dkw proprietary information 1 emergent proprietary information 1 cyber security in the global...
Post on 20-Dec-2015
214 views
TRANSCRIPT
DKW Proprietary Information 1Emergent Proprietary Information 1
Cyber Security In the Global Marketplace
Emergent, Inc.6650 Rivers Avenue Suite 132North Charleston, SC 29406
T: 843-576-1850 • F: 843-576-1879www.emergentcorporation.com
DKW Proprietary Information 2Emergent Proprietary Information 2
Agenda
Introduction Cyber Security Cyber Warfare Platforms Conclusion
DKW Proprietary Information 3Emergent Proprietary Information 3
Curtis Merriweather
Graduate of USC – 2003 BS in Computer Engineering Government Tenure with SSC – 2004 Business Development, Dir. – 2010
President of Mid-Atlantic Region 2011 MBA candidate – The Citadel Manage(d) a Cyber Security Portfolio
DKW Proprietary Information 4Emergent Proprietary Information 4
Introduction
Founded in 2008 as a professional services firm Cleared Facility and personnel Composed of three primary Business Units
Research and Development Information Technology Intelligence Operations
8(a) pending
DKW Proprietary Information 5Emergent Proprietary Information 5
Organization
Intelligence Community, US ArmyCenters of Excellence
Research & DevelopmentIntelligence Community, SPAWAR, US Army
Information TechnologyIntelligence Community, SPAWAR, VA
Senior VP, Operations Executive Vice President
President/CEO
Intelligence Operations
DKW Proprietary Information 6Emergent Proprietary Information 6
Research & Development (R&D)
Innovating solutions with a cyber security focus. Partnered with Academia Supporting several federal agencies to solve NEW
problems Technology Transfer process
DKW Proprietary Information 7Emergent Proprietary Information 7
Information Technology Any-time, anywhere, ubiquitous access to
information Cyber Security Computer Forensics Media Exploitation Computer Network
Attack Defense Exploit
DKW Proprietary Information 8Emergent Proprietary Information 8
Intelligence Operations
Emergent provides support in the following ways: Collections
All-Source Analysis CIDNE Operators and Managers Collection Managers HUMINT Analysis SIGINT Analysis
Processing Exploitation
The maxim 'nothing avails but perfection' can be spelled 'paralysis' -- Winston Churchill
DKW Proprietary Information 9Emergent Proprietary Information 9
Core Capabilities
Customers• Intelligence Community•US Army•SPAWARSYSCEN
Services Provided• Commercialization• ATCD/JTCD Support• Technology Transfer
Services Provided• Collections• Processing • Exploitation
Customers• Intelligence Community• INSCOM
Services Provided• Tier 1 – Service/Help Desk Support• Tier 2 – Technical Support• Tier 3 – Network Engineering and IT System Support
Services Provided• Computer Forensics • Computer Network Defense/ Attack/Exploit • Media Exploitation• NIST 800 Series Certification & Accreditation• DITSCAP/DIACAP C&A•
Customers•Intelligence Community•SPAWARSYSCEN Charleston
Customers• Intelligence Community
Services Provided• Architecture Development – EA, Use Cases, etc..•Software Engineering and Development• Web Portal Design, Implementation and Maintenance• System Implementation, Training and Documentation Support
Customers• Intelligence Community• US Coast Guard, • Veteran Affairs
Research & Development (R&D)
IntelligenceOperations
Information TechnologyManagement
Cyber Security
Application Development
DKW Proprietary Information 10Emergent Proprietary Information 10
Cyber Security
Cyber Security - measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
Cyber Security Standards – are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. ISA 99, NIST, etc..
DKW Proprietary Information 11Emergent Proprietary Information 11
Cyber Warfare "actions by a nation-state to penetrate another nation's computers or
networks for the purposes of causing damage or disruption. – Richard A. Clark
“The Fifth Domain of warfare,“ – The Economist
The DoD has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.“ - Defense Secretary
DKW Proprietary Information 12Emergent Proprietary Information 12
World Events
Adobe Google Intel Juniper Yahoo Government Institutions
State Department, etc..
DKW Proprietary Information 13Emergent Proprietary Information 13
Exploited Platforms Computers Mobile Phones
Android IPhone Blackberry
Satellite Systems Social Networking GPS Technologies
OnStar, ENav Video Game Platforms – offensive and defensive
DKW Proprietary Information 14Emergent Proprietary Information 14
Exploits Bluetooth Hijacking Brute Force Attack Methods Software Exploits War Driving Wireless Exploits
Pushed Advertisements - Phones Hotspots
Trojan/Virus Generators Phishing Schemes
DKW Proprietary Information 15Emergent Proprietary Information 15
Defensive Strategies Increased Awareness Common Defense Measures
Information Assurance Patching Secure Coding Methodologies - Developers Software Updates
Active Defense Strategy Cloudshield IBM – Analytics Engine
Defense-in-Depth Strategy Multi-Phase Authentication vs. Single Sign-On
DKW Proprietary Information 16Emergent Proprietary Information 16
Situation Awareness – Defense Strategies
Honeypot Projects Collection Agent
Hopefully uncover motives
Computer Forensics Encase v.6 Log Collector
Media Exploitation Specialized tools DOMEX/MEDEX Experts
DKW Proprietary Information 17Emergent Proprietary Information 17
Defensive Strategies
Certified Ethical Hackers (CEH) White Hats
Complete Penetration Testing Inside Outside
Security Experts Real World Experience Certification Programs
Security+, CWSP, CISSP, etc…