SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Louisiana-basedPublic-Private Partnershipsin Support ofState, Local, and Federal Government Lt General Bob Elder, USAF (Retired) Louisiana Homeland Defense Forum 15 April 2010
Overview Cyber Security Cyber Assurance and Defense Government-Industry Collaboration WorkforceDevelopment Facilitating Cyber Networking
Full Spectrum Cyber Defense Cyberspace Typology ,[object Object]
Commercial
Regulated Commercial
Government (.gov)
Military (Admin)
Military (Ops)
Economic Security
Public Safety
WMD/E Defense/I&WOther US Cyberspace (includes DIB) & Associated Cyber Infrastructure CADC FOCUS Global Information Gridand DOD Networks State & Local Gov’t Cyberspace US GovernmentCyberspace
Information Protection Influence Attack ElectromagneticSpectrumAttack Cyber Attack InfluenceProtection ElectronicProtection Data/CodeProtection Force Protection Physical Attack (includes Directed Energy) Logical Networks Wireless Networks Digital Data & Code Electromagnetic Spectrum Social Networks CND-RA Cyber Use Electronics (& Infrastructure) Law Enforcement Effects of Attacks: ,[object Object]
 Confidential Data Loss

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010segughana
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet GovernanceDiploFoundation
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4Chaesub Lee
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentationITU
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchAntonio Marcos Alberti
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information SecurityRoberto Reale
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis   Enterprise Networks for UK Spectrum Policy ForumDisruptive Analysis   Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis Enterprise Networks for UK Spectrum Policy ForumDean Bubley
 
Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018Dean Bubley
 
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5GDean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5GDean Bubley
 
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum ConferenceDean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum ConferenceDean Bubley
 

Was ist angesagt? (20)

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentation
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
 
Governing Information Security
Governing Information SecurityGoverning Information Security
Governing Information Security
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis   Enterprise Networks for UK Spectrum Policy ForumDisruptive Analysis   Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
 
Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018Disruptive Analysis + Dean Bubley Intro May 2018
Disruptive Analysis + Dean Bubley Intro May 2018
 
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5GDean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
Dean Bubley presentation on In-Buillding Wireless Network Convergence & 5G
 
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum ConferenceDean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
Dean Bubley presentation at Ofcom Mapping The Future 2019 Spectrum Conference
 

Andere mochten auch

Andere mochten auch (10)

Cooper Presentation
Cooper PresentationCooper Presentation
Cooper Presentation
 
Breenden Presentation
Breenden PresentationBreenden Presentation
Breenden Presentation
 
Booth Presentation
Booth PresentationBooth Presentation
Booth Presentation
 
Dr. Ramesh
Dr. RameshDr. Ramesh
Dr. Ramesh
 
Coates Presentation
Coates PresentationCoates Presentation
Coates Presentation
 
Louisiana Technology Council Membership Presentation 2010 0111
Louisiana Technology Council Membership Presentation 2010 0111Louisiana Technology Council Membership Presentation 2010 0111
Louisiana Technology Council Membership Presentation 2010 0111
 
Steps in designing nutrition programme
Steps in designing nutrition programmeSteps in designing nutrition programme
Steps in designing nutrition programme
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 

Ähnlich wie General Elder- Homeland Security Presentation

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesS.E. CTS CERT-GOV-MD
 
Www.calguard.ca.gov Computer-Network-Defense
Www.calguard.ca.gov   Computer-Network-DefenseWww.calguard.ca.gov   Computer-Network-Defense
Www.calguard.ca.gov Computer-Network-DefenseDavid Sweigert
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfEarlvonDeiparine1
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012Sharmin Ahammad
 

Ähnlich wie General Elder- Homeland Security Presentation (20)

Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
 
Www.calguard.ca.gov Computer-Network-Defense
Www.calguard.ca.gov   Computer-Network-DefenseWww.calguard.ca.gov   Computer-Network-Defense
Www.calguard.ca.gov Computer-Network-Defense
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
Chris Boyer
Chris BoyerChris Boyer
Chris Boyer
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
188
188188
188
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
 

Mehr von Louisiana Technology Council

Mehr von Louisiana Technology Council (10)

RFP Information Technology Services 7101 01107
RFP Information Technology Services 7101 01107RFP Information Technology Services 7101 01107
RFP Information Technology Services 7101 01107
 
2011 Governor's Technology Awards- Submission Information
2011 Governor's Technology Awards- Submission Information2011 Governor's Technology Awards- Submission Information
2011 Governor's Technology Awards- Submission Information
 
CVDI Invitation
CVDI InvitationCVDI Invitation
CVDI Invitation
 
CVDI Benefits
CVDI BenefitsCVDI Benefits
CVDI Benefits
 
Center for Visual & Decision Information Highlights and Facilities
Center for Visual & Decision Information Highlights and FacilitiesCenter for Visual & Decision Information Highlights and Facilities
Center for Visual & Decision Information Highlights and Facilities
 
2011 Annual Membership Meeting Slideshow
2011 Annual Membership Meeting Slideshow2011 Annual Membership Meeting Slideshow
2011 Annual Membership Meeting Slideshow
 
Sponsorship Handbook 2011
Sponsorship Handbook 2011Sponsorship Handbook 2011
Sponsorship Handbook 2011
 
Dennis walsh-consultant-and-former-cto-general-motors-presentation-082610
Dennis walsh-consultant-and-former-cto-general-motors-presentation-082610Dennis walsh-consultant-and-former-cto-general-motors-presentation-082610
Dennis walsh-consultant-and-former-cto-general-motors-presentation-082610
 
Healthcare
HealthcareHealthcare
Healthcare
 
Gulf coast-government-contractors-association-overview
Gulf coast-government-contractors-association-overviewGulf coast-government-contractors-association-overview
Gulf coast-government-contractors-association-overview
 

Kürzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

General Elder- Homeland Security Presentation

  • 1. Louisiana-basedPublic-Private Partnershipsin Support ofState, Local, and Federal Government Lt General Bob Elder, USAF (Retired) Louisiana Homeland Defense Forum 15 April 2010
  • 2. Overview Cyber Security Cyber Assurance and Defense Government-Industry Collaboration WorkforceDevelopment Facilitating Cyber Networking
  • 3.
  • 11. WMD/E Defense/I&WOther US Cyberspace (includes DIB) & Associated Cyber Infrastructure CADC FOCUS Global Information Gridand DOD Networks State & Local Gov’t Cyberspace US GovernmentCyberspace
  • 12.
  • 15. System Integrity LossPhysical Networks
  • 16. Proactive Defense & Mission Assurance ATTACKS TARGETS EFFECTS Insider Attacks; Social engineering Disinformation Confusion C2 Disruption Alter Behaviors Human Organization Mission Layer Data and policy Corruption Code Manipulation Malware Inaccuracies Induced Failures Denial of Service Data Exfiltration App/Session Layer Attacker Focus Operator Focus Worms, viruses Flooding OS/Network Layer Backdoor Implants Malfunctions Performance loss Lost Comms HW/Systems Layer Devices & Linkages Physical Destruction Proactive Defense NetworkSecurity Mission Assurance Intelligence & Attack Response Source: 2008 AFSAB Study
  • 17. Multi-State CADC Relationships Internet AR Guard LA Guard MS Guard TX Guard LA NOSC AR NOSC MS NOSC TX NOSC AR Network LA Network MS Network TX Network Cyber Assurance and Defense Network Center
  • 18. Government-Industry Collaboration DoD: Warfighter-Industry Collaboration Environment (WIC-E) Requirement Developers Programmers WIC-E Government User (Warfighter) Acquisition Community “WIC-E” Process Test &Evaluation Capability Provider (Private Sector) Normal Process
  • 19. Workforce Development Partners LSUS LA Tech BPCC NSU Support NSF DoEd NASA DHS NSA StrategicLeader Exploit Cyberspace Operational LeaderSupervise and integratetechnical skills with mission(Mission Assurance) Technical LeaderAreas such as Cyber Security, Info Assurance,Software Assurance, Network Mgmt,Communications, Knowledge Mgmt, Visualization …
  • 20.
  • 21. Cyber Security – provides a basic understanding of computer hardware, software, networks, and encryption
  • 22. Computer Science – curriculum provides students with a basic understanding of computer science, engineering and mathematical concepts as a strong foundation (Web Design & Computer Programming) to further their studies
  • 23. Digital Media - curriculum provides students with a basic understanding of digital media, animation, visual effects, and interactive command and control environments
  • 24. Information Assurance/Digital Forensics –Provides basic understanding of computer hardware, data storage and collection, network intrusion, and data degradationPROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center
  • 25. CIC Academic Pathways Animation and Visual Effects Articulation HS Cyber Courses  BPCC Telecommunications LSUS Digital Forensics Articulation HS Cyber Courses  BPCC CIT Div  NSU (Criminal Justice) Computer Science Articulation HS Cyber Courses  BPCC CIT Div  La Tech (Comp-Sci) Associate of Engineering Articulation HS Cyber Courses  BPCC CIT Div (with LA Tech support) Cyber Security Articulation HS Cyber Courses  BPCC CIT Div La Tech Cyber Academy Articulations in Work Energy, Bio-medical, Software Assurance, E-Business PROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center
  • 26.
  • 29. Outreach to School Boards, Administrators, & Teachers (K-12)
  • 33. High School Digital Forensics Laboratories
  • 35. Local, Regional, and National Cyber Competitions
  • 37. Industry: CISCO Academy (Bossier Career & Technical HS), Warfighter-Industry Collaboration Exercises (WIC-E)
  • 38. Government: Cyber Assurance & Security Education (DHS); NSA, WIC-E (AF), Electronic Systems Command (AF)
  • 39. Universities and Colleges: LA Tech, BPCC, LSUS, NSUPROPRIETARY INFORMATION:Copyright ©2010 by the Cyber Innovation Center
  • 40. Facilitating LA Cyber Partnerships Cyber Assurance & Defense Center National Guard Dept of Homeland Security Cyberspace Innovation Center Law Enforcement DoD Cyber (& related) Industries Assurance & SecurityResearch Academic Community
  • 41. Summary Cyber Security Cyber Assurance and Defense Government-Industry Collaboration WorkforceDevelopment Facilitating Cyber Networking
  • 42.
  • 43. Cyberspace Business Areas Cyber Ops Establish the Domain Form Cyber Networks Secure Cyber Networks Defend the Domain Passive Defense Active Defense Use the Domain Business Augmentation Internet Business Participatory Services COMMERCE Cyberspace importance is increasing

Hinweis der Redaktion

  1. Shared Situational Awareness (As States Allow)Enhanced Anomalous Behavior DetectionDoD Attack Vector Support (through Guard)Multi-state Cyber Resiliency OpportunitiesLarge-scale Enterprise Network OperationsActive Defense Tools Research Focused On State NeedsCyber Assurance Research And SupportCyber Workforce Education And Training ProgramsCyber Assurance And Defense AdvocacyCyber Defense Collaboration
  2. NSU-Northwestern State
  3. Mission: The mission of the Cyber Innovation Center's academic outreach program is to build a sustainable knowledge-based workforce that can support the needs of government, industry and academia.Focus on Teachers – To ensure Organic & Sustainable Growth