Upload
trish-mcginity
View
24
Download
0
Embed Size (px)
Citation preview
1
National Cybersecurity
Center
RESPONSE. EDUCATION. TRAINING. RESEARCH
November 2016
• National Cybersecurity Center (NCC) Activation
• Cyber Characteristics
• NCC Operations Way-ahead
Overview
• January 20th, 2016-NCC incorporated
• April 2016-Bylaws Established
• May 2016-Act signed in May 2016, appropriating $8 million to the
NCC
• July 2016-National Cybersecurity Center name change from NCIC
• TRW building identified as the future home of the NCC
• Board of Directors Established
• Multiple Outreach Activities-March-October
NCC Milestones
• Initial capability Nov 1, 2016
• Governor’s Symposium-November 13-15, 2016
• NCC-OWL Board of Director’s Training-November 16-17, 2016
• Move to permanent residence NLT June 2017-Targeting Jan
2017
NCC Future Accomplishments
Key Engagements
• University of Colorado Colorado Springs• TRW-NCC Temporary Office Space
• Heidrick & Struggles• National CEO Search
• Sparks Wilson• Legal
• Stockman Kast Ryan + CO• Accounting
• PwC• Business Plan
Mission & Vision
NCC MissionThe National Cybersecurity Center (NCC)
provides collaborative cybersecurity response services with comprehensive knowledge and capabilities through training, education, and
research.
NCC VisionEnabling cybersecurity information and
expertise for all.
7
Governance
NCC BOARD OF DIRECTORS
Bob Hurst- Chairman of the Board Erik Mitisek- Project X-ite, DU
John Suthers- Mayor of Colorado Springs Nancy Phillips- ViaWest
Pam Shockley-Zalabak- Chancellor, UCCS Martin Wood- UCCS
Christian Anschutz- Anschutz Foundation Mark Weatherford- vArmour
Rhett Hernandez- LTG, US Army Ret Mike Marcotte- Acumen Digital
Dave Anderson- CH2M Hill Kyle Hybl- El Pomar Foundation
Rick Crandall- Aspen Venture Partners
January 2016March 20165 Board of Directors
April 20169 Board of Directors
May 2016Chairman, Bob Hurst
Aug 201613
Directors
Nov 2016IOC
NCC Board Demographics
• CYBER: 4• PRIVATE SECTOR: 5 • ACADEMIC: 3 • MILITARY/GOVERNMENT: 2 • PHILANTHROPY: 2 • PUBLIC OFFICIAL: 1 • COLORADO SPRINGS: 4• CORPORATE LEADERS: 3 • PUBLIC CYBER POLICY: 0• DIVERSITY: 3• COLORADO: 12 • WASHINGTON DC REP: 1• SECURITY SERVICES: 0
9
Ed Rios
The NCC: A Deeper Dive
Support from public, private, and nonprofit sectors
Board of directors with government leaders, cyber experts, academic leaders, and private
Funding from State, Philanthropy, Corporate and Individuals
Permanent facility for training courses and response
Neutral, nonprofit spreading cybersecurity knowledge
11
Challenges/Actions
Expectation Management
Identifying Resources
Develop the business and funding plan
Renovate the TRW facility in Colorado Springs
NCC Initial Operational Capability---1 November 2016
12
• Dedicated to:• Federal agencies• States • Cities• Local governments• Private sector
• To engage with real-time information on the latest trends, security, best practices and educational resources for them- as well as a place for their teams to best manage our critical assets.
Cyber Institute (CI)
• Dedicated facility staffed by
• leading experts
• Vendors
• partners (private & public)
• who assist the members of the NCC in
the instance of an attack.
Rapid Response Center (RRC)
• Dedicated center focused on workforce development.
• Will operate the cyber research center.
• The CRETC will be staffed with a strong, collaborative
network with leading minds and institutions around the
U.S.
• National Schools: University of Texas at San Antonio,
Huntsville, George Mason, Norwich, University Washington
Cyber Research, Education and Training Center
Cyber Characteristics
• Cyber is:
• Cultural
• Generational
• Constantly Changing
Characteristics of Cyber
The social perspectives and practices influenced by the use of
computers and the interconnected networks (Inter net) for
communication, entertainment, and business.
As Americans, almost everything we do in our life is influenced
by cyber
Cyber Culture
• Cyber Anthropology
• Cyber Sociology
• Cyber Psychology
• Cyber Law
• Cyber Economics
• Cyber Warfare
Some Types of Cyber Culture
• Cyber Anthropology- Cyber Anthropology: relationship between humans and digital-era
technology1
- New 'virtual' communities are no longer defined by geographic or
even ethnic/religious/linguistic boundaries.
o “…Communities are being constructed in cyberspace on the
basis of common affiliative interests, transcending
boundaries of class, nation, race, gender, and language.” 2
Cyber Culture: Social Sciences
1 "Techno-Anthropology course guide". Aalborg University. Retrieved 14 March 2013
2 http://www2.fiu.edu/~mizrachs/CyberAnthropology.html
Cyber Sociology and Social Engineering• Analysis of online virtual communities and virtual worlds that results in
organizational change catalyzed through the Internet- Violence?
- Politics?
• Easier to influence decisions and exploit trust than to hack
- Insider Threat
- Social Media & Virtual Communities
- CyberCrime
Cyber Culture: Social Sciences
Cybersphychology• Journal of Psychosocial Research on Cyberspace
• Excessive Chatting: Need to Text (It can’t wait… even if it means I
can die!)
• Hooked on Social Media— “Selfbook” and Selfies
• Online gaming and other addictions
- AM & OPM
Cyber Culture: Social Sciences
• Software Coding concepts now in children’s toys- Osmo Coding Toy—among others
o Physical blocks together to create sequences of commands
as computer programming fundamentals
o Use little blocks to build codes, and the watch the effect on
their iPad
o Ages 6-12
• Grandparents vs. smart phone features
• Cybersecurity threats to cybersecurity naive: Old & Young
Cyber Generations
• Law- US Code: 10, 15, 18, 32, 50
- 7451 - National cybersecurity awareness and education
program
- Intel
- AQ
- Guard
- ITAR (out vs. in)
- Privacy (sure…)
• Economics- Banking
- Wall Street (SaaS)
- Logistics and Transportation
Cyber Law and Economics
• Networks vs. Networks
- .gov - .mil - .com
• Attribution
• Deterrence
• “Offensive" Cyber- Warfare
- Intelligence
• Most Importantly: Thresholds
Cyber Warfare
• Moore’s Law
• Dark Net
• Malware coding and tactics
- Counter-coding
• Cyber Forensic Investigation
- Hunting
• Encryption• Quantum Computing
Cyber’s Constant Change
NCC Operations: The Way-ahead
NCX
3650 N. Nevada (Former TRW Building. NCC to lease from University of Colorado)
134,592 sq. ft. 10.09 acre lot
Future Home of the NCC
PREVENTION/EDUCATION: Provide resources for training Boards/Executive Leadership
Provide best practices and current insights to share with S&MBs
Provide training/educational materials for cyber awareness
Identify needs for education and certification
EVENT RESPONSE CAPABILITYVolunteer SMEs for proactive threat mitigation
Identify corporate core competencies for response option database
IMPROVED RISK MANAGEMENTCollect/provide government and private sector cyber risk data
Provide analysis for R & D to mitigate developing threats
How Might We Partner?
30
NCC Recent and Coming Events
CIAB Brief- Friday, 7 October
Hogan-Lovells Cybersecurity Seminar –Thursday, 13 October
Colorado Technology Association-Colorado Tech Summit-Wednesday, 19 October
NCC Community Update-October 20th 2016
NCC CI’s Governor’s Symposium-13-15 November
NCC-OWL Board Training-16-17 November
31
National Cybersecurity CenterPhone (719) 255-5225
1867 Austin Bluffs Pkwy Suite 200Colorado Springs, CO 80918
www.NationalCybersecurityCenter.org
Questions and Discussion