SlideShare ist ein Scribd-Unternehmen logo
1 von 31
National
Cybersecurity
Center
RESPONSE. EDUCATION. TRAINING. RESEARCH
1November 2016
• National Cybersecurity Center (NCC) Activation
• Cyber Characteristics
• NCC Operations Way-ahead
Overview
• January 20th, 2016-NCC incorporated
• April 2016-Bylaws Established
• May 2016-Act signed in May 2016, appropriating $8 million to the
NCC
• July 2016-National Cybersecurity Center name change from NCIC
• TRW building identified as the future home of the NCC
• Board of Directors Established
• Multiple Outreach Activities-March-October
NCC Milestones
• Initial capability Nov 1, 2016
• Governor’s Symposium-November 13-15, 2016
• NCC-OWL Board of Director’s Training-November 16-17, 2016
• Move to permanent residence NLT June 2017-Targeting Jan
2017
NCC Future Accomplishments
Key Engagements
• University of Colorado Colorado Springs
• TRW-NCC Temporary Office Space
• Heidrick & Struggles
• National CEO Search
• Sparks Wilson
• Legal
• Stockman Kast Ryan + CO
• Accounting
• PwC
• Business Plan
Mission & Vision
NCC Mission
The National Cybersecurity Center (NCC)
provides collaborative cybersecurity response
services with comprehensive knowledge and
capabilities through training, education, and
research.
NCC Vision
Enabling cybersecurity information and
expertise for all.
7
Governance
NCC BOARD OF DIRECTORS
Bob Hurst- Chairman of the Board Erik Mitisek- Project X-ite, DU
John Suthers- Mayor of Colorado Springs Nancy Phillips- ViaWest
Pam Shockley-Zalabak- Chancellor, UCCS Martin Wood- UCCS
Christian Anschutz- Anschutz Foundation Mark Weatherford- vArmour
Rhett Hernandez- LTG, US Army Ret Mike Marcotte- Acumen Digital
Dave Anderson- CH2M Hill Kyle Hybl- El Pomar Foundation
Rick Crandall- Aspen Venture Partners
January 2016
March 2016
5 Board of
Directors
April 2016
9 Board of
Directors
May 2016
Chairman,
Bob Hurst
Aug 2016
13
Directors
Nov 2016
IOC
NCC Board Demographics
• CYBER: 4
• PRIVATE SECTOR: 5
• ACADEMIC: 3
• MILITARY/GOVERNMENT: 2
• PHILANTHROPY: 2
• PUBLIC OFFICIAL: 1
• COLORADO SPRINGS: 4
• CORPORATE LEADERS: 3
• PUBLIC CYBER POLICY: 0
• DIVERSITY: 3
• COLORADO: 12
• WASHINGTON DC REP: 1
• SECURITY SERVICES: 0
9
Ed Rios
The NCC: A Deeper Dive
Support from public, private, and nonprofit sectors
Board of directors with government leaders, cyber experts,
academic leaders, and private
Funding from State, Philanthropy, Corporate and Individuals
Permanent facility for training courses and response
Neutral, nonprofit spreading cybersecurity knowledge
11
Challenges/Actions
Expectation Management
Identifying Resources
Develop the business and funding plan
Renovate the TRW facility in Colorado Springs
NCC Initial Operational Capability---1 November 2016
12
• Dedicated to:
• Federal agencies
• States
• Cities
• Local governments
• Private sector
• To engage with real-time information on the latest
trends, security, best practices and educational
resources for them- as well as a place for their teams
to best manage our critical assets.
Cyber Institute (CI)
• Dedicated facility staffed by
• leading experts
• Vendors
• partners (private & public)
• who assist the members of the NCC in
the instance of an attack.
Rapid Response Center (RRC)
• Dedicated center focused on workforce development.
• Will operate the cyber research center.
• The CRETC will be staffed with a strong, collaborative
network with leading minds and institutions around the
U.S.
• National Schools: University of Texas at San Antonio,
Huntsville, George Mason, Norwich, University
Washington
Cyber Research, Education and Training Center
Cyber Characteristics
• Cyber is:
• Cultural
• Generational
• Constantly Changing
Characteristics of Cyber
The social perspectives and practices influenced by the use of
computers and the interconnected networks (Inter net) for
communication, entertainment, and business.
As Americans, almost everything we do in our life is influenced
by cyber
Cyber Culture
• Cyber Anthropology
• Cyber Sociology
• Cyber Psychology
• Cyber Law
• Cyber Economics
• Cyber Warfare
Some Types of Cyber Culture
• Cyber Anthropology
- Cyber Anthropology: relationship between humans and digital-
era technology1
- New 'virtual' communities are no longer defined by geographic or
even ethnic/religious/linguistic boundaries.
o “…Communities are being constructed in cyberspace on the
basis of common affiliative interests, transcending
boundaries of class, nation, race, gender, and language.” 2
Cyber Culture: Social Sciences
1 "Techno-Anthropology course guide". Aalborg University. Retrieved 14 March 2013
2 http://www2.fiu.edu/~mizrachs/CyberAnthropology.html
Cyber Sociology and Social Engineering
• Analysis of online virtual communities and virtual worlds that results in
organizational change catalyzed through the Internet
- Violence?
- Politics?
• Easier to influence decisions and exploit trust than to hack
- Insider Threat
- Social Media & Virtual Communities
- CyberCrime
Cyber Culture: Social Sciences
Cybersphychology
• Journal of Psychosocial Research on Cyberspace
• Excessive Chatting: Need to Text (It can’t wait… even if it means I
can die!)
• Hooked on Social Media— “Selfbook” and Selfies
• Online gaming and other addictions
- AM & OPM
Cyber Culture: Social Sciences
• Software Coding concepts now in children’s toys
- Osmo Coding Toy—among others
o Physical blocks together to create sequences of commands
as computer programming fundamentals
o Use little blocks to build codes, and the watch the effect on
their iPad
o Ages 6-12
• Grandparents vs. smart phone features
• Cybersecurity threats to cybersecurity naive: Old & Young
Cyber Generations
• Law
- US Code: 10, 15, 18, 32, 50
- 7451 - National cybersecurity awareness and education
program
- Intel
- AQ
- Guard
- ITAR (out vs. in)
- Privacy (sure…)
• Economics
- Banking
- Wall Street (SaaS)
- Logistics and Transportation
Cyber Law and Economics
• Networks vs. Networks
- .gov - .mil - .com
• Attribution
• Deterrence
• “Offensive" Cyber
- Warfare
- Intelligence
• Most Importantly: Thresholds
Cyber Warfare
• Moore’s Law
• Dark Net
• Malware coding and tactics
- Counter-coding
• Cyber Forensic Investigation
- Hunting
• Encryption
• Quantum Computing
Cyber’s Constant Change
NCC Operations: The Way-ahead
NCX
3650 N. Nevada
(Former TRW Building. NCC to lease from University of Colorado)
134,592 sq. ft. 10.09 acre lot
Future Home of the NCC
PREVENTION/EDUCATION:
Provide resources for training Boards/Executive Leadership
Provide best practices and current insights to share with S&MBs
Provide training/educational materials for cyber awareness
Identify needs for education and certification
EVENT RESPONSE CAPABILITY
Volunteer SMEs for proactive threat mitigation
Identify corporate core competencies for response option database
IMPROVED RISK MANAGEMENT
Collect/provide government and private sector cyber risk data
Provide analysis for R & D to mitigate developing threats
How Might We Partner?
30
NCC Recent and Coming Events
CIAB Brief- Friday, 7 October
Hogan-Lovells Cybersecurity Seminar –Thursday, 13 October
Colorado Technology Association-Colorado Tech Summit-Wednesday, 19
October
NCC Community Update-October 20th 2016
NCC CI’s Governor’s Symposium-13-15 November
NCC-OWL Board Training-16-17 November
31
National Cybersecurity Center
Phone (719) 255-5225
1867 Austin Bluffs Pkwy Suite 200
Colorado Springs, CO 80918
www.NationalCybersecurityCenter.org
Questions and Discussion

Weitere ähnliche Inhalte

Andere mochten auch

EISS Cybersecurity Briefing
EISS Cybersecurity BriefingEISS Cybersecurity Briefing
EISS Cybersecurity BriefingEnergySec
 
Being the best cybersecurity strategy - Failing Forward
Being the best cybersecurity strategy - Failing ForwardBeing the best cybersecurity strategy - Failing Forward
Being the best cybersecurity strategy - Failing ForwardJames DeLuccia IV
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDPranav Shah
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 

Andere mochten auch (10)

EISS Cybersecurity Briefing
EISS Cybersecurity BriefingEISS Cybersecurity Briefing
EISS Cybersecurity Briefing
 
Being the best cybersecurity strategy - Failing Forward
Being the best cybersecurity strategy - Failing ForwardBeing the best cybersecurity strategy - Failing Forward
Being the best cybersecurity strategy - Failing Forward
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 

Ähnlich wie Ed Rios - New ncc brief

NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Ketnote: GraphTour Boston
Ketnote: GraphTour BostonKetnote: GraphTour Boston
Ketnote: GraphTour BostonNeo4j
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 
NETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENT
NETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENTNETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENT
NETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENTSVCAVET
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
APEC TEL 63: Building cyber resilience - Internet of communities
APEC TEL 63: Building cyber resilience - Internet of communitiesAPEC TEL 63: Building cyber resilience - Internet of communities
APEC TEL 63: Building cyber resilience - Internet of communitiesAPNIC
 
Reno Police Audit 2021 (draft version)
Reno Police Audit 2021 (draft version)Reno Police Audit 2021 (draft version)
Reno Police Audit 2021 (draft version)This Is Reno
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentationMichael Mathews
 
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
Tech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJamTech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJam
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJamUS-Ignite
 
CACR Overview
CACR OverviewCACR Overview
CACR OverviewVon Welch
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
NDSA Regional Amherst Presentation
NDSA Regional Amherst PresentationNDSA Regional Amherst Presentation
NDSA Regional Amherst PresentationMicah Altman
 

Ähnlich wie Ed Rios - New ncc brief (20)

NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Ketnote: GraphTour Boston
Ketnote: GraphTour BostonKetnote: GraphTour Boston
Ketnote: GraphTour Boston
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
NETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENT
NETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENTNETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENT
NETWORKING AND INFORMATION TECHNOLOGY AND DEVELOPMENT
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
APEC TEL 63: Building cyber resilience - Internet of communities
APEC TEL 63: Building cyber resilience - Internet of communitiesAPEC TEL 63: Building cyber resilience - Internet of communities
APEC TEL 63: Building cyber resilience - Internet of communities
 
Reno Police Audit 2021 (draft version)
Reno Police Audit 2021 (draft version)Reno Police Audit 2021 (draft version)
Reno Police Audit 2021 (draft version)
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentation
 
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
Tech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJamTech Jam 2015: Perspectives on Smart CitiesGlobal Cities TechJam
Tech Jam 2015: Perspectives on Smart Cities Global Cities TechJam
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
NDSA Regional Amherst Presentation
NDSA Regional Amherst PresentationNDSA Regional Amherst Presentation
NDSA Regional Amherst Presentation
 

Mehr von Trish McGinity, CCSK

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17Trish McGinity, CCSK
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebTrish McGinity, CCSK
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?Trish McGinity, CCSK
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxTrish McGinity, CCSK
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Trish McGinity, CCSK
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionTrish McGinity, CCSK
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsTrish McGinity, CCSK
 

Mehr von Trish McGinity, CCSK (16)

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 

Kürzlich hochgeladen

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Ed Rios - New ncc brief

  • 2. • National Cybersecurity Center (NCC) Activation • Cyber Characteristics • NCC Operations Way-ahead Overview
  • 3. • January 20th, 2016-NCC incorporated • April 2016-Bylaws Established • May 2016-Act signed in May 2016, appropriating $8 million to the NCC • July 2016-National Cybersecurity Center name change from NCIC • TRW building identified as the future home of the NCC • Board of Directors Established • Multiple Outreach Activities-March-October NCC Milestones
  • 4. • Initial capability Nov 1, 2016 • Governor’s Symposium-November 13-15, 2016 • NCC-OWL Board of Director’s Training-November 16-17, 2016 • Move to permanent residence NLT June 2017-Targeting Jan 2017 NCC Future Accomplishments
  • 5. Key Engagements • University of Colorado Colorado Springs • TRW-NCC Temporary Office Space • Heidrick & Struggles • National CEO Search • Sparks Wilson • Legal • Stockman Kast Ryan + CO • Accounting • PwC • Business Plan
  • 6. Mission & Vision NCC Mission The National Cybersecurity Center (NCC) provides collaborative cybersecurity response services with comprehensive knowledge and capabilities through training, education, and research. NCC Vision Enabling cybersecurity information and expertise for all.
  • 7. 7 Governance NCC BOARD OF DIRECTORS Bob Hurst- Chairman of the Board Erik Mitisek- Project X-ite, DU John Suthers- Mayor of Colorado Springs Nancy Phillips- ViaWest Pam Shockley-Zalabak- Chancellor, UCCS Martin Wood- UCCS Christian Anschutz- Anschutz Foundation Mark Weatherford- vArmour Rhett Hernandez- LTG, US Army Ret Mike Marcotte- Acumen Digital Dave Anderson- CH2M Hill Kyle Hybl- El Pomar Foundation Rick Crandall- Aspen Venture Partners January 2016 March 2016 5 Board of Directors April 2016 9 Board of Directors May 2016 Chairman, Bob Hurst Aug 2016 13 Directors Nov 2016 IOC
  • 8. NCC Board Demographics • CYBER: 4 • PRIVATE SECTOR: 5 • ACADEMIC: 3 • MILITARY/GOVERNMENT: 2 • PHILANTHROPY: 2 • PUBLIC OFFICIAL: 1 • COLORADO SPRINGS: 4 • CORPORATE LEADERS: 3 • PUBLIC CYBER POLICY: 0 • DIVERSITY: 3 • COLORADO: 12 • WASHINGTON DC REP: 1 • SECURITY SERVICES: 0
  • 10. The NCC: A Deeper Dive Support from public, private, and nonprofit sectors Board of directors with government leaders, cyber experts, academic leaders, and private Funding from State, Philanthropy, Corporate and Individuals Permanent facility for training courses and response Neutral, nonprofit spreading cybersecurity knowledge
  • 11. 11 Challenges/Actions Expectation Management Identifying Resources Develop the business and funding plan Renovate the TRW facility in Colorado Springs NCC Initial Operational Capability---1 November 2016
  • 12. 12 • Dedicated to: • Federal agencies • States • Cities • Local governments • Private sector • To engage with real-time information on the latest trends, security, best practices and educational resources for them- as well as a place for their teams to best manage our critical assets. Cyber Institute (CI)
  • 13. • Dedicated facility staffed by • leading experts • Vendors • partners (private & public) • who assist the members of the NCC in the instance of an attack. Rapid Response Center (RRC)
  • 14. • Dedicated center focused on workforce development. • Will operate the cyber research center. • The CRETC will be staffed with a strong, collaborative network with leading minds and institutions around the U.S. • National Schools: University of Texas at San Antonio, Huntsville, George Mason, Norwich, University Washington Cyber Research, Education and Training Center
  • 16. • Cyber is: • Cultural • Generational • Constantly Changing Characteristics of Cyber
  • 17. The social perspectives and practices influenced by the use of computers and the interconnected networks (Inter net) for communication, entertainment, and business. As Americans, almost everything we do in our life is influenced by cyber Cyber Culture
  • 18. • Cyber Anthropology • Cyber Sociology • Cyber Psychology • Cyber Law • Cyber Economics • Cyber Warfare Some Types of Cyber Culture
  • 19. • Cyber Anthropology - Cyber Anthropology: relationship between humans and digital- era technology1 - New 'virtual' communities are no longer defined by geographic or even ethnic/religious/linguistic boundaries. o “…Communities are being constructed in cyberspace on the basis of common affiliative interests, transcending boundaries of class, nation, race, gender, and language.” 2 Cyber Culture: Social Sciences 1 "Techno-Anthropology course guide". Aalborg University. Retrieved 14 March 2013 2 http://www2.fiu.edu/~mizrachs/CyberAnthropology.html
  • 20. Cyber Sociology and Social Engineering • Analysis of online virtual communities and virtual worlds that results in organizational change catalyzed through the Internet - Violence? - Politics? • Easier to influence decisions and exploit trust than to hack - Insider Threat - Social Media & Virtual Communities - CyberCrime Cyber Culture: Social Sciences
  • 21. Cybersphychology • Journal of Psychosocial Research on Cyberspace • Excessive Chatting: Need to Text (It can’t wait… even if it means I can die!) • Hooked on Social Media— “Selfbook” and Selfies • Online gaming and other addictions - AM & OPM Cyber Culture: Social Sciences
  • 22. • Software Coding concepts now in children’s toys - Osmo Coding Toy—among others o Physical blocks together to create sequences of commands as computer programming fundamentals o Use little blocks to build codes, and the watch the effect on their iPad o Ages 6-12 • Grandparents vs. smart phone features • Cybersecurity threats to cybersecurity naive: Old & Young Cyber Generations
  • 23. • Law - US Code: 10, 15, 18, 32, 50 - 7451 - National cybersecurity awareness and education program - Intel - AQ - Guard - ITAR (out vs. in) - Privacy (sure…) • Economics - Banking - Wall Street (SaaS) - Logistics and Transportation Cyber Law and Economics
  • 24. • Networks vs. Networks - .gov - .mil - .com • Attribution • Deterrence • “Offensive" Cyber - Warfare - Intelligence • Most Importantly: Thresholds Cyber Warfare
  • 25. • Moore’s Law • Dark Net • Malware coding and tactics - Counter-coding • Cyber Forensic Investigation - Hunting • Encryption • Quantum Computing Cyber’s Constant Change
  • 26. NCC Operations: The Way-ahead
  • 27. NCX
  • 28. 3650 N. Nevada (Former TRW Building. NCC to lease from University of Colorado) 134,592 sq. ft. 10.09 acre lot Future Home of the NCC
  • 29. PREVENTION/EDUCATION: Provide resources for training Boards/Executive Leadership Provide best practices and current insights to share with S&MBs Provide training/educational materials for cyber awareness Identify needs for education and certification EVENT RESPONSE CAPABILITY Volunteer SMEs for proactive threat mitigation Identify corporate core competencies for response option database IMPROVED RISK MANAGEMENT Collect/provide government and private sector cyber risk data Provide analysis for R & D to mitigate developing threats How Might We Partner?
  • 30. 30 NCC Recent and Coming Events CIAB Brief- Friday, 7 October Hogan-Lovells Cybersecurity Seminar –Thursday, 13 October Colorado Technology Association-Colorado Tech Summit-Wednesday, 19 October NCC Community Update-October 20th 2016 NCC CI’s Governor’s Symposium-13-15 November NCC-OWL Board Training-16-17 November
  • 31. 31 National Cybersecurity Center Phone (719) 255-5225 1867 Austin Bluffs Pkwy Suite 200 Colorado Springs, CO 80918 www.NationalCybersecurityCenter.org Questions and Discussion