Cyber Endeavor Shaun M. Cavanaugh, CISSP ECJ62 - Cyber Defense Division Unclassified ECJ62- 6 November 2015 -
Download ReportTranscript Cyber Endeavor Shaun M. Cavanaugh, CISSP ECJ62 - Cyber Defense Division Unclassified ECJ62- 6 November 2015 -
Cyber Endeavor Shaun M. Cavanaugh, CISSP ECJ62 - Cyber Defense Division Unclassified ECJ62- 6 November 2015 - 1 Topic Overview J62 division and our Cyber Endeavor program • Objectives & Priorities of the Cyber Defense Division • Cyber Endeavor • Participants • Facilitators Overview Goals • Cyber Endeavor Seminars • Cyber Endeavor In the Headlines • Cyber Endeavor Path Forward • Cyber Endeavor Unclassified ECJ62- 6 November 2015 - 2 USEUCOM J62A – Objective & Priorities Objective To build and sustain IA/CD relationships with our partners. Strengthen cyber defense postures. Expand EUCOM’s IA/CD information sharing capability. Ensuring our partners have: Cyber Defense Capabilities. Capacity to build and sustain a CD program. Capable Cyber Defense Workforce. Capacity to share IA/CD information. Cyber Endeavor Supports all of our objectives and priorities Unclassified ECJ62- 6 November 2015 - 3 Cyber Endeavor - Overview Premiere forum for international military, industry and academic professionals to collaborate and improve partnerships with the end goal of strengthening collective cyber defense capabilities. Participants Include 40+ nations Partnership for Peace (PfP) NATO Military audience Facilitators Include Industry Microsoft SANS Symantec IXL CISCO Breaking Point LUSEC Academia Michigan State University Norwich University Other CCDCOE NATO US Govt. And many more… Unclassified ECJ62- 6 November 2015 - 4 Cyber Endeavor - Goals Build professional cyber relationships. Bring like minded nations together to develop cyber security best practices. Meet the global challenge of securing cyberspace in a multi- national forum. Emphasize the importance of building partner capacity and capabilities. Enhance the capability of nations to rapidly deploy with interoperable and SECURE C4 systems in support of multinational crisis response. Underscore the criticality of Cyber Defense in our collective cyber domain! Unclassified ECJ62- 6 November 2015 - 5 Cyber Endeavor – Seminar Examples • Microsoft – Evolving Cyber Threats, How Microsoft Views Cyberspace. • Michigan State University – Motives & Behaviors of Malicious Actors on & offline. • SANS - 20 Critical Controls – Relationships to Real Threats, Securing the Human. • IXL - Building an Effective, Sustainable and Proactive Cyber Security Program • Symantec – Cyber Space Operations 101. • McAfee - Live Threat Demonstration Lab. • CCD COE - Cyber Attack Motivations. • CISCO - Gone in 60 Seconds…, Firewall Seminar. • BreakingPoint – Performance, Stability & Security of Firewall and IDS. • LUSEC – Cyber Defense Monitoring Techniques and Solutions. • EUCOM - Malware Analysis, Incident Handling, Fighting Through. Unclassified ECJ62- 6 November 2015 - 6 Cyber Endeavor – In the Headlines In only the second year, Cyber Endeavor is quickly being noticed. • Cyber Endeavor has been mentioned by Adm. Stavridis in his March 2011 testimony before the house and senate armed services committees. • Also mentioned in March 2011 Department of Defense Strategy for Operating in Cyberspace. • Others are looking at our program as a model: • USCYBERCOM • Army 5th Signal Command • PACOM Unclassified ECJ62- 6 November 2015 - 7 Cyber Endeavor – Path Forward • • • • • Conduct Cyber Endeavor Seminars throughout the year. On-line training (CBT Nuggets). EUCOM Partner’s Portal. Continue partnerships with academia, industry, and government. Cyber Endeavor 2011, 5-21-Sep-2011 • • • • • Management Track Technical Track Firewall Seminar supporting Combined Endeavor Live-fire Cyber Range Scenario Support to Combined Endeavor “The diverse range of subjects covered and kind of presentations were ones that you usually cannot find in the Civilian world.” - - quote from Portuguese Participant Unclassified ECJ62- 6 November 2015 - 8 Unclassified Point of Contact ECJ62-A Strategy, Engagement and Policy Branch International Information Assurance | Cyber Defense Program [email protected] *** Business cards and Cyber Endeavor fact sheets are available.*** Unclassified ECJ62- 6 November 2015 - 9