dkw proprietary information 1 emergent proprietary information 1 cyber security in the global...

18
DKW Proprietary Information 1 Emergent Proprietary Information 1 Cyber Security In the Global Marketplace Emergent, Inc. 6650 Rivers Avenue Suite 132 North Charleston, SC 29406 T: 843-576-1850 • F: 843-576-1879 www.emergentcorporation.com

Post on 20-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

DKW Proprietary Information 1Emergent Proprietary Information 1

Cyber Security In the Global Marketplace

Emergent, Inc.6650 Rivers Avenue Suite 132North Charleston, SC 29406

T: 843-576-1850 • F: 843-576-1879www.emergentcorporation.com

DKW Proprietary Information 2Emergent Proprietary Information 2

Agenda

Introduction Cyber Security Cyber Warfare Platforms Conclusion

DKW Proprietary Information 3Emergent Proprietary Information 3

Curtis Merriweather

Graduate of USC – 2003 BS in Computer Engineering Government Tenure with SSC – 2004 Business Development, Dir. – 2010

President of Mid-Atlantic Region 2011 MBA candidate – The Citadel Manage(d) a Cyber Security Portfolio

DKW Proprietary Information 4Emergent Proprietary Information 4

Introduction

Founded in 2008 as a professional services firm Cleared Facility and personnel Composed of three primary Business Units

Research and Development Information Technology Intelligence Operations

8(a) pending

DKW Proprietary Information 5Emergent Proprietary Information 5

Organization

Intelligence Community, US ArmyCenters of Excellence

Research & DevelopmentIntelligence Community, SPAWAR, US Army

Information TechnologyIntelligence Community, SPAWAR, VA

Senior VP, Operations Executive Vice President

President/CEO

Intelligence Operations

DKW Proprietary Information 6Emergent Proprietary Information 6

Research & Development (R&D)

Innovating solutions with a cyber security focus. Partnered with Academia Supporting several federal agencies to solve NEW

problems Technology Transfer process

DKW Proprietary Information 7Emergent Proprietary Information 7

Information Technology Any-time, anywhere, ubiquitous access to

information Cyber Security Computer Forensics Media Exploitation Computer Network

Attack Defense Exploit

DKW Proprietary Information 8Emergent Proprietary Information 8

Intelligence Operations

Emergent provides support in the following ways: Collections

All-Source Analysis CIDNE Operators and Managers Collection Managers HUMINT Analysis SIGINT Analysis

Processing Exploitation

The maxim 'nothing avails but perfection' can be spelled 'paralysis' -- Winston Churchill

DKW Proprietary Information 9Emergent Proprietary Information 9

Core Capabilities

Customers• Intelligence Community•US Army•SPAWARSYSCEN

Services Provided• Commercialization• ATCD/JTCD Support• Technology Transfer

Services Provided• Collections• Processing • Exploitation

Customers• Intelligence Community• INSCOM

Services Provided• Tier 1 – Service/Help Desk Support• Tier 2 – Technical Support• Tier 3 – Network Engineering and IT System Support

Services Provided• Computer Forensics • Computer Network Defense/ Attack/Exploit • Media Exploitation• NIST 800 Series Certification & Accreditation• DITSCAP/DIACAP C&A•

Customers•Intelligence Community•SPAWARSYSCEN Charleston

Customers• Intelligence Community

Services Provided• Architecture Development – EA, Use Cases, etc..•Software Engineering and Development• Web Portal Design, Implementation and Maintenance• System Implementation, Training and Documentation Support

Customers• Intelligence Community• US Coast Guard, • Veteran Affairs

Research & Development (R&D)

IntelligenceOperations

Information TechnologyManagement

Cyber Security

Application Development

DKW Proprietary Information 10Emergent Proprietary Information 10

Cyber Security

Cyber Security - measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack

Cyber Security Standards – are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. ISA 99, NIST, etc..

DKW Proprietary Information 11Emergent Proprietary Information 11

Cyber Warfare "actions by a nation-state to penetrate another nation's computers or

networks for the purposes of causing damage or disruption. – Richard A. Clark

“The Fifth Domain of warfare,“ – The Economist

The DoD has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.“ - Defense Secretary

DKW Proprietary Information 12Emergent Proprietary Information 12

World Events

Adobe Google Intel Juniper Yahoo Government Institutions

State Department, etc..

DKW Proprietary Information 13Emergent Proprietary Information 13

Exploited Platforms Computers Mobile Phones

Android IPhone Blackberry

Satellite Systems Social Networking GPS Technologies

OnStar, ENav Video Game Platforms – offensive and defensive

DKW Proprietary Information 14Emergent Proprietary Information 14

Exploits Bluetooth Hijacking Brute Force Attack Methods Software Exploits War Driving Wireless Exploits

Pushed Advertisements - Phones Hotspots

Trojan/Virus Generators Phishing Schemes

DKW Proprietary Information 15Emergent Proprietary Information 15

Defensive Strategies Increased Awareness Common Defense Measures

Information Assurance Patching Secure Coding Methodologies - Developers Software Updates

Active Defense Strategy Cloudshield IBM – Analytics Engine

Defense-in-Depth Strategy Multi-Phase Authentication vs. Single Sign-On

DKW Proprietary Information 16Emergent Proprietary Information 16

Situation Awareness – Defense Strategies

Honeypot Projects Collection Agent

Hopefully uncover motives

Computer Forensics Encase v.6 Log Collector

Media Exploitation Specialized tools DOMEX/MEDEX Experts

DKW Proprietary Information 17Emergent Proprietary Information 17

Defensive Strategies

Certified Ethical Hackers (CEH) White Hats

Complete Penetration Testing Inside Outside

Security Experts Real World Experience Certification Programs

Security+, CWSP, CISSP, etc…

DKW Proprietary Information 18Emergent Proprietary Information 18

Partnerships

Academia Government Industry

Industry and Academia have to lead the charge