Cybersecurity: Arm and Train US Warriors to Win Cyber War

13
Arm and Train US Warriors to Win Cyber War Deploying the Modern Cyber Range

description

Quickly & easily recreate Internet scale cyber war, interpret the results, and rapidly act upon cyber threats to: -Train cyber warriors to defend against threats or neutralize the enemy. -Harden targets – networks, data centers, individual devices.

Transcript of Cybersecurity: Arm and Train US Warriors to Win Cyber War

Page 1: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Arm and Train US Warriors to Win Cyber War Deploying the Modern Cyber Range

Page 2: Cybersecurity: Arm and Train US Warriors to Win Cyber War

2

Prepare for cyber war with cyber war: •  Thousands of global attacks

•  Botnet and global DDoS simulation

•  Millions of users

•  Hundreds of applications

•  As much non-repetitive data as the U.S. Library of Congress in one hour

The Cyber Range Imperative

Page 3: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Military Preparedness Requires Ranges

Every base must be able to easily recreate, interpret, and rapidly respond to cyber threats.

•  Conduct basic training

•  Develop ingrained skills

•  Harden critical targets

Page 4: Cybersecurity: Arm and Train US Warriors to Win Cyber War

•  Too complex

•  Not scalable

• Not practical

• Not cost-effective

Legacy Methods Cannot Solve Modern Problems

Page 5: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Legacy Thinking Breeds Costs and Delays

Page 6: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Creates Internet-scale cyber war in controlled environment and records impact.

•  Visibility to harden network and data center targets

•  Intelligence needed to act on cyber events

•  Repeatable, deterministic Resiliency Score™

Science of Cyber Tomography

Page 7: Cybersecurity: Arm and Train US Warriors to Win Cyber War

The comprehensive alternative to costly and complex cyber ranges.

• 4,500+ real-time attacks

• 150+ applications

• Traffic from millions of users

• Extensive automation speeds configuration and reporting

• Futureproof and always current

BreakingPoint Storm CTM™

Page 8: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Harden Network and Data Center Targets

Page 9: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Centralized Command and Control

The BreakingPoint Storm CTM is an ever current command and control center for:

• Keeping conditions up-to-date and standardized • Coordinating multi-party situational analysis • Replicating content across a network of machines • Distributing and managing cyber warming exercise

Page 10: Cybersecurity: Arm and Train US Warriors to Win Cyber War

We must build resiliency into every element of critical infrastructure.

•  Measure and improve resiliency from chip to application

•  Hold vendors accountable

•  Identify and remediate stress fractures

•  Monitor the effects of changes over time

Hardening Targets Throughout IT Supply Chain

Page 11: Cybersecurity: Arm and Train US Warriors to Win Cyber War

We must leverage science and technology to recreate, interpret, and rapidly respond to cyber threats.

•  Develop elite cyber warriors

•  Advance capabilities through research and development

•  Harden critical targets

Evolving Voodoo into Science

Page 12: Cybersecurity: Arm and Train US Warriors to Win Cyber War

–  Rapidly deployed operational cyber range to troops

–  Armed staff to attack infrastructure to measure and harden resiliency

–  Remain current with attack and application changes

Goal: Deploy operationally relevant cyber range

–  Provide cyber warriors with model of Internet and curriculum to hone cyber defense skills

–  Support red and blue teaming exercises with relevant conditions and new attacks

–  Enable staff to stay current with attacks

Benefits: Increased performance and ROI

–  Dramatically reduced the time and cost of creating war game exercises

–  Exposed warriors to real attacks and network traffic in a controlled environment

–  Retired 100+ linear feet of racks full of hardware

Solution: Measure resiliency with high stress conditions

US Defense Information Systems Agency

Page 13: Cybersecurity: Arm and Train US Warriors to Win Cyber War

Northrop Grumman Cyber Range