PMW 130 Overview EDO Course

Download Report

Transcript PMW 130 Overview EDO Course

Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I)

PMW 130 Overview for 8

th

Annual Security Summit

22 March 2011 Kevin McNally Program Manager PMW 130 858-537-0682 [email protected]

Statement A: Approved for public release; distribution is unlimited

Information Dominance Anytime, Anywhere…

New Era in Collaboration

2

Conficker Spreading

15 Jan 09:

French Navy infected, forcing aircraft at several airbases to be grounded

United Kingdom Ministry of Defense:

Reported infection of over 800 computers

2 Feb 09:

Federal Republic of Germany reported 100 computers infected

Feb 09:

Manchester City Council’s IT system case caused an estimated L1.5m. Believed to be due to flash drives

24 March 09:

British Director of Parliamentary ICT Informed users of the House of Commons were infected

Jan 10:

Greater Manchester Police were disconnected from Police National Computer for three days

3

Conficker

4

Why Do We Need to Collaborate?

• Over 1.97 billion Internet users (420M in China) • DoD makes 1 billion+ Internet connections daily, passing 40TBs of data • DoD Networks scanned and probed 6M times/day -

USCYBERCOM

• 25M new strains of viruses last year, compared to a combined total of 15 million throughout the last 20 years –

Panda Security Annual Report

• Several years ago, zero countries armed for cyber warfare, today 20+ countries – Dr. Eric Cole, McAfee • Stuxnet – Most advanced Cyber Weapon ever seen –

CEO McAfee

• Zeus, aka Zbot, a toolkit to build your own trojan horse, can be purchased for $3000

Because we are all interconnected, one compromised network can compromise us all.

5

Information Assurance & Cyber Security (PMW 130)

• Computer Network Defense (CND) – ACAT IVT • EKMS/KMI - Component of NSA – ACAT IAM • PKI - Component of DISA – ACAT IAM • Cryptography (modernization; legacy)  Navy, USMC, USCG, MSC • Radiant Mercury (RM) – Cross Domain Solution • Tactical Key Loader (TKL) – USMC and SPECOPS • Information Assurance (IA) Services

6

Cyber Defense and the Navy

What Lies Ahead

• Speed to capability - reaction to emerging threats • Collaboration with IC and NGOs on threats • Identifying network anomalies & behaviors • Moving from reactive to predictive • Advanced Persistent Threat • Data loss prevention • Cloud Security • Wireless/handheld devices • Advanced spear phishing • Web security, Social Networks • Web enabled applications/application security • Correlation and Analysis of sensor data 7

Future Collaboration

• Collaboration is vital to our future • Welcome collaboration across government, commercial, academia and other stakeholders • PMW 130 Government/Industry Exchange  An opportunity for industry to present products they feel may be of interest to PMW 130  Attendees include PMW 130 senior leadership, SPAWAR and PEO C4I invitees, and other PMW 130 personnel (Assistant Program Managers, engineers, etc.)    Held once a month 50 minutes, including Q&A Please contact Carol Cooper at [email protected]

8

We get IT.

We also integrate it, install it and support it. For today and tomorrow.

Visit us at www.peoc4i.navy.mil

9