Transcript PMW 130 Overview EDO Course
Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I)
PMW 130 Overview for 8
th
Annual Security Summit
22 March 2011 Kevin McNally Program Manager PMW 130 858-537-0682 [email protected]
Statement A: Approved for public release; distribution is unlimited
Information Dominance Anytime, Anywhere…
New Era in Collaboration
2
Conficker Spreading
15 Jan 09:
French Navy infected, forcing aircraft at several airbases to be grounded
United Kingdom Ministry of Defense:
Reported infection of over 800 computers
2 Feb 09:
Federal Republic of Germany reported 100 computers infected
Feb 09:
Manchester City Council’s IT system case caused an estimated L1.5m. Believed to be due to flash drives
24 March 09:
British Director of Parliamentary ICT Informed users of the House of Commons were infected
Jan 10:
Greater Manchester Police were disconnected from Police National Computer for three days
3
Conficker
4
Why Do We Need to Collaborate?
• Over 1.97 billion Internet users (420M in China) • DoD makes 1 billion+ Internet connections daily, passing 40TBs of data • DoD Networks scanned and probed 6M times/day -
USCYBERCOM
• 25M new strains of viruses last year, compared to a combined total of 15 million throughout the last 20 years –
Panda Security Annual Report
• Several years ago, zero countries armed for cyber warfare, today 20+ countries – Dr. Eric Cole, McAfee • Stuxnet – Most advanced Cyber Weapon ever seen –
CEO McAfee
• Zeus, aka Zbot, a toolkit to build your own trojan horse, can be purchased for $3000
Because we are all interconnected, one compromised network can compromise us all.
5
Information Assurance & Cyber Security (PMW 130)
• Computer Network Defense (CND) – ACAT IVT • EKMS/KMI - Component of NSA – ACAT IAM • PKI - Component of DISA – ACAT IAM • Cryptography (modernization; legacy) Navy, USMC, USCG, MSC • Radiant Mercury (RM) – Cross Domain Solution • Tactical Key Loader (TKL) – USMC and SPECOPS • Information Assurance (IA) Services
6
Cyber Defense and the Navy
What Lies Ahead
• Speed to capability - reaction to emerging threats • Collaboration with IC and NGOs on threats • Identifying network anomalies & behaviors • Moving from reactive to predictive • Advanced Persistent Threat • Data loss prevention • Cloud Security • Wireless/handheld devices • Advanced spear phishing • Web security, Social Networks • Web enabled applications/application security • Correlation and Analysis of sensor data 7
Future Collaboration
• Collaboration is vital to our future • Welcome collaboration across government, commercial, academia and other stakeholders • PMW 130 Government/Industry Exchange An opportunity for industry to present products they feel may be of interest to PMW 130 Attendees include PMW 130 senior leadership, SPAWAR and PEO C4I invitees, and other PMW 130 personnel (Assistant Program Managers, engineers, etc.) Held once a month 50 minutes, including Q&A Please contact Carol Cooper at [email protected]
8
We get IT.
We also integrate it, install it and support it. For today and tomorrow.
Visit us at www.peoc4i.navy.mil
9