SlideShare a Scribd company logo
1 of 16
Download to read offline
‹#›	
  
1	
  
Innova&on,	
  DARPA	
  &	
  Suppor&ng	
  Ecosystem	
  
25	
  February	
  2015	
  
	
  
Dr.	
  Robert	
  D.	
  Childs	
  
President	
  &	
  CEO,	
  iCLEAR	
  LLC	
  
	
  
Former	
  Chancellor,	
  Na>onal	
  Defense	
  University	
  (NDU)	
  iCollege	
  and	
  Deputy	
  to	
  NDU	
  
President	
  for	
  Cyber	
  and	
  Informa>on	
  
‹#›	
  
	
  Overview	
  	
  
•  DARPA’s	
  opera>ng	
  principles	
  
•  DARPA’s	
  program	
  managers	
  
•  DARPA’s	
  R&D	
  requirements	
  drivers	
  
•  Consumer	
  electronic	
  technologies	
  impac>ng	
  cyber	
  defense	
  R&D	
  
•  DARPA’s	
  ini>a>ves	
  
•  Defense	
  oriented	
  cyber	
  trends	
  
•  Theore>cal	
  intelligence	
  “internet	
  of	
  things”	
  
•  DARPA’s	
  cyber	
  ini>a>ves	
  
•  Ac>ve	
  cyber	
  defense	
  ini>a>ve	
  
•  Cyber	
  R&D	
  ecosystem	
  
•  Strategic	
  purpose	
  for	
  government	
  R&D	
  
2	
  
‹#›	
  
DARPA’s	
  Opera8ng	
  Principles	
  
•  Independent	
  
•  Small/flexible	
  
•  World	
  class	
  scien>sts/engineers	
  
•  Collabora>on	
  with	
  industry/universi>es/government	
  labs	
  
•  Project	
  based	
  porXolio	
  
•  Program	
  managers	
  technically	
  outstanding/entrepreneurial/
driven	
  
3	
  
‹#›	
  
DARPA’s	
  Program	
  Managers	
  the	
  KEY	
  
•  Revolu>onary	
  “game	
  changing”	
  innova>ons	
  
•  NOT	
  group	
  think	
  
•  Person	
  closest	
  to	
  cri>cal	
  challenges	
  
•  Understand	
  technological	
  opportuni>es	
  in	
  their	
  area	
  
•  Understand	
  today’s	
  reali>es	
  and	
  tomorrows	
  outlook	
  
4	
  
‹#›	
  
DARPA’s	
  R&D	
  Requirements	
  Drivers	
  
• Ba]lefield	
  experience	
  	
  
• Government	
  concerns	
  
• Government	
  laboratories	
  
• Military	
  laboratories	
  
• Private	
  sector	
  innova>on	
  proposals	
  
• Academia	
  research/theore>cal	
  thinking	
  
5	
  
‹#›	
  
	
  Consumer	
  Electronic	
  Technologies	
  Impac8ng	
  Cyber	
  Defense	
  R&D	
  
•  Sensors	
  
•  Wearables	
  
•  Drones	
  
•  Robo>cs	
  
•  Virtual	
  reality	
  (gaming)	
  
•  3D	
  Prin>ng	
  
•  Internet	
  of	
  everything	
  
6	
  
‹#›	
  
DARPA’s	
  Ini8a8ves	
  
•  RPG	
  
•  Soldier	
  exoskeleton	
  	
  
•  Ba]lefield	
  surveillance	
  
•  Power	
  swim	
  
•  IED	
  finder	
  
•  Protec>ve	
  clothing	
  
•  Mission	
  simula>on	
  
7	
  
‹#›	
  
Defense	
  Oriented	
  Cyber	
  Trends	
  
• Mobile	
  compu>ng	
  
• Social	
  media	
  	
  
• Data	
  analy>cs	
  
• Cloud	
  compu>ng	
  
• Interconnected	
  networks	
  
8	
  
‹#›	
  
Theore8cal	
  Intelligence	
  "Internet	
  of	
  Things"	
  
9	
  
• Physical	
  sensors	
  
• Control	
  devices	
  
• Mul>purpose	
  communica>ons	
  
• Processing	
  equipment	
  
• User	
  interfaces	
  
★  Purpose—make	
  be]er	
  decisions	
  and	
  predic>ons	
  based	
  on	
  
richer	
  and	
  denser	
  data	
  sets	
  
‹#›	
  
DARPA’s	
  Cyber	
  Ini8a8ves	
  
•  Cyber	
  Defense	
  (Cyber	
  Grand	
  Challenge)	
  
•  Plan	
  X	
  (plan	
  large	
  scale)	
  missions	
  
•  High-­‐Assurance	
  Cyber	
  Military	
  Systems	
  (HACMS)	
  (security	
  updates	
  
not	
  required)	
  
•  Radio	
  Map	
  (sensing	
  capability	
  
•  Computer	
  Individuality	
  (dis>nct)	
  
•  Data	
  Analy>cs	
  (use	
  of	
  informa>on	
  at	
  scale)	
  
•  Language	
  (transla>on	
  for	
  war-­‐fighters	
  on	
  ba]lefield)	
  
•  Advanced	
  Encryp>on	
  (homomorphic)	
  
•  Warfighter	
  Applica>ons	
  (prosthe>cs)	
  
10	
  
‹#›	
  
Ac8ve	
  Cyber	
  Defense	
  (ACD)	
  
Reac8ve	
  Engagement	
  Model	
  
•  find	
  invading	
  code	
  
•  unplug	
  affected	
  systems	
  
•  create	
  security	
  patches	
  
•  apply	
  patches	
  network	
  wide	
  
ACD	
  Program	
  (not	
  offensive)	
  	
  
•  collect,synchronize	
  real	
  >me	
  capabili>es	
  
•  discover,	
  define,	
  analyze,	
  mi>gate	
  cyber	
  threats/
vulnerabili>es	
  	
  
•  disrupt	
  and	
  neutralize	
  AS	
  ATTACKS	
  HAPPEN	
  
11	
  
‹#›	
  
R&D	
  Ecosystem	
  
•  Small	
  central	
  autonomous	
  administra>on	
  	
  
•  Corporate	
  partnerships	
  
•  Academic	
  alliances/collabora>ons	
  
•  Associa>on	
  affilia>ons	
  
•  Interna>onal	
  research	
  partnerships	
  
•  Intergovernmental	
  support/sharing	
  
•  Government	
  laboratories	
  
•  Military	
  laboratories	
  
•  Communi>es	
  of	
  interest	
  
12	
  
‹#›	
  
Strategic	
  Purpose	
  for	
  Government	
  R&D	
  
• Bring	
  together	
  best	
  minds	
  and	
  prac>ces	
  
• Capture/shape	
  cupng	
  edge	
  thinking	
  and	
  
technologies	
  on	
  most	
  difficult	
  (and	
  yet	
  
unknown)	
  problems	
  
• Integrate	
  solu>ons	
  to	
  address	
  people,	
  process	
  
and	
  technologies	
  
13	
  
‹#›	
  
Contact	
  
Dr.	
  Robert	
  D.	
  Childs	
  
President	
  &	
  CEO,	
  iCLEAR	
  LLC	
  
	
  
Former	
  Chancellor,	
  Na>onal	
  Defense	
  University(NDU)	
  iCollege	
  and	
  
Deputy	
  to	
  the	
  NDU	
  President	
  for	
  Cyber	
  and	
  Informa>on	
  
e-­‐mail:	
  Childs@iclearllc.com	
  	
  
iCLEAR	
  LLC	
  website:	
  	
  h]p://iclearllc.com	
  
14	
  
Images	
  
	
  
DITEC JAN 31 2015 (PDF)

More Related Content

What's hot

Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Alex Pinto
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Cybereason
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelAlex Pinto
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityAlex Pinto
 
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...Alex Pinto
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingAlex Pinto
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
 
Application Logging for Forensics
Application Logging for ForensicsApplication Logging for Forensics
Application Logging for ForensicsRaffael Marty
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityCambridge Intelligence
 
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
Beyond Matching: Applying Data Science Techniques to IOC-based DetectionBeyond Matching: Applying Data Science Techniques to IOC-based Detection
Beyond Matching: Applying Data Science Techniques to IOC-based DetectionAlex Pinto
 
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingData-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption StrategiesJoshua R Nicholson
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little ThingsH4Diadmin
 
Greg Kinne - Bio
Greg Kinne - BioGreg Kinne - Bio
Greg Kinne - BioGreg Kinne
 
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Alex Pinto
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Alex Pinto
 

What's hot (20)

Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
 
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Application Logging for Forensics
Application Logging for ForensicsApplication Logging for Forensics
Application Logging for Forensics
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
Beyond Matching: Applying Data Science Techniques to IOC-based DetectionBeyond Matching: Applying Data Science Techniques to IOC-based Detection
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
 
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingData-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
Greg Kinne - Bio
Greg Kinne - BioGreg Kinne - Bio
Greg Kinne - Bio
 
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
 

Similar to DITEC JAN 31 2015 (PDF)

DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013DataTactics
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
Mining Software Repositories for Security: Data Quality Issues Lessons from T...Mining Software Repositories for Security: Data Quality Issues Lessons from T...
Mining Software Repositories for Security: Data Quality Issues Lessons from T...CREST @ University of Adelaide
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionCloudera, Inc.
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionCloudera, Inc.
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security BrokersRobin Vermeirsch
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettGovLoop
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSABuilding Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSADenim Group
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentSergey Gordeychik
 
AI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionAI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionDatabricks
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?Amazon Web Services
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
DavidRailaResumeJune2015
DavidRailaResumeJune2015DavidRailaResumeJune2015
DavidRailaResumeJune2015David Raila
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security fieldAhmed Musaad
 
How to Manage Your Time Series Data Pipeline at the Edge with InfluxDB
How to Manage Your Time Series Data Pipeline at the Edge with InfluxDBHow to Manage Your Time Series Data Pipeline at the Edge with InfluxDB
How to Manage Your Time Series Data Pipeline at the Edge with InfluxDBInfluxData
 

Similar to DITEC JAN 31 2015 (PDF) (20)

DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
Mining Software Repositories for Security: Data Quality Issues Lessons from T...Mining Software Repositories for Security: Data Quality Issues Lessons from T...
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber Solution
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solution
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy Garrett
 
Building Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSABuilding Your Application Security Data Hub - OWASP AppSecUSA
Building Your Application Security Data Hub - OWASP AppSecUSA
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
 
Security for developers
Security for developersSecurity for developers
Security for developers
 
Bertenthal
BertenthalBertenthal
Bertenthal
 
AI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionAI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat Detection
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
DavidRailaResumeJune2015
DavidRailaResumeJune2015DavidRailaResumeJune2015
DavidRailaResumeJune2015
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
How to Manage Your Time Series Data Pipeline at the Edge with InfluxDB
How to Manage Your Time Series Data Pipeline at the Edge with InfluxDBHow to Manage Your Time Series Data Pipeline at the Edge with InfluxDB
How to Manage Your Time Series Data Pipeline at the Edge with InfluxDB
 

More from Dr Robert D. Childs

More from Dr Robert D. Childs (9)

Long Bio+pix
Long Bio+pixLong Bio+pix
Long Bio+pix
 
Resiliency-Part Two -11-3-2015 copy
Resiliency-Part Two -11-3-2015 copyResiliency-Part Two -11-3-2015 copy
Resiliency-Part Two -11-3-2015 copy
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
IRMC_Crains_CIO_Awards_Detroit_Sep2012_ver2
IRMC_Crains_CIO_Awards_Detroit_Sep2012_ver2IRMC_Crains_CIO_Awards_Detroit_Sep2012_ver2
IRMC_Crains_CIO_Awards_Detroit_Sep2012_ver2
 
Articles and Presentations-2
Articles and Presentations-2Articles and Presentations-2
Articles and Presentations-2
 
Homeland Security Article-1-1
Homeland Security Article-1-1Homeland Security Article-1-1
Homeland Security Article-1-1
 
BobProgram
BobProgramBobProgram
BobProgram
 
Federal 100 Award Article
Federal 100 Award ArticleFederal 100 Award Article
Federal 100 Award Article
 
Government Computer news Hall of Fame-1
Government Computer news Hall of Fame-1Government Computer news Hall of Fame-1
Government Computer news Hall of Fame-1
 

DITEC JAN 31 2015 (PDF)

  • 1. ‹#›   1   Innova&on,  DARPA  &  Suppor&ng  Ecosystem   25  February  2015     Dr.  Robert  D.  Childs   President  &  CEO,  iCLEAR  LLC     Former  Chancellor,  Na>onal  Defense  University  (NDU)  iCollege  and  Deputy  to  NDU   President  for  Cyber  and  Informa>on  
  • 2. ‹#›    Overview     •  DARPA’s  opera>ng  principles   •  DARPA’s  program  managers   •  DARPA’s  R&D  requirements  drivers   •  Consumer  electronic  technologies  impac>ng  cyber  defense  R&D   •  DARPA’s  ini>a>ves   •  Defense  oriented  cyber  trends   •  Theore>cal  intelligence  “internet  of  things”   •  DARPA’s  cyber  ini>a>ves   •  Ac>ve  cyber  defense  ini>a>ve   •  Cyber  R&D  ecosystem   •  Strategic  purpose  for  government  R&D   2  
  • 3. ‹#›   DARPA’s  Opera8ng  Principles   •  Independent   •  Small/flexible   •  World  class  scien>sts/engineers   •  Collabora>on  with  industry/universi>es/government  labs   •  Project  based  porXolio   •  Program  managers  technically  outstanding/entrepreneurial/ driven   3  
  • 4. ‹#›   DARPA’s  Program  Managers  the  KEY   •  Revolu>onary  “game  changing”  innova>ons   •  NOT  group  think   •  Person  closest  to  cri>cal  challenges   •  Understand  technological  opportuni>es  in  their  area   •  Understand  today’s  reali>es  and  tomorrows  outlook   4  
  • 5. ‹#›   DARPA’s  R&D  Requirements  Drivers   • Ba]lefield  experience     • Government  concerns   • Government  laboratories   • Military  laboratories   • Private  sector  innova>on  proposals   • Academia  research/theore>cal  thinking   5  
  • 6. ‹#›    Consumer  Electronic  Technologies  Impac8ng  Cyber  Defense  R&D   •  Sensors   •  Wearables   •  Drones   •  Robo>cs   •  Virtual  reality  (gaming)   •  3D  Prin>ng   •  Internet  of  everything   6  
  • 7. ‹#›   DARPA’s  Ini8a8ves   •  RPG   •  Soldier  exoskeleton     •  Ba]lefield  surveillance   •  Power  swim   •  IED  finder   •  Protec>ve  clothing   •  Mission  simula>on   7  
  • 8. ‹#›   Defense  Oriented  Cyber  Trends   • Mobile  compu>ng   • Social  media     • Data  analy>cs   • Cloud  compu>ng   • Interconnected  networks   8  
  • 9. ‹#›   Theore8cal  Intelligence  "Internet  of  Things"   9   • Physical  sensors   • Control  devices   • Mul>purpose  communica>ons   • Processing  equipment   • User  interfaces   ★  Purpose—make  be]er  decisions  and  predic>ons  based  on   richer  and  denser  data  sets  
  • 10. ‹#›   DARPA’s  Cyber  Ini8a8ves   •  Cyber  Defense  (Cyber  Grand  Challenge)   •  Plan  X  (plan  large  scale)  missions   •  High-­‐Assurance  Cyber  Military  Systems  (HACMS)  (security  updates   not  required)   •  Radio  Map  (sensing  capability   •  Computer  Individuality  (dis>nct)   •  Data  Analy>cs  (use  of  informa>on  at  scale)   •  Language  (transla>on  for  war-­‐fighters  on  ba]lefield)   •  Advanced  Encryp>on  (homomorphic)   •  Warfighter  Applica>ons  (prosthe>cs)   10  
  • 11. ‹#›   Ac8ve  Cyber  Defense  (ACD)   Reac8ve  Engagement  Model   •  find  invading  code   •  unplug  affected  systems   •  create  security  patches   •  apply  patches  network  wide   ACD  Program  (not  offensive)     •  collect,synchronize  real  >me  capabili>es   •  discover,  define,  analyze,  mi>gate  cyber  threats/ vulnerabili>es     •  disrupt  and  neutralize  AS  ATTACKS  HAPPEN   11  
  • 12. ‹#›   R&D  Ecosystem   •  Small  central  autonomous  administra>on     •  Corporate  partnerships   •  Academic  alliances/collabora>ons   •  Associa>on  affilia>ons   •  Interna>onal  research  partnerships   •  Intergovernmental  support/sharing   •  Government  laboratories   •  Military  laboratories   •  Communi>es  of  interest   12  
  • 13. ‹#›   Strategic  Purpose  for  Government  R&D   • Bring  together  best  minds  and  prac>ces   • Capture/shape  cupng  edge  thinking  and   technologies  on  most  difficult  (and  yet   unknown)  problems   • Integrate  solu>ons  to  address  people,  process   and  technologies   13  
  • 14. ‹#›   Contact   Dr.  Robert  D.  Childs   President  &  CEO,  iCLEAR  LLC     Former  Chancellor,  Na>onal  Defense  University(NDU)  iCollege  and   Deputy  to  the  NDU  President  for  Cyber  and  Informa>on   e-­‐mail:  Childs@iclearllc.com     iCLEAR  LLC  website:    h]p://iclearllc.com   14