Understanding Technology Stakeholders:
Their Progress and Challenges
John M. Gilligan
Software Assurance Forum
November 4, 2009 1
Topics
• Historical Perspectives
• Cyber Security Threats--A National Crisis
• Cyber Security Commission Recommendations
• Near Term Opportunities
• Longer-Term Game Changing Initiatives
• Closing Thoughts
2
Historical Perspectives
• Internet, software industry, (personal) computers
—rooted in creativity not engineering
• Security in the Cold War Era
– Security “Gurus”—Keepers of the Kingdom
• The World Wide Web changes the security
landscape-- forever
• Post Cold War: The Age of Information Sharing
3Legacy of the past is now our “Achilles Heel”
Cyber Security Threats Today—
A New “Ball Game”
• Our way of life depends on a reliable cyberspace
• Intellectual property is being downloaded at an
alarming rate
• Cyberspace is now a warfare domain
• Attacks increasing at an exponential rate
• Fundamental network and system vulnerabilities
cannot be fixed quickly
• Entire industries exist to “Band Aid” over
engineering and operational
Cyber Security is a National Security Crisis! 4
Commission Cyber Security for the 44th
Presidency:
Key Recommendations
• Create a comprehensive national security
strategy for cyberspace
• Lead from the White House
• Reinvent public-private partnerships
• Regulate cyberspace
• Modernize authorities
• Leverage government procurement (Supply
Chain Risk Management)
• Build on recent progress with CNCI
(comprehensive national cyber-security
initiative) 5
Use Government IT Procurement
• Cyber security needs to be reflected in our
contractual requirements
• Many “locked down” configuration defined
• Use government-industry partnership to
accelerate implementation of secure
configurations
• Get started now, improve configuration
guidelines over time and leverage SCAP!
6
Build on FDCC Successes and Lessons Learned
Longer-Term: IT Reliably Enabling Economy
• Change the dialogue: Reliable, resilient IT is
fundamental to future National Security and
Economic Growth
• New business model for software industry
• Redesign the Internet
• Get the “man out of the loop”—use
automated tools (e.g., SCAP)
• Develop professional cyberspace workforce
• Foster new IT services models
Need to Fundamentally “Change the Game” to Make Progress7
Security Content Automation Protocol (SCAP)
• What is it: A set of open standards that
allows for the monitoring, positive control,
and reporting of security posture of every
device in a network.
• How is it implemented: Commercial products
implement SCAP protocols to exchange and
enforce configuration, security policy, and
vulnerability information.
• Where is it going: Extensions in development
to address software design weaknesses,
attack patterns, and malware attributes.
8
SCAP Enables Automated Tools To Implement And Enforce Secure Operations
Consensus Audit Guide (CAG)
• What is it: 20 key actions (called security
“controls”) that organizations must take if they
hope to block or mitigate top known attacks.
• How is it implemented: (Mostly) automated
means used to implement and continuously
enforce/monitor controls.
Consensus Audit Guidelines permits organizations to prioritize
security implementation and continuously enforce controls
9
Summary of Ideas for this Technology Working Group
• How do we make measurable progress in
improving security?
• How do we assess the effectiveness of
security tools?
• How do we change the software industry to
produce reliable and secure products?
It is time to get off the treadmill and start making
measurable progress in securing our systems! 10
Closing Thoughts
• Government and Industry need to treat cyber
security as an urgent priority
• Near-term actions important but need to
fundamentally change the game to get ahead of
threat
• IT community needs to reorient the dialogue on
cyber security—the objective is reliable and
resilient information
• Cyber Security in DoD is more mature—but still
woefully inadequate
11Cyber Security is Fundamentally a Leadership Issue!
Contact Information
jgilligan@gilligangroupinc.com
www.gilligangroupinc.com
John M. Gilligan
12

More Related Content

PPT
Understanding Technology Stakeholders
PPTX
Cyber Security: Past and Future
PPTX
Cyber Security: Past and Future
PPTX
Cyber Security: Threats and Needed Actions
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
PPTX
7 Habits of Highly Secure Organizations
PDF
Next-Generation SIEM: Delivered from the Cloud
Understanding Technology Stakeholders
Cyber Security: Past and Future
Cyber Security: Past and Future
Cyber Security: Threats and Needed Actions
Cybersecurity: Challenges, Initiatives, and Best Practices
7 Habits of Highly Secure Organizations
Next-Generation SIEM: Delivered from the Cloud

What's hot (20)

PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PPT
Commercial And Government Cyberwarfare
PPT
Intro to Security
PPTX
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
PPTX
Leveraging Federal Procurement to Improve Cyber Security
PDF
Cybersecurity Summit AHR20 Protect Cimetrics
PDF
Network and Endpoint Security v1.0 (2017)
PPTX
Technology: Built for Attack : Dr. Emma Garrison-Alexander
PPTX
The privacy and security implications of AI, big data and predictive analytics
PPTX
It and-cyber-module-2
PDF
Cybersecurity Summit 2020 Slide Deck
PPTX
What's New In CompTIA Security+ - Course Technology Computing Conference
PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PPTX
Recent changes to the 20 critical controls
PPT
Leone ct#4 presentation
PPTX
Overview of the 20 critical controls
PPTX
More practical insights on the 20 critical controls
PPT
Chapter 1 Presentation
Information Assurance And Security - Chapter 1 - Lesson 3
Commercial And Government Cyberwarfare
Intro to Security
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Leveraging Federal Procurement to Improve Cyber Security
Cybersecurity Summit AHR20 Protect Cimetrics
Network and Endpoint Security v1.0 (2017)
Technology: Built for Attack : Dr. Emma Garrison-Alexander
The privacy and security implications of AI, big data and predictive analytics
It and-cyber-module-2
Cybersecurity Summit 2020 Slide Deck
What's New In CompTIA Security+ - Course Technology Computing Conference
Qualys user group presentation - vulnerability management - November 2009 v1 3
Recent changes to the 20 critical controls
Leone ct#4 presentation
Overview of the 20 critical controls
More practical insights on the 20 critical controls
Chapter 1 Presentation
Ad

Viewers also liked (13)

PDF
Campa A Animaauna Amiga
PDF
Lindsey Hamilton, Exploring drivers of fecal coliform pollution trends in Sou...
PPTX
Tendencias pedagógicas
PPT
Social media
PDF
Obra cultural resumen de catecismo
PDF
Expresión corporal y creatividad
PDF
Fundamentos de marketing
PDF
Factores de riesgo
PDF
Shipbuilding Industry Final
PPTX
Construindo e realizando o roteiro de plano por
DOC
Limpiando la memoria celular
PPT
MBF Publication
PDF
APRESENTAÇÃO_JMC ENTERPRISES_email
Campa A Animaauna Amiga
Lindsey Hamilton, Exploring drivers of fecal coliform pollution trends in Sou...
Tendencias pedagógicas
Social media
Obra cultural resumen de catecismo
Expresión corporal y creatividad
Fundamentos de marketing
Factores de riesgo
Shipbuilding Industry Final
Construindo e realizando o roteiro de plano por
Limpiando la memoria celular
MBF Publication
APRESENTAÇÃO_JMC ENTERPRISES_email
Ad

Similar to Understanding Technology Stakeholders: Their Progress and Challenges (20)

PPTX
Cyber Security: Threats and Needed Actions
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PDF
CISO Survey Report 2010
PPTX
Cloud Security.pptx
PPT
December ISSA Meeting Executive Security Presentation
PDF
CybersecurityTFReport2016 PRINT
PDF
Cyber Security Strategies and Approaches
PDF
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
DOCX
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
DOCX
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PPTX
Cybersecurity - Sam Maccherola
PPTX
SAM05_Barber PW (7-9-15)
PPTX
Federal Cybersecurity: The latest challenges, initiatives and best practices
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPT
Cybersecurity for Control Systems: Current State and Future Vision pt.1
PDF
Cybersecurity and continuous intelligence
PPT
Lecture 4 presentation of cyber security
PDF
State of Cyber: Views from an Industry Insider
Cyber Security: Threats and Needed Actions
Cybersecurity Priorities and Roadmap: Recommendations to DHS
CISO Survey Report 2010
Cloud Security.pptx
December ISSA Meeting Executive Security Presentation
CybersecurityTFReport2016 PRINT
Cyber Security Strategies and Approaches
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
CSE 2016 Future of Cyber Security by Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
Cybersecurity - Sam Maccherola
SAM05_Barber PW (7-9-15)
Federal Cybersecurity: The latest challenges, initiatives and best practices
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity and continuous intelligence
Lecture 4 presentation of cyber security
State of Cyber: Views from an Industry Insider

More from John Gilligan (8)

PPTX
Practical approaches to address government contracting problems
PPTX
The Economics of Cyber Security
PPTX
Top Level Cyber Security Strategy
PPTX
Automating Enterprise IT Management by Leveraging Security Content Automation...
PPT
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
PDF
Is Cyber Resilience Really That Difficult?
PPTX
Implementing Continuous Monitoring
PPTX
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Practical approaches to address government contracting problems
The Economics of Cyber Security
Top Level Cyber Security Strategy
Automating Enterprise IT Management by Leveraging Security Content Automation...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Is Cyber Resilience Really That Difficult?
Implementing Continuous Monitoring
Federal Risk and Authorization Management Program: Assessment and Recommendat...

Recently uploaded (20)

PDF
SaaS reusability assessment using machine learning techniques
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
substrate PowerPoint Presentation basic one
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
DOCX
Basics of Cloud Computing - Cloud Ecosystem
SaaS reusability assessment using machine learning techniques
Presentation - Principles of Instructional Design.pptx
Lung cancer patients survival prediction using outlier detection and optimize...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
substrate PowerPoint Presentation basic one
giants, standing on the shoulders of - by Daniel Stenberg
Electrocardiogram sequences data analytics and classification using unsupervi...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Ensemble model-based arrhythmia classification with local interpretable model...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
LMS bot: enhanced learning management systems for improved student learning e...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Basics of Cloud Computing - Cloud Ecosystem

Understanding Technology Stakeholders: Their Progress and Challenges

  • 1. Understanding Technology Stakeholders: Their Progress and Challenges John M. Gilligan Software Assurance Forum November 4, 2009 1
  • 2. Topics • Historical Perspectives • Cyber Security Threats--A National Crisis • Cyber Security Commission Recommendations • Near Term Opportunities • Longer-Term Game Changing Initiatives • Closing Thoughts 2
  • 3. Historical Perspectives • Internet, software industry, (personal) computers —rooted in creativity not engineering • Security in the Cold War Era – Security “Gurus”—Keepers of the Kingdom • The World Wide Web changes the security landscape-- forever • Post Cold War: The Age of Information Sharing 3Legacy of the past is now our “Achilles Heel”
  • 4. Cyber Security Threats Today— A New “Ball Game” • Our way of life depends on a reliable cyberspace • Intellectual property is being downloaded at an alarming rate • Cyberspace is now a warfare domain • Attacks increasing at an exponential rate • Fundamental network and system vulnerabilities cannot be fixed quickly • Entire industries exist to “Band Aid” over engineering and operational Cyber Security is a National Security Crisis! 4
  • 5. Commission Cyber Security for the 44th Presidency: Key Recommendations • Create a comprehensive national security strategy for cyberspace • Lead from the White House • Reinvent public-private partnerships • Regulate cyberspace • Modernize authorities • Leverage government procurement (Supply Chain Risk Management) • Build on recent progress with CNCI (comprehensive national cyber-security initiative) 5
  • 6. Use Government IT Procurement • Cyber security needs to be reflected in our contractual requirements • Many “locked down” configuration defined • Use government-industry partnership to accelerate implementation of secure configurations • Get started now, improve configuration guidelines over time and leverage SCAP! 6 Build on FDCC Successes and Lessons Learned
  • 7. Longer-Term: IT Reliably Enabling Economy • Change the dialogue: Reliable, resilient IT is fundamental to future National Security and Economic Growth • New business model for software industry • Redesign the Internet • Get the “man out of the loop”—use automated tools (e.g., SCAP) • Develop professional cyberspace workforce • Foster new IT services models Need to Fundamentally “Change the Game” to Make Progress7
  • 8. Security Content Automation Protocol (SCAP) • What is it: A set of open standards that allows for the monitoring, positive control, and reporting of security posture of every device in a network. • How is it implemented: Commercial products implement SCAP protocols to exchange and enforce configuration, security policy, and vulnerability information. • Where is it going: Extensions in development to address software design weaknesses, attack patterns, and malware attributes. 8 SCAP Enables Automated Tools To Implement And Enforce Secure Operations
  • 9. Consensus Audit Guide (CAG) • What is it: 20 key actions (called security “controls”) that organizations must take if they hope to block or mitigate top known attacks. • How is it implemented: (Mostly) automated means used to implement and continuously enforce/monitor controls. Consensus Audit Guidelines permits organizations to prioritize security implementation and continuously enforce controls 9
  • 10. Summary of Ideas for this Technology Working Group • How do we make measurable progress in improving security? • How do we assess the effectiveness of security tools? • How do we change the software industry to produce reliable and secure products? It is time to get off the treadmill and start making measurable progress in securing our systems! 10
  • 11. Closing Thoughts • Government and Industry need to treat cyber security as an urgent priority • Near-term actions important but need to fundamentally change the game to get ahead of threat • IT community needs to reorient the dialogue on cyber security—the objective is reliable and resilient information • Cyber Security in DoD is more mature—but still woefully inadequate 11Cyber Security is Fundamentally a Leadership Issue!