CyberSecurity: Guarding the Digital Gates
Unify. Collaborate. Succeed.
May 25-26, 2010, Washington D.C. USA
           
 
 

Presentations

Tuesday - May 25, 2010
 
  Introduction and Logistics  
 
Download Audio
Welcome
Dr. Richard Soley, Chairman and CEO, Object Management Group
 
Download Audio
Keynote Presentation: The CyberSecurity Challenge: Its Affect and Effect
General Michael V. Hayden (Ret.), Former Director of the National Security Agency (NSA) and the Central Intelligence Agency (CIA)
 
Download Slides
Download Audio
OMG Standards for Securing Cyber Space
Djenana Campara, CEO, KDM Analytics

Most of the current assessments primarily focus on assessing and evaluating the development process and a product's documentation, rather than formal artifacts resulting in subjective "confidence" that system is meeting security objectives. New technology developments in area of system assurance enable solutions for more cost-effective and comprehensive assessments with objective results.
 

Download Slides
Download Audio
Cyber Security Risks: Addressing a Multi-Level Challenge
Col. Gregory J. Rattray (Ret.), Ph.D., Principal with Delta Risk, LLC
 
The presentation addresses the evolution of cyber risks at three perspectives – global, national and enterprise. The challenge of defending enterprise assets against a growing range of threats in an Internet ecosystem not adapted for security and with decentralized control is analyzed. The presentation addresses concepts of cyber resiliency and agility as effective strategies for addressing emerging threats and risks.
  
Download Slides
Download Audio
Rethinking Cybersecurity Engineering and Innovation within the Fleet and Naval Enterprise: An SSC Atlantic Perspective
Michael T. Kutch, Jr., Business Portfolio Manager for Information Dominance and Cyber Warfare Space and Naval Warfare Systems Center Atlantic

 
Download Slides
Download Audio
Managing Risk in an Environment of Advanced Persistent Cyber Threats: Next Generation Security Standards and Guidelines
Ron Ross, Senior Computer Scientist & Information Security Researcher, NIST

Protecting core enterprise missions and the information systems supporting those missions in an environment of increasingly sophisticated cyber threats must be a top priority for senior leaders today. Establishing a strong and robust information security program and employing a flexible and dynamic risk management framework and associated security standards and guidelines can help corporate leaders protect organizational operations and assets from the potential adverse impacts resulting from both routine and advanced persistent cyber threats.
 

Download Audio
Panel Discussion: How to Measure Success; Is Cyber Security a Cross National and Public Effort
Moderator - Victor Harrison, Director, NPS Distinguished Engineer Group, CSC
Panelists:
  • Djenana Campara, CEO, KDM Analytics
  • Gary S. Elliott, Chief Information Assurance Officer
  • Marlena Erdos, Independent Consultant
  • Karen Evans, Director, US Cyber Challenge
  • Ron Ross, Senior Computer Scientist & Information Security Researcher, NIST

This panel will not only explore these attributes of success
and what represents effective measures for each, but the
larger questions of inter-enterprise, cross-agency, and
even cross-national success measures.

  • Risk - the probability of an attack
  • Regret - the measurable impact and resultant consequence of an attack
  • Cost - how much money should be spent to mitigate the risk, avoid the impact, and buffer the consequence
    are inextricably linked and, together, form the basis for
    measuring cyber security success.

Wednesday
- May 26, 2010
 
  Introduction and Days Logistics 
 
Download Audio
Keynote Presentation: The Trajectory of Cyber Security
Samuel S. Visner, Cyber Lead & Vice President, Strategy and Business Development
North American Public Sector - Enforcement, Security and Intelligence, CSC

The visibility of cybersecurity has been heightened significantly by the alarm raised worldwide in the commercial and public sectors alike to the threat to information systems posed by nation-state, cybercriminals, terrorists, and cyber-vandals. The reaction to this threat is also significant: The President of the United States has put forward a Comprehensive National Cybersecurity Initiative (or CNCI), and has appointed a National Cyber Coordinator. A US Cyber Command has been established; the Department of Defense has put in place a Defense Industrial Base (DIB) Pilot Program and Framework Agreements to improve the cybersecurity of aerospace and defense companies. Work is underway to understand the cyber challenge and improve the cybersecurity of the information systems on which depends on our critical infrastructure. Around the world, companies with global supply chains are trying to understand what they have at risk in cyberspace, and how to mitigate that risk. Some companies are going further, seeking to enhance their reputation as information service providers by emphasizing the importance they put on cybersecurity.
 

Download Slides
Download Audio
Standards and Guidance for Engineering Secure Systems
Paul Croll, Chair of the IEEE Software and Systems Engineering Standards Committee & Vice Chair of the US Technical Advisory Group for ISO/IEC JTC1/SC7

Those who acquire, build, and manage large-scale systems and Systems of Systems, recognize the complex supply chain they represent, consisting of proprietary and open-source software, legacy systems, hardware, and firmware; from multiple suppliers who employ people from around the world. As a result, the threat to today's systems is present across the full system life cycle. Dealing with that threat in the acquisition, development, operation, and maintenance of systems is largely a question of understanding and accepting residual risk, that is, the risk that still remains after all mitigation efforts has been employed. In this context, system assurance can be viewed as the level of confidence that the system functions as intended and is free of exploitable vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system. Engineering practices that support such confidence in all phases of the life cycle are key to marketplace acceptance, managing corporate risk exposure, and to national security.

This presentation addresses the definition of the problem, results from several joint Industry/Government forums addressing issues in system assurance, standardization efforts in support of system assurance, and practical engineering guidance for system acquirers, developers, operators, and maintainers.
 

Download Slides
Download Audio
Keynote Presentation: Software Security Assurance: Software Supply Chain Risk Management
Joe Jarzombek, PMP, CSSLP, Director for Software Assurance, National Cyber Security Division, U.S. Department of Homeland Security

With today's global IT software supply chain, project management and software/systems engineering processes must explicitly address security risks posed by exploitable software. Traditionally, these disciplines have not clearly and directly focused on software security risks that can be passed from projects to the organization. Software security assurance processes and practices span development and acquisition and can be used to enhance project management and quality assurance activities. Mr. Jarzombek explains the critical need for adherence to the practices, guidelines, rules, and principles used to build security into every phase of software development.
 

Download Slides
Download Audio
Establishing a Standards' Approach for the Cyber Arena
Terry Roberts, Executive Director, ASP/Interagency & Cyber, Carnegie Mellon, SEI 

For the past ten years, Industry and Government have played a primarily insiders, reactive, tactical game. There has been no overall US Interagency (as confirmed by the Pres Cyberspace Policy Document) and therefore no Strategic Framework for Industry to plug into - so we have all (by necessity) looked inwardly, to take care of what is within our realm of influence:

bullet Government Departments and Agencies have looked at their respective portions of the Internet, NIPRNET, SIPRNET, TS Networks.
bullet Savvy, responsible and moneyed Companies and Corporations have done the same.

All the time realizing that none of us singularly own, control, nor operate our Networks - and so alone we will always be outnumbered by the ever incoming threats, our numerous vulnerability vectors and our good but extremely limited and often tactically focused defenses - putting us all way behind the "Cyber Power Curve."

Therefore the only way to get ahead of the current Cyber Assurance negative spiral is to put in place an executable strategic framework - that includes (but is certainly not limited to the following):

bullet Raise the level of the Debate - Educate our Nation? and our World (exactly what OMG is doing today)
bullet Organize for Success (government cannot accomplish? the task alone) - Prioritize some initial areas that a Private-Public Partnership must focus on:
- Shared 24 by 7 Situational Awareness, Online Collaboration, Threat Mitigation and Development of Indications and Warning - Leading to Vulnerability Identification and Potential Minimum Standards Requirements
- Prioritize and Enable R&D Collaboration across Industry, Government and Academia - focused on key Technology Gaps
- Establishment of an Implementable and Effective Minimum Standards, That Are Foundational to Cyber Assurance - How Could OMG Drive and Lead this?
 
Download Slides
 
Mark Cohn, Vice President of Enterprise Security, Unisys
 
Download Audio
Panel Discussion: Issues with Effective Collaboration
Moderator - Carlos Solari, Former CIO Executive Office of the President, The White House

Panelists:

  • Mark Cohn, Vice President of Enterprise Security, Unisys
  • Paul Croll, Chair of the IEEE Software and Systems Engineering Standards Committee & Vice Chair of the US Technical Advisory Group for ISO/IEC JTC1/SC7
  • Joe Jarzombek, Director Software Assurance, Department of Homeland Security, National Cyber Security Division
  • Terry Roberts, Executive Director, ASP/Interagency & Cyber, Carnegie Mellon, SEI 

One of this conferences major themes how to "... encourage the broad use of cyber security standards developed through the joint efforts of vendors, end-users and government
agencies ..." The imperative for this "encouragement" might best be expressed by the old adage "we sink or swim together." This is especially true given today's environment that threatens us all individually and collectively. Therefore this panel will discuss opportunities and barriers to effective collaboration with the end objective of making us all more secure.
 

  Forming the CyberSecurity Community of Practice (CoP)
 


Join us to shape the discussion and get in gear toward unified cyber security standards!

Platinum Sponsor: Gold Sponsor: Hosted by
CSC Logo SAIC logo Hosted by OMG
Media Sponsors:
SearchSOA SearchSecurity

Co-sponsorships Available

Hit Counter

About the Object Management Group
OMG is an international, open membership, not-for-profit computer industry consortium. OMG Task Forces develop enterprise integration standards for a wide range of technologies, including: Real-time, Embedded and Specialized Systems, Analysis & Design, Architecture-Driven Modernization and Middleware and an even wider range of industries, including: Business Modeling and Integration, C4I, Finance, Government, Healthcare, Legal Compliance, Life Sciences Research, Manufacturing Technology, Robotics, Software-Based Communications and Space.

OMG's modeling standards, including the Unified Modeling Language™ (UML®) and Model Driven Architecture® (MDA®), enable powerful visual design, execution and maintenance of software and other processes, including IT Systems Modeling and Business Process Management. OMG's middleware standards and profiles are based on the Common Object Request Broker Architecture (CORBA®) and support a wide variety of industries.

More information about OMG can be found at www.omg.org. OMG is headquartered in Needham, MA, USA.

Last updated on June 17, 2010 by Mike