A set of open standards that allows for
the monitoring, positive control, and reporting of
security posture of every device in a network.
• How is it implemented: Commercial products
implement SCAP protocols to exchange and
enforce configuration, security policy, and
vulnerability information.
• Where is it going: Extensions in development to
address software design weaknesses, attack
patterns, and malware attributes.
SCAP Enables Automated Tools To Implement And Enforce Secure Operations
Enhance Public-Private Partnerships
• Our nation’s critical infrastructure is critical to
National Security relevant
• Much of our government-sponsored research
intellectual property is “protected” by industry
• Regulators need to guide/govern private
sector efforts
• Private and public sectors must act in
cooperation
– Defense Industrial Base (DIB): an excellent model
Protecting Government and Military Systems Is Not Sufficient
Implement Consensus Audit Guidelines (CAG)
• Underlying Rationale
– Let “Offense drive Defense”
– Focus on most critical areas
• CAG: Twenty security controls based on
attack patterns
• Emphasis on auditable controls and
automated implementation/enforcement
• Public comment period through March 25th
• Pilots and standards for tools later this year
Update FISMA
• Emphasize evaluating effectiveness of controls
vs. paper reviews
• Enhance authority and accountability of CISO
• Foster government leadership
– Independent, expert reviews
– Procurement standards
– Dynamic sharing of lessons learned
Near-Term Opportunities
• Use government IT acquisitions to change IT
business model
• Enhance public-private partnerships
• Adopt Consensus Audit Guidelines (CAG)
• Update FISMA
• Implement more secure Internet protocols
• Implement comprehensive, federated
authentication strategy
• Leverage Stimulus Package to improve cyber
security

More Related Content

PPTX
Cyber Security: Past and Future
PPTX
Cyber Security: Past and Future
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
PDF
Lessons learned from the SingHealth Data Breach COI Report
PDF
Singapore Cybersecurity Strategy and Legislation (2018)
PDF
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
PPTX
7 Habits of Highly Secure Organizations
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
Cyber Security: Past and Future
Cyber Security: Past and Future
Cybersecurity: Challenges, Initiatives, and Best Practices
Lessons learned from the SingHealth Data Breach COI Report
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
7 Habits of Highly Secure Organizations
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...

What's hot (20)

PDF
Singapore. industry 4.0 and cybersecurity
PDF
Overview of national cybercrime strategies
PDF
Singapore's National Cyber Security Strategy
PPTX
Cybersecurity environment in malaysia and the function of internal auditor
PDF
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
PPTX
Key Cyber Security Issues for Government Contractors
PPTX
National policy and strategy
PPTX
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
PDF
Cybersecurity legislation in Singapore (2017)
PDF
Cybercrime and Cybersecurity Differences
PDF
New developments in cyber law - Singapore and beyond
PPTX
Deeper Security, Broader Privacy - how firms use the latest Co3 features to a...
PPTX
Cyber Security in the time of COVID -19
PDF
Internet safety and security strategies for building an internet safety wall
PPTX
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
PDF
National Cyber Security Policy 2013 (NCSP)
PDF
PhD and Post PhD Network Security Visualization Research
PPTX
National cyber security policy 2013
PDF
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
PPTX
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Singapore. industry 4.0 and cybersecurity
Overview of national cybercrime strategies
Singapore's National Cyber Security Strategy
Cybersecurity environment in malaysia and the function of internal auditor
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Key Cyber Security Issues for Government Contractors
National policy and strategy
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Cybersecurity legislation in Singapore (2017)
Cybercrime and Cybersecurity Differences
New developments in cyber law - Singapore and beyond
Deeper Security, Broader Privacy - how firms use the latest Co3 features to a...
Cyber Security in the time of COVID -19
Internet safety and security strategies for building an internet safety wall
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
National Cyber Security Policy 2013 (NCSP)
PhD and Post PhD Network Security Visualization Research
National cyber security policy 2013
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Ad

Viewers also liked (20)

PPTX
Analysis of cyber security and threats
PDF
Google apps for education
PPTX
CYBER SECURITY THREATS - Polytechnic Ungku Omar
PDF
Cyber Security Threats and Data Breaches
PPT
100812 internet security2.0
PDF
pp3.2
PPTX
Data
PPT
Training day
PDF
Tendensdagen 2010 ucb patients as a driver of knowledge and innovation
PDF
pp3.1
PPTX
Practical approaches to address government contracting problems
PDF
Jeana Frost - Bringing new information into Healthcare
PPTX
Используйте силу презентаций!
PDF
Как сделать редизайн презентации за 3 часа
PDF
Computer Security Threats
PDF
Cyber Security 2017 Challenges
PPTX
Best Practices in Recruiting Today - High-Impact Talent Acquisition
PDF
Cyber security threats for 2017
PPTX
Cyber security presentation
PDF
Как работает Google
Analysis of cyber security and threats
Google apps for education
CYBER SECURITY THREATS - Polytechnic Ungku Omar
Cyber Security Threats and Data Breaches
100812 internet security2.0
pp3.2
Data
Training day
Tendensdagen 2010 ucb patients as a driver of knowledge and innovation
pp3.1
Practical approaches to address government contracting problems
Jeana Frost - Bringing new information into Healthcare
Используйте силу презентаций!
Как сделать редизайн презентации за 3 часа
Computer Security Threats
Cyber Security 2017 Challenges
Best Practices in Recruiting Today - High-Impact Talent Acquisition
Cyber security threats for 2017
Cyber security presentation
Как работает Google
Ad

Similar to Cyber Security: Threats and Needed Actions (20)

PPT
Understanding Technology Stakeholders: Their Progress and Challenges
PPT
Understanding Technology Stakeholders
PPTX
Cyber Security: Threats and Needed Actions
PPTX
Lecture 3 Country Specific Strategy.pptx
PPT
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
PPTX
Securing and Modernizing Technology in the Commonwealth: Better Together
PDF
Accelerating OT - A Case Study
PPTX
More practical insights on the 20 critical controls
PPT
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
PDF
Cyber Security in Manufacturing
PPTX
Leveraging Federal Procurement to Improve Cyber Security
PPTX
CSO CXO Series Breakfast
PPT
T063500000200201 ppte
PPTX
Federal Cybersecurity: The latest challenges, initiatives and best practices
PDF
Cybersecurity and continuous intelligence
PDF
Infosec russia cnemeth_v1.2.ppt
PPTX
Cybersecurity Course in Chandigarh Join Now
PPTX
DHS HQ Day 2018 - Barry West
KEY
Application Security Done Right
PPTX
An introduction to SOC (Security Operation Center)
Understanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders
Cyber Security: Threats and Needed Actions
Lecture 3 Country Specific Strategy.pptx
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Securing and Modernizing Technology in the Commonwealth: Better Together
Accelerating OT - A Case Study
More practical insights on the 20 critical controls
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Cyber Security in Manufacturing
Leveraging Federal Procurement to Improve Cyber Security
CSO CXO Series Breakfast
T063500000200201 ppte
Federal Cybersecurity: The latest challenges, initiatives and best practices
Cybersecurity and continuous intelligence
Infosec russia cnemeth_v1.2.ppt
Cybersecurity Course in Chandigarh Join Now
DHS HQ Day 2018 - Barry West
Application Security Done Right
An introduction to SOC (Security Operation Center)

More from John Gilligan (7)

PPTX
The Economics of Cyber Security
PPTX
Top Level Cyber Security Strategy
PPTX
Automating Enterprise IT Management by Leveraging Security Content Automation...
PDF
Is Cyber Resilience Really That Difficult?
PPTX
Implementing Continuous Monitoring
PPTX
Federal Risk and Authorization Management Program: Assessment and Recommendat...
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
The Economics of Cyber Security
Top Level Cyber Security Strategy
Automating Enterprise IT Management by Leveraging Security Content Automation...
Is Cyber Resilience Really That Difficult?
Implementing Continuous Monitoring
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Cybersecurity Priorities and Roadmap: Recommendations to DHS

Recently uploaded (20)

PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
SaaS reusability assessment using machine learning techniques
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
Statistics on Ai - sourced from AIPRM.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Microsoft User Copilot Training Slide Deck
Rapid Prototyping: A lecture on prototyping techniques for interface design
Comparative analysis of machine learning models for fake news detection in so...
Early detection and classification of bone marrow changes in lumbar vertebrae...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
future_of_ai_comprehensive_20250822032121.pptx
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
SaaS reusability assessment using machine learning techniques
Enhancing plagiarism detection using data pre-processing and machine learning...
Co-training pseudo-labeling for text classification with support vector machi...
Data Virtualization in Action: Scaling APIs and Apps with FME
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf

Cyber Security: Threats and Needed Actions

  • 1. Cyber Security: Threats and Needed Actions John M. Gilligan DoD National Security Studies Program George Washington University April 1, 2009
  • 2. Topics • Historical Perspectives • Cyber Security Threats--A National Crisis • Cyber Security Commission Recommendations • Near Term Opportunities • Longer-Term Game Changing Initiatives • Closing Thoughts
  • 3. Historical Perspectives • Internet, software industry, (personal) computers—rooted in creativity not engineering • Security in the Cold War Era – Security “Gurus”—Keepers of the Kingdom • The World Wide Web changes the security landscape-- forever • Post Cold War: The Age of Information Sharing Legacy of the past is now our “Achilles Heel”
  • 4. Cyber Security Threats Today--A New “Ball Game” • Our way of life depends on a reliable cyberspace • Intellectual property is being downloaded at an alarming rate • Cyberspace is now a warfare domain • Attacks increasing at an exponential rate • Fundamental network and system vulnerabilities cannot be fixed quickly • Entire industries exist to “Band Aid” over engineering and operational weaknesses Cyber Security is a National Security Crisis!
  • 5. DoD Perspectives • Any future military engagement will have cyber component • Cyberspace has interrelated military disciplines – Network defense – Network attack – Information exploitation • Cyberspace necessarily involves private sector and international communities • Fragmented management and inadequate discipline of cyberspace compounds effective threat deterence • DoD organization and career development issues – What organization structure is appropriate – Who are the cyber operators – What is the command, control and coordination “rules” – Unique role of NSA as an “operator” – How do you grow cyber warriors
  • 6. Commission Cyber Security for the 44th Presidency: Key Recommendations • Create a comprehensive national security strategy for cyberspace • Lead from the White House • Reinvent public-private partnerships • Regulate cyberspace • Modernize authorities • Leverage government procurement • Build on recent progress with CNCI
  • 7. Near-Term Opportunities • Use government IT acquisitions to change IT business model • Enhance public-private partnerships • Adopt the Consensus Audit Guidelines (CAG) • Update Federal Information Security Management Act (FISMA) • Implement more secure Internet protocols • Implement comprehensive, federated authentication strategy • Leverage Stimulus Package to improve cyber security
  • 8. Longer-Term: IT Reliably Enabling Economy • Change the dialogue: Reliable, resilient IT is fundamental to future National Security and Economic Growth • New business model for software industry • Redesign the Internet • Get the “man out of the loop”—use automated tools (e.g., SCAP) • Develop professional cyberspace workforce • Foster new IT services models Need to Fundamentally “Change the Game” to Make Progress
  • 9. President’s 60-Day Cyber Security Initiative • Broad outreach to government and private sector • Tie cyber security to economic and national security (w/ attention to privacy and civil liberties) – Digital maturity – Interconnection of related efforts • Identify priorities and options • Likely to recommend NSC office for cyber security • Answer question: What is role of government?
  • 10. Closing Thoughts • Government and Industry need to treat cyber security as an urgent priority • Near-term actions important but need to fundamentally change the game to get ahead of threat • IT community needs to reorient the dialogue on cyber security—the objective is reliable and resilient information • Cyber Security in DoD is more mature—but still woefully inadequate Cyber Security is Fundamentally a Leadership Issue!
  • 12. Use Government IT Procurement • Cyber security needs to be reflected in our contractual requirements • Many “locked down” configuration defined • Use government-industry partnership to accelerate implementation of secure configurations • Get started now, improve configuration guidelines over time and leverage SCAP! Build on FDCC Successes and Lessons Learned
  • 13. Security Content Automation Protocol (SCAP) • What is it: A set of open standards that allows for the monitoring, positive control, and reporting of security posture of every device in a network. • How is it implemented: Commercial products implement SCAP protocols to exchange and enforce configuration, security policy, and vulnerability information. • Where is it going: Extensions in development to address software design weaknesses, attack patterns, and malware attributes. SCAP Enables Automated Tools To Implement And Enforce Secure Operations
  • 14. Enhance Public-Private Partnerships • Our nation’s critical infrastructure is critical to National Security relevant • Much of our government-sponsored research intellectual property is “protected” by industry • Regulators need to guide/govern private sector efforts • Private and public sectors must act in cooperation – Defense Industrial Base (DIB): an excellent model Protecting Government and Military Systems Is Not Sufficient
  • 15. Implement Consensus Audit Guidelines (CAG) • Underlying Rationale – Let “Offense drive Defense” – Focus on most critical areas • CAG: Twenty security controls based on attack patterns • Emphasis on auditable controls and automated implementation/enforcement • Public comment period through March 25th • Pilots and standards for tools later this year
  • 16. Update FISMA • Emphasize evaluating effectiveness of controls vs. paper reviews • Enhance authority and accountability of CISO • Foster government leadership – Independent, expert reviews – Procurement standards – Dynamic sharing of lessons learned
  • 17. Near-Term Opportunities • Use government IT acquisitions to change IT business model • Enhance public-private partnerships • Adopt Consensus Audit Guidelines (CAG) • Update FISMA • Implement more secure Internet protocols • Implement comprehensive, federated authentication strategy • Leverage Stimulus Package to improve cyber security