15 September 2010 Kevin McNally Program Manager (PMW 130) (858) 537-0682 [email protected]
PMW 130 Overview for 8 th Annual Security Summit
-
Upload
judah-william -
Category
Documents
-
view
30 -
download
3
description
Transcript of PMW 130 Overview for 8 th Annual Security Summit
Information Dominance Anytime, Anywhere…
Program Executive OfficeCommand, Control, Communications, Computers and Intelligence (PEO C4I)
Statement A: Approved for public release; distribution is unlimited
PMW 130 Overview for
8th Annual Security Summit
22 March 2011Kevin McNally
Program Manager PMW 130858-537-0682
New Era in Collaboration
2
Conficker Spreading
3
United Kingdom Ministry of Defense:Reported infection ofover 800 computers
15 Jan 09:French Navy infected, forcing aircraft at several airbases to be grounded
2 Feb 09:Federal Republic of Germany reported 100computers infected
Feb 09:Manchester City Council’sIT system case caused anestimated L1.5m. Believedto be due to flash drives
24 March 09:British Director of Parliamentary ICTInformed users of the House of Commons were infected
Jan 10:Greater Manchester Police were disconnected from Police National Computer for three days
Conficker
4
Why Do We Need to Collaborate?
• Over 1.97 billion Internet users (420M in China)
• DoD makes 1 billion+ Internet connections daily, passing 40TBs of data
• DoD Networks scanned and probed 6M times/day - USCYBERCOM
• 25M new strains of viruses last year, compared to a combined total of
15 million throughout the last 20 years – Panda Security Annual Report• Several years ago, zero countries armed for cyber warfare, today 20+
countries – Dr. Eric Cole, McAfee
• Stuxnet – Most advanced Cyber Weapon ever seen – CEO McAfee
• Zeus, aka Zbot, a toolkit to build your own trojan horse, can be
purchased for $3000
5
Because we are all interconnected, one compromised network can compromise us all.
Because we are all interconnected, one compromised network can compromise us all.
Information Assurance & Cyber Security (PMW 130)
• Computer Network Defense (CND) – ACAT IVT• EKMS/KMI - Component of NSA – ACAT IAM• PKI - Component of DISA – ACAT IAM• Cryptography (modernization; legacy)
Navy, USMC, USCG, MSC• Radiant Mercury (RM) – Cross Domain Solution• Tactical Key Loader (TKL) – USMC and
SPECOPS• Information Assurance (IA) Services
6
Cyber Defense and the NavyWhat Lies Ahead
• Speed to capability - reaction to emerging threats• Collaboration with IC and NGOs on threats• Identifying network anomalies & behaviors• Moving from reactive to predictive• Advanced Persistent Threat • Data loss prevention• Cloud Security• Wireless/handheld devices• Advanced spear phishing• Web security, Social Networks• Web enabled applications/application security• Correlation and Analysis of sensor data
7
Future Collaboration
• Collaboration is vital to our future• Welcome collaboration across government,
commercial, academia and other stakeholders• PMW 130 Government/Industry Exchange
An opportunity for industry to present products they feel may be of interest to PMW 130
Attendees include PMW 130 senior leadership, SPAWAR and PEO C4I invitees, and other PMW 130 personnel (Assistant Program Managers, engineers, etc.)
Held once a month 50 minutes, including Q&A Please contact Carol Cooper at [email protected]
8
We get IT.We also integrate it, install it and
support it. For today and tomorrow.
9
Visit us at www.peoc4i.navy.mil