Cyber Endeavor Shaun M. Cavanaugh, CISSP ECJ62 - Cyber Defense Division Unclassified ECJ62- 6 November 2015 -

Download Report

Transcript Cyber Endeavor Shaun M. Cavanaugh, CISSP ECJ62 - Cyber Defense Division Unclassified ECJ62- 6 November 2015 -

Cyber Endeavor
Shaun M. Cavanaugh, CISSP
ECJ62 - Cyber Defense Division
Unclassified
ECJ62- 6 November 2015 -
1
Topic Overview
J62 division and our Cyber Endeavor program
• Objectives & Priorities of the Cyber Defense Division
• Cyber Endeavor
•
Participants
•
Facilitators
Overview
Goals
• Cyber Endeavor Seminars
• Cyber Endeavor In the Headlines
• Cyber Endeavor Path Forward
• Cyber Endeavor
Unclassified
ECJ62- 6 November 2015 -
2
USEUCOM J62A – Objective & Priorities
Objective
To build and sustain IA/CD relationships with our partners.
Strengthen cyber defense postures.
Expand EUCOM’s IA/CD information sharing capability.
Ensuring our partners have:
Cyber Defense Capabilities.
Capacity to build and sustain a CD program.
Capable Cyber Defense Workforce.
Capacity to share IA/CD information.
Cyber Endeavor Supports all of our objectives and priorities
Unclassified
ECJ62- 6 November 2015 -
3
Cyber Endeavor - Overview
Premiere forum for international military, industry and academic
professionals to collaborate and improve partnerships with the
end goal of strengthening collective cyber defense capabilities.
Participants Include
40+ nations
Partnership for
Peace (PfP)
NATO
Military audience
Facilitators Include
Industry
Microsoft
SANS
Symantec
IXL
CISCO
Breaking Point
LUSEC
Academia
Michigan State
University
Norwich University
Other
CCDCOE
NATO
US Govt.
And many more…
Unclassified
ECJ62- 6 November 2015 -
4
Cyber Endeavor - Goals
 Build professional cyber relationships.
 Bring like minded nations together to develop cyber security best
practices.
 Meet the global challenge of securing cyberspace in a multi-
national forum.
 Emphasize the importance of building partner capacity and
capabilities.
 Enhance the capability of nations to rapidly deploy with
interoperable and SECURE C4 systems in support of multinational
crisis response.
 Underscore the criticality of Cyber Defense in our collective cyber
domain!
Unclassified
ECJ62- 6 November 2015 -
5
Cyber Endeavor – Seminar Examples
•
Microsoft – Evolving Cyber Threats, How Microsoft Views Cyberspace.
•
Michigan State University – Motives & Behaviors of Malicious Actors on & offline.
•
SANS - 20 Critical Controls – Relationships to Real Threats, Securing the Human.
•
IXL - Building an Effective, Sustainable and Proactive Cyber Security Program
•
Symantec – Cyber Space Operations 101.
•
McAfee - Live Threat Demonstration Lab.
•
CCD COE - Cyber Attack Motivations.
•
CISCO - Gone in 60 Seconds…, Firewall Seminar.
•
BreakingPoint – Performance, Stability & Security of Firewall and IDS.
•
LUSEC – Cyber Defense Monitoring Techniques and Solutions.
•
EUCOM - Malware Analysis, Incident Handling, Fighting Through.
Unclassified
ECJ62- 6 November 2015 -
6
Cyber Endeavor – In the Headlines
In only the second year, Cyber Endeavor is quickly being noticed.
• Cyber Endeavor has been mentioned by Adm. Stavridis in his
March 2011 testimony before the house and senate armed
services committees.
• Also mentioned in March 2011 Department of Defense
Strategy for Operating in Cyberspace.
• Others are looking at our program as a model:
• USCYBERCOM
• Army 5th Signal Command
• PACOM
Unclassified
ECJ62- 6 November 2015 -
7
Cyber Endeavor – Path Forward
•
•
•
•
•
Conduct Cyber Endeavor Seminars throughout the year.
On-line training (CBT Nuggets).
EUCOM Partner’s Portal.
Continue partnerships with academia, industry, and
government.
Cyber Endeavor 2011, 5-21-Sep-2011
•
•
•
•
•
Management Track
Technical Track
Firewall Seminar supporting Combined Endeavor
Live-fire Cyber Range
Scenario Support to Combined Endeavor
“The diverse range of subjects covered and kind of
presentations were ones that you usually cannot find in
the Civilian world.” - - quote from Portuguese Participant
Unclassified
ECJ62- 6 November 2015 -
8
Unclassified
Point of Contact
ECJ62-A
Strategy, Engagement and Policy Branch
International
Information Assurance | Cyber Defense
Program
[email protected]
*** Business cards and Cyber Endeavor fact sheets are available.***
Unclassified
ECJ62- 6 November 2015 -
9