Keith Filzen - The Security Network

Download Report

Transcript Keith Filzen - The Security Network

©

CUBIC

CYBERSOLUTIONS

Who We Are

 Founded in 1951 in San Diego, Calif.

 Public since 1959 – NYSE: CUB  Employs more than 7,400 people worldwide  $1.0+ billion annual revenue (FY 2009)  $2.2 billion total backlog (FY End 2009)  Business Segments:   Defense Transportation

Cubic Corporation

Global Presence

Systems and services provided to more than 50 nations/territories

Cyber Competencies

Full Spectrum Information Assurance

•Compliance, Risk Management, SATE (Security Awareness, Training, and Education), Cryptography & Key Management, Network Security, Vulnerability Assessment, Organization Security Programs (Governance, Policy, Strategy), Continuity Of Operations, Data Lifecycle Management/Data Loss Prevention

Life Cycle System Security Engineering

•System Security Architecture, Design, Engineering, Development, Integration, Disposition, with emphasis on Cross Domain Technologies

Advanced Analytics & Forensics

•Network & Disk Forensics, Network, Host, Application Analytics, Security Metrics, Data & Intelligence Analysis, Open Source Intelligence, Malware Research

Controlled Interfaces

• XD products are hardware/software-based cyber product necessary for Accredited Cross-Domain LOW2HIGH™ and HIGH2LOW™ solutions. Next generation will have 40GB throughput speeds.

Platform Integrity

•Secure software development, Software assurance (kernal, compiler, hypervisor), Software Quality, Accredited Testing & Evaluation Labs, Hardware Encapsulation & Acceleration, Microcode/Microprocessor assurance, Virtualization

Cross-Domain Solutions

• Common Cross-Domain Framework (CCDF) that can span all security domains while providing network transparency to the user(s) and applications at various security and caveat levels. Solution takes current best-of-breed, commercially available technologies and applies them to solving traditional cross domain collaboration challenges by implementing technology that is intermediary and provides the foundation for merging legacy applications. Leverages world class products like XD2500 and XD1000

Logical and Physical Access Control

•Access Control Systems to include installation, and management. Hybrid logical and physical access control integration. Identity management solutions.

Cubic Proprietary

4

Data Integrity

 Which is worse (you don’t know what you don’t know)   External Threats Internal Threats  Where do you spend you security budget  Hard outer shell  Gooey Inside

Data

      What type, how critical is it (CIA Triangle)  IP, Short term, Long Term, … How much money and resources do you want to apply Do you have a key management strategy Need-to-Know Role based access – Do your administrators have the ability to grant but not access data Structured and Unstructured  Databases, Files, Audi, Video

Data in the Enterprise

  Do you have a key management strategy What Real Estate do you own, lease, outsource Cloud Backups Ever thought about Key management What about Meta Data HSM Global Name Spaces Are we really just talking Need-to-Know Can I recover it Things can get ridiculous

Integrity - Transit

    What real estate do you own  Point to point Ipsec  Harder, easily detected, $$$  SSL Universal access Can I recover it Who do I trust, and is it different based upon where I am and what events are happening

What We do – Trust Boundary

  Common Cross Domain Framework  Provides the front end access in / out  Location and Identity based access  Internal vs. External  Inbound vs. Outbound  Differing security connections based up who, what, when, where   Obscurity Virtualization separation from the client XD Cross Domain Products  One-Way Transfer Guards     Fips Connections Virus, Malware, and content filtering One-Way proxy for data, application and streaming content Publishing / Subscribing concept, allowing flow vcontrol on need-to-know information

Keith Filzen, CTO [email protected]

703-821-1518