secure everything | protect everyone€¦ · wall street (which is all of us) learned the hard...
TRANSCRIPT
Secure Everything | Protect Everyone
Back in 1971 Cap’n Crunch cereal gave away a plastic whistle called the Captain Crunch whistle. If you blew the toy in the cereal box it made a 2600 Hz tone.
CYBERSECURITY TOUCHES ALL SECTORS
What’s an APT?
Sanger, D. E. (2012). Confront and conceal: Obama's secret wars and surprising use of American power. New York, NY: Crown Publishing Group.
Operation: Olympic GamesThe hype continues as Advanced Persistent Threats (APTs) become popularized
Qiao, L., & Wang, X. (1999). Unrestricted Warfare. Beijing: PLA Literature and Arts Publishing House.
Stoll, C. (1989). The cuckoo's egg: Tracking a spy through the maze of computer espionage. New York, NY: Pocket Books.
Sontag, S., Drew, C., & Drew, A. L. (1998). Blind man's bluff: The untold story of American submarine espionage. New York, NY: William Morrow Paperbacks.
Bowden, M. (2011). Worm: The first digital world war. New York, NY: Grove/Atlantic.
Koppel, T. (2015). Lights out: A cyberattack, a nation unprepared, surviving the aftermath. New York, NY: Crown.
Goodman, M. (2015). Future crimes: Everything is connected, everyone is vulnerable, and what we can do about it. New York, NY: Doubleday.
Escalate privilege and hide… Then try to become wipe-proof
Blunden, B. (2013). The rootkit arsenal: Escape and evasion in the dark corners of the system. Burlington, MA: Jones and Bartlett Learning.
Simon, M. A. (2007). Rootkits for dummies. Hoboken, NJ: John Wiley & Sons.
Pick a vector
Try it out…
Hope for the best!
www.kali.orgFree
Speed
Wall Street (which is all of us) learned the hard way….
The value of a millisecond
Lewis, M. (2014). Flash boys: A wall street revolt. New York, NY: W. W. Norton & Company, Inc.
From web domain to C-Suite in 30 seconds
Sorry Boss
“Cyber” Contracts using Centrifuge Demonstration
Information Only
Valkyrie Cyber Warfare Exploitation Lab
Data Retrieved via Centurion 27 December 2011
Use speed and big data techniques to our advantage!
Search “Cyber” in Centurion
Contracts by award dates
By Department/Value
Dominant ($) NAICS518218541330541512541513541519541690541712561210
ARMY, Health & Human Services, Veterans Affairs
518218541330541512541513541519541690541712561210
Dominant ($) NAICS
Near-term, Largest Dollar Amounts
NGENARMY Missile CommandARMY Software Engineering Center
Defense has biggest investment..but
Others to considerDOE STATE OCC
DHS Treasury USSSDOT USDA Others
Asymmetric Opportunities
ARMY, Health & Human Services, Veterans Affairs
Expense
Income
asset
liability
opportunity costs of cyber (in)security
return on investmentof true cybersecurity Enabling
Safer CommerceSafer TourismSafer Hospital CareSecure Defense ContractsGrowth in Innovation:
UAVBig DataCyber EducationModeling and SimulationBiotechOffshore Energy
2017-2018 GOAL
Use for Education/Workforce Alignment
Apply for (and win) $3 Million NSF Grant
Broadband outlook
Become a World Class ISAO+!
Cyber Intelligence Threat Hunting
Host 2018 NICE Convention
2018 NICE conventionA week of Cyber
EducationOct/Nov 2018