SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Trends & Challenges
in Cybersecurity
Chuck Brooks
Vice President
Sutherland Government Solutions
June 16,2016
Cybersecurity
• “A few lines of code can wreak more havoc than a bomb.”
Hon. Tom Ridge (Former) Secretary of the U.S. Department
of Homeland Security
• “Our country will, at some point, face a major cyber-vent that
will have a serious effect on our lives, our economy, and the
everyday functioning of our society.”
Hon. Janet Napolitano (Former) Secretary of the U.S.
Department of Homeland Security
• “Our primary concern is low-to-moderate level cyber intrusions
from a variety of sources which will continue and probably
expand,” he said, noting every aspect of American life is being
connected to the Internet. “They impose increasing costs to our
businesses, to U.S. economic competitiveness and to national
security.”
James Clapper, Director of National Intelligence
Cybersecurity Threats
Cybersecurity – Major Threat Actors
• Hacker/Script Kiddies/Hobbyist
• Insider Threat/Disgruntled Employee
• Hacktivist
• Industrial Espionage
• Foreign Espionage
• Terrorist
• State Sponsored Attack
Cybersecurity – Types of Threats
• Trojan. Trojan is one of the most complicated threats among all.
Most of the popular banking threats come from the Trojan family
such as Zeus and SpyEye. It has the ability to hide itself from
antivirus detection and steal important banking data to
compromise your bank account.
• Virus. Virus is a malicious program where it replicates itself and
aim to only destroy a computer. The ultimate goal of a virus is to
ensure that the victim’s computer will never be able to operate
properly or even at all.
• Worms; They it can spread from one computer to
anothercomputer within a network or even the internet. The
computer security risk here is, it will use up your computer hard
disk space due to the replication and took up most of your
bandwidth due to the spread.
Cybersecurity – Types of Threats
• Spyware. Is a Malware which is designed to spy on the victim’s
computer. If you are infected with it, probably your daily activity or
certain activity will be spied by the spyware and it will find itself a
way to contact the host of this malware. Mostly, the use of this
spyware is to know what your daily activity is so that the attacker
can make use of your information.
• Scareware. Scareware is something that plant into your system
and immediately inform you that you have hundreds of infections
which you don’t have. The idea here is to trick you into
purchasing a bogus anti-malware where it claims to remove those
threats.
• Keylogger. Something that keeps a record of every keystroke
you made on your keyboard. Keylogger is a very powerful threat
to steal people’s login credential such as username and
password.
Cybersecurity – Types of Threats
• Adware. Is a form of threat where your computer will start popping
out a lot of advertisement. It can be from non-adult materials to adult
materials because any ads will make the host some money. It is not
really harmful threat but can be pretty annoying.
• Backdoor. Backdoor is not really a Malware, but it is a form of
method where once a system is vulnerable to this method, attacker
will be able to bypass all the regular authentication service. It is
usually installed before any virus or Trojan infection because having a
backdoor installed will ease the transfer effort of those threats.
• DDoS. One of the most famous thing done by Anonymous, which is to
send millions of traffic to a single server to cause the system to down
with certain security feature disable so that they can do their data
stealing. This kind of trick which is to send a lot of traffic to a machine
is known as Distributed Denial of Service, also known as DDoS.
Cybersecurity – Types of Threats
• Botnet. Botnet is something which is installed by a BotMaster to
take control of all the computer bots via the Botnet infection. It
mostly infects through drive-by downloads or even Trojan
infection. The result of this threat is the victim’s computer, which
is the bot will be used for a large scale attack like DDoS.
• Phishing. A fake website which is designed to look almost like
the actual website is a form of phishing attack. The idea of this
attack is to trick the user into entering their username and
password into the fake login form which serves the purpose of
stealing the identity of the victim. Every form sent out from the
phishing site will not go to the actual server, but the attacker
controlled server.
Types of Threats - Ransomware
• Ransomware: in which hackers hold computers and even entire
networks hostage for electronic cash payments
Ransomware has been around for more than a decade, but attacks
have exploded in the past couple of years.
There are now more than 120 separate families of ransomware, said
experts studying the malicious software.
Other researchers have seen a 3,500% increase in the criminal use of
net infrastructure that helps run ransomware campaigns
The FBI reported some 2,500 incidents in 2015, from which
individuals and organizations lost $1.6 million
Cybersecurity Breaches
• Over 43% of companies had breaches last year (including mega
companies such as Home Depot, JPMorgan, and Target.
Moreover, the intrusion threats are not diminishing.
• For example, British Petroleum (BP) faces 50,000 attempts at
cyber intrusion every day.
• OPM Breach - heist of data on 22 million current and former
federal employees
• According to the think tank Center For Strategic and
International Studies (CSIS), cyber related crime now costs the
global economy about $445 billion every year
Cybersecurity Breaches
Securing The Networks
• National information networks have become more
vulnerable—and therefore more attractive targets.
• Growing connectivity among secure and insecure networks
creates new opportunities for unauthorized intrusions into
sensitive or proprietary computer systems.
• The complexity of computer networks is growing faster than
the ability to understand and protect them.
• The prospects for a cascade of failures across national
infrastructures are largely unknown.
• Cybersecurity, information assurance, and resilience are the glues
that will keep our world of converged sensors and algorithms
operational. This has become one of the largest areas of
government spending at all agencies and is consistently ranked
the top priority among government and industry CIOs in surveys.
• In the U.S., most (approximately 85 per cent of the cybersecurity
critical infrastructure is owned by the private sector and regulated
by the public sector.
• The leader civilian agency in the government for public/private
cooperation in cybersecurity is the Department of Homeland
Security (DHS).
Cybersecurity -- Role of Government
Critical Infrastructure
Securing Critical Infrastructure
• Military: Secrets, tactics, location of forces, tampering
• Power Grid: Generator controls, power distribution controls
• Telecommunications: Phone, internet connectivity
• Transportation: Air traffic control, railway, bridge and highway, radar
• Fuel Supply: Locations of pipelines, types of fuel and amounts
• Banking and Finance: Asset protection, stock market
• Emergency Services: 911 system, disaster response, first
responder coordination, deployment and locations
• Food and Water Infrastructure: Food and water distribution, process
Cybersecurity – DHS
• DHS uses intrusion detection tools to monitor .gov network traffic for
malicious activity and uses this resulting data to address cyber
vulnerabilities.
• In addition, DHS issues bulletins and alerts that provide information on
potential cyber threats.
• Last year, DHS issued more the 5,000 alerts and advisories, which it
shared with various government, private sector, and critical infrastructure
stakeholders; as well as the public.
• DHS also operates a cyber information coordination center, the National
Cybersecurity and Communications Integration Center (NCCIC), and
several operational units. These units respond to incidents and provide
technical assistance to information system operators.
Cybersecurity –DHS
• DHS is responsible for overseeing the protection of the.gov domain and
for providing assistance and expertise to private sector owners and
operators. The agency’s work benefits the information technology
community and the public at-large.
• DHS plays a key role in securing the federal government's civilian cyber
networks and helping to secure the broader cyber ecosystem
• Investigations and arrests of cyber criminals, and education about how
the public can stay safe online.
• Combating cyber threats is a shared responsibility. The public, private,
and non-profit sectors, and every level of government – including DHS –
all have an important role to play.
• Defining and monitoring the threat landscape
• Risk Management (identifying, assessing and responding to
threats- i.e. NIST Framework: Identify, Protect, Detect, Respond,
Recover)
• Protecting critical infrastructure through rapid proto-typing of
technologies and Public/Private cooperation
• Modernizing security Architectures:
• Better encryption and biometrics (quantum encryption, multiple
and keyless authentication)
• Automated network-security correcting systems (self-encrypting
drives)
Cybersecurity Priorities
• Technologies for “real time” horizon scanning and monitoring of
networks;
• Enterprise and client Network isolation to protect against
malware, botnets, insider threats
• Access Management and Control
• Advanced defense for framework layers (network, payload,
endpoint, firewalls, and anti-virus);
• Diagnostics, data analytics, and forensics (network traffic
analysis, payload analysis, and endpoint behavior analysis)
• Endpoint protection
• Diagnostic and forensics analysis.
Cybersecurity Priorities
Securing The Digital Future:
The Digital age and “The Internet of Things”
• Cisco predicts that 50 billion devices (including our smartphones,
appliances, and office equipment) will be wirelessly connected via
a network of sensors to the internet by 2020.
• Gartner predicts 21 billion devices
• McKinsey & Company: Unlocking the potential of the Internet of
Things estimates that IoT will be valued at $4.6 Trillion for the
Public Sector in the next ten years
• Cisco estimates $14.4 trillion in value for Private Sector and $46
trillion for Public Sector
• 604 million users of wearable biometrics by 2019 according to
Goode Intelligence
*The Digital Age and “The Internet of Things”
Policy Issues:
• Ethics
• Interoperability protocols (standardization)
• Cybersecurity, privacy/ surveillance
• Complex autonomous systems
• Best commercial practices
• Regulation
The Digital Age and “The Internet of Things”
• A “connected transportation system,” and more specifically
“connected cars” allow for safer and more efficient urban
mobility and is a priority for federal and state & local
governments. Connected car technology is evolving rapidly
and is now being tested.
• In a public/private partnership, the University of Michigan has
created a 32-acre simulated city. It is called The Mobility
Transformation Center (MTC), and it is designed to simulate
traffic events and road conditions for automated and
autonomous vehicles, is the largest test facility of its kind and
run in partnership with the U.S. Department of Transportation
as well as 13 companies.
Connected Transportation
• According to Eric Schmidt , CEO of Google, we produce more data every
other day than we did from the inception of early civilization until the year
2003 combined (over 2.5 billion gigabytes of data are created every day).
• Therefore, organizing, managing and analyzing data is more important than
ever.
• Big data and data analytics are collapsing the information gap and giving
businesses and governments the tools they need to uncover trends,
population movements, customer preferences, demographics, commerce
traffic, transportation, etc.
Big Data & Data Science
• Emergent artificial intelligence (AI) and augmented reality
technologies are no longer things of science fiction and will
likely change operations in both the public and private sectors
in the next decade.
• Companies are already developing technology to distribute
artificial intelligence software to millions of graphics and
computer processors around the world..
• Augmented reality intertwines the physical and digital world by
computer-generated sensory input such as sound, video,
graphics, and sometimes even smell. Google Glass and
Oculus Rift, are already good examples of these emerging
technologies.
“Disruptive” Artificial Intelligence /Augmented
Reality
Sutherland Government Solutions, Inc. (SGSI) mission is to ensure government can
meet its vision of fully responding to citizen mandates. As a trusted partner, we
enable government to succeed by providing smart, affordable and highly
responsive customer care processes and solutions.
Our Industry experience instills confidence in constituent oriented government
operations. SGSI’s capabilities include rapidly deploying major contact centers,
integrating citizen-centric IT services, and processing health and insurance benefit
claims. SGSI’s technology-enabled services are performance force multipliers for
government, especially in times of budget constraint.
Sutherland's Services for Government Include:
• Multi-Channel Constituent Relations
• Veterans Choice: Customer Care
• Healthcare & Insurance Claims Processing
• Revenue Cycle Management
• Analytics
• IT Service Desks & Contact Centers
• System Integration
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for
Sutherland Global Services. Chuck leads Federal and State & Local Government relations
activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought
Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck is
Chairman of the CompTIA Emerging Technologies Committee also serves on Boards to several
prominent public and private companies and organizations. Chuck has extensive service in Senior
Executive Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the Department
of Homeland Security as the first Director of Legislative Affairs for the Science & Technology
Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen
Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck
was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level
students about homeland security and Congress. He has an MA in International relations from the
University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in
International Law from The Hague. He is widely published on topics o fhomeland security,
cybersecurity, and emerging technologies.
Twitter: @ChuckDBrooks
Linked in Profile: http://www.linkedin.com/in/chuckbrooks
Email: Charles.Brooks@sutherlandglobal.com
Chuck Brooks Bio:
The problems that
exist in the world
today cannot be
solved by the level of
thinking that created
them.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 

Was ist angesagt? (20)

Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Information security
Information securityInformation security
Information security
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
C018131821
C018131821C018131821
C018131821
 

Andere mochten auch

Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...
Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...
Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...https://www.facebook.com/garmentspace
 
Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...
Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...
Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...https://www.facebook.com/garmentspace
 
13122014 131725
13122014 13172513122014 131725
13122014 131725VICENNN
 
806 - גיאומטריה לדוגמה
 806 - גיאומטריה לדוגמה 806 - גיאומטריה לדוגמה
806 - גיאומטריה לדוגמהbagrutonline
 
804 - גיאומטריה אנליטית לדוגמה
804 -  גיאומטריה אנליטית לדוגמה804 -  גיאומטריה אנליטית לדוגמה
804 - גיאומטריה אנליטית לדוגמהbagrutonline
 
Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...
Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...
Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...https://www.facebook.com/garmentspace
 
פרק 2 מאגר סטטיסטיקה והסתברות פתרונות
פרק 2 מאגר   סטטיסטיקה והסתברות פתרונותפרק 2 מאגר   סטטיסטיקה והסתברות פתרונות
פרק 2 מאגר סטטיסטיקה והסתברות פתרונותtelnof
 
Estudio sectorial del sector Marítimo Portuario en El Salvador
Estudio sectorial del sector Marítimo Portuario en El SalvadorEstudio sectorial del sector Marítimo Portuario en El Salvador
Estudio sectorial del sector Marítimo Portuario en El SalvadorSuperintendencia de Competencia
 
VisionsLive UBER Brand Report 19.2.16
VisionsLive UBER Brand Report 19.2.16VisionsLive UBER Brand Report 19.2.16
VisionsLive UBER Brand Report 19.2.16VisionsLive
 
Nikita Pankratov – athlete and jumper
Nikita Pankratov – athlete and jumperNikita Pankratov – athlete and jumper
Nikita Pankratov – athlete and jumperprosvsports
 

Andere mochten auch (14)

Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...
Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...
Hoàn thiện kế toán tập hợp chi phí sản xuất và tính giá thành sản phẩm tại cô...
 
Taller secuencias
Taller secuenciasTaller secuencias
Taller secuencias
 
Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...
Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...
Hoàn thiện kế toán chi phí sản xuất và tính giá thành sản phẩm tại xí nghiệp ...
 
13122014 131725
13122014 13172513122014 131725
13122014 131725
 
806 - גיאומטריה לדוגמה
 806 - גיאומטריה לדוגמה 806 - גיאומטריה לדוגמה
806 - גיאומטריה לדוגמה
 
804 - גיאומטריה אנליטית לדוגמה
804 -  גיאומטריה אנליטית לדוגמה804 -  גיאומטריה אנליטית לדוגמה
804 - גיאומטריה אנליטית לדוגמה
 
2014 winter 802 q
2014 winter 802 q2014 winter 802 q
2014 winter 802 q
 
Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...
Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...
Hoàn thiện kế toán bán hàng và xác định kết quả bán hàng tại công ty thương m...
 
פרק 2 מאגר סטטיסטיקה והסתברות פתרונות
פרק 2 מאגר   סטטיסטיקה והסתברות פתרונותפרק 2 מאגר   סטטיסטיקה והסתברות פתרונות
פרק 2 מאגר סטטיסטיקה והסתברות פתרונות
 
SC-025-O/ES/R-2014
SC-025-O/ES/R-2014 SC-025-O/ES/R-2014
SC-025-O/ES/R-2014
 
Estudio sectorial del sector Marítimo Portuario en El Salvador
Estudio sectorial del sector Marítimo Portuario en El SalvadorEstudio sectorial del sector Marítimo Portuario en El Salvador
Estudio sectorial del sector Marítimo Portuario en El Salvador
 
VisionsLive UBER Brand Report 19.2.16
VisionsLive UBER Brand Report 19.2.16VisionsLive UBER Brand Report 19.2.16
VisionsLive UBER Brand Report 19.2.16
 
806logo
806logo806logo
806logo
 
Nikita Pankratov – athlete and jumper
Nikita Pankratov – athlete and jumperNikita Pankratov – athlete and jumper
Nikita Pankratov – athlete and jumper
 

Ähnlich wie Brooks18

Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...Matthew J McMahon
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 

Ähnlich wie Brooks18 (20)

Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Mehr von Chuck Brooks

Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Chuck Brooks
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting InternationalChuck Brooks
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...Chuck Brooks
 

Mehr von Chuck Brooks (20)

Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer Profile
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 

Brooks18

  • 1. Trends & Challenges in Cybersecurity Chuck Brooks Vice President Sutherland Government Solutions June 16,2016
  • 3. • “A few lines of code can wreak more havoc than a bomb.” Hon. Tom Ridge (Former) Secretary of the U.S. Department of Homeland Security • “Our country will, at some point, face a major cyber-vent that will have a serious effect on our lives, our economy, and the everyday functioning of our society.” Hon. Janet Napolitano (Former) Secretary of the U.S. Department of Homeland Security • “Our primary concern is low-to-moderate level cyber intrusions from a variety of sources which will continue and probably expand,” he said, noting every aspect of American life is being connected to the Internet. “They impose increasing costs to our businesses, to U.S. economic competitiveness and to national security.” James Clapper, Director of National Intelligence Cybersecurity Threats
  • 4. Cybersecurity – Major Threat Actors • Hacker/Script Kiddies/Hobbyist • Insider Threat/Disgruntled Employee • Hacktivist • Industrial Espionage • Foreign Espionage • Terrorist • State Sponsored Attack
  • 5. Cybersecurity – Types of Threats • Trojan. Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. It has the ability to hide itself from antivirus detection and steal important banking data to compromise your bank account. • Virus. Virus is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. • Worms; They it can spread from one computer to anothercomputer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread.
  • 6. Cybersecurity – Types of Threats • Spyware. Is a Malware which is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. • Scareware. Scareware is something that plant into your system and immediately inform you that you have hundreds of infections which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. • Keylogger. Something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password.
  • 7. Cybersecurity – Types of Threats • Adware. Is a form of threat where your computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying. • Backdoor. Backdoor is not really a Malware, but it is a form of method where once a system is vulnerable to this method, attacker will be able to bypass all the regular authentication service. It is usually installed before any virus or Trojan infection because having a backdoor installed will ease the transfer effort of those threats. • DDoS. One of the most famous thing done by Anonymous, which is to send millions of traffic to a single server to cause the system to down with certain security feature disable so that they can do their data stealing. This kind of trick which is to send a lot of traffic to a machine is known as Distributed Denial of Service, also known as DDoS.
  • 8. Cybersecurity – Types of Threats • Botnet. Botnet is something which is installed by a BotMaster to take control of all the computer bots via the Botnet infection. It mostly infects through drive-by downloads or even Trojan infection. The result of this threat is the victim’s computer, which is the bot will be used for a large scale attack like DDoS. • Phishing. A fake website which is designed to look almost like the actual website is a form of phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim. Every form sent out from the phishing site will not go to the actual server, but the attacker controlled server.
  • 9. Types of Threats - Ransomware • Ransomware: in which hackers hold computers and even entire networks hostage for electronic cash payments Ransomware has been around for more than a decade, but attacks have exploded in the past couple of years. There are now more than 120 separate families of ransomware, said experts studying the malicious software. Other researchers have seen a 3,500% increase in the criminal use of net infrastructure that helps run ransomware campaigns The FBI reported some 2,500 incidents in 2015, from which individuals and organizations lost $1.6 million
  • 10.
  • 12. • Over 43% of companies had breaches last year (including mega companies such as Home Depot, JPMorgan, and Target. Moreover, the intrusion threats are not diminishing. • For example, British Petroleum (BP) faces 50,000 attempts at cyber intrusion every day. • OPM Breach - heist of data on 22 million current and former federal employees • According to the think tank Center For Strategic and International Studies (CSIS), cyber related crime now costs the global economy about $445 billion every year Cybersecurity Breaches
  • 13. Securing The Networks • National information networks have become more vulnerable—and therefore more attractive targets. • Growing connectivity among secure and insecure networks creates new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. • The complexity of computer networks is growing faster than the ability to understand and protect them. • The prospects for a cascade of failures across national infrastructures are largely unknown.
  • 14. • Cybersecurity, information assurance, and resilience are the glues that will keep our world of converged sensors and algorithms operational. This has become one of the largest areas of government spending at all agencies and is consistently ranked the top priority among government and industry CIOs in surveys. • In the U.S., most (approximately 85 per cent of the cybersecurity critical infrastructure is owned by the private sector and regulated by the public sector. • The leader civilian agency in the government for public/private cooperation in cybersecurity is the Department of Homeland Security (DHS). Cybersecurity -- Role of Government
  • 16. Securing Critical Infrastructure • Military: Secrets, tactics, location of forces, tampering • Power Grid: Generator controls, power distribution controls • Telecommunications: Phone, internet connectivity • Transportation: Air traffic control, railway, bridge and highway, radar • Fuel Supply: Locations of pipelines, types of fuel and amounts • Banking and Finance: Asset protection, stock market • Emergency Services: 911 system, disaster response, first responder coordination, deployment and locations • Food and Water Infrastructure: Food and water distribution, process
  • 17. Cybersecurity – DHS • DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. • In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. • Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public. • DHS also operates a cyber information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators.
  • 18. Cybersecurity –DHS • DHS is responsible for overseeing the protection of the.gov domain and for providing assistance and expertise to private sector owners and operators. The agency’s work benefits the information technology community and the public at-large. • DHS plays a key role in securing the federal government's civilian cyber networks and helping to secure the broader cyber ecosystem • Investigations and arrests of cyber criminals, and education about how the public can stay safe online. • Combating cyber threats is a shared responsibility. The public, private, and non-profit sectors, and every level of government – including DHS – all have an important role to play.
  • 19. • Defining and monitoring the threat landscape • Risk Management (identifying, assessing and responding to threats- i.e. NIST Framework: Identify, Protect, Detect, Respond, Recover) • Protecting critical infrastructure through rapid proto-typing of technologies and Public/Private cooperation • Modernizing security Architectures: • Better encryption and biometrics (quantum encryption, multiple and keyless authentication) • Automated network-security correcting systems (self-encrypting drives) Cybersecurity Priorities
  • 20. • Technologies for “real time” horizon scanning and monitoring of networks; • Enterprise and client Network isolation to protect against malware, botnets, insider threats • Access Management and Control • Advanced defense for framework layers (network, payload, endpoint, firewalls, and anti-virus); • Diagnostics, data analytics, and forensics (network traffic analysis, payload analysis, and endpoint behavior analysis) • Endpoint protection • Diagnostic and forensics analysis. Cybersecurity Priorities
  • 22. The Digital age and “The Internet of Things”
  • 23. • Cisco predicts that 50 billion devices (including our smartphones, appliances, and office equipment) will be wirelessly connected via a network of sensors to the internet by 2020. • Gartner predicts 21 billion devices • McKinsey & Company: Unlocking the potential of the Internet of Things estimates that IoT will be valued at $4.6 Trillion for the Public Sector in the next ten years • Cisco estimates $14.4 trillion in value for Private Sector and $46 trillion for Public Sector • 604 million users of wearable biometrics by 2019 according to Goode Intelligence *The Digital Age and “The Internet of Things”
  • 24. Policy Issues: • Ethics • Interoperability protocols (standardization) • Cybersecurity, privacy/ surveillance • Complex autonomous systems • Best commercial practices • Regulation The Digital Age and “The Internet of Things”
  • 25. • A “connected transportation system,” and more specifically “connected cars” allow for safer and more efficient urban mobility and is a priority for federal and state & local governments. Connected car technology is evolving rapidly and is now being tested. • In a public/private partnership, the University of Michigan has created a 32-acre simulated city. It is called The Mobility Transformation Center (MTC), and it is designed to simulate traffic events and road conditions for automated and autonomous vehicles, is the largest test facility of its kind and run in partnership with the U.S. Department of Transportation as well as 13 companies. Connected Transportation
  • 26. • According to Eric Schmidt , CEO of Google, we produce more data every other day than we did from the inception of early civilization until the year 2003 combined (over 2.5 billion gigabytes of data are created every day). • Therefore, organizing, managing and analyzing data is more important than ever. • Big data and data analytics are collapsing the information gap and giving businesses and governments the tools they need to uncover trends, population movements, customer preferences, demographics, commerce traffic, transportation, etc. Big Data & Data Science
  • 27. • Emergent artificial intelligence (AI) and augmented reality technologies are no longer things of science fiction and will likely change operations in both the public and private sectors in the next decade. • Companies are already developing technology to distribute artificial intelligence software to millions of graphics and computer processors around the world.. • Augmented reality intertwines the physical and digital world by computer-generated sensory input such as sound, video, graphics, and sometimes even smell. Google Glass and Oculus Rift, are already good examples of these emerging technologies. “Disruptive” Artificial Intelligence /Augmented Reality
  • 28. Sutherland Government Solutions, Inc. (SGSI) mission is to ensure government can meet its vision of fully responding to citizen mandates. As a trusted partner, we enable government to succeed by providing smart, affordable and highly responsive customer care processes and solutions. Our Industry experience instills confidence in constituent oriented government operations. SGSI’s capabilities include rapidly deploying major contact centers, integrating citizen-centric IT services, and processing health and insurance benefit claims. SGSI’s technology-enabled services are performance force multipliers for government, especially in times of budget constraint. Sutherland's Services for Government Include: • Multi-Channel Constituent Relations • Veterans Choice: Customer Care • Healthcare & Insurance Claims Processing • Revenue Cycle Management • Analytics • IT Service Desks & Contact Centers • System Integration
  • 29. Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck is Chairman of the CompTIA Emerging Technologies Committee also serves on Boards to several prominent public and private companies and organizations. Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three large public corporations. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. He is widely published on topics o fhomeland security, cybersecurity, and emerging technologies. Twitter: @ChuckDBrooks Linked in Profile: http://www.linkedin.com/in/chuckbrooks Email: Charles.Brooks@sutherlandglobal.com Chuck Brooks Bio:
  • 30. The problems that exist in the world today cannot be solved by the level of thinking that created them.