Cyber Security - the 21st Century Domain

2,542 views

Published on

John Gilligan gave a presentation at the Common Defense 2008 Conference, held in Washington, DC at the National Press Club. His presentation was titled, "Cyber Security - the 21st Century Domain."

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,542
On SlideShare
0
From Embeds
0
Number of Embeds
36
Actions
Shares
0
Downloads
153
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber Security - the 21st Century Domain

  1. 1. John M. Gilligan September 3, 2008 Cybersecurity–the 21 st Century Domain ComDef 2008
  2. 2. Cybersecurity Realities <ul><li>Origins of Internet and software development has resulted in enormous vulnerabilities </li></ul><ul><li>Criminals, nation-states, and terrorists pose real and persistent threats </li></ul><ul><li>The complexity of modern cyberspace makes absolute security impossible </li></ul><ul><ul><li>Technical Complexities </li></ul></ul><ul><ul><li>Governance and Ownership Complexities </li></ul></ul>Our way of life is threatened by inability to secure cyberspace (c) 2008, All Rights Reserved. Gilligan Group Inc.
  3. 3. Foundations for Cybersecurity Agenda <ul><li>Partnerships are key </li></ul><ul><li>A need to fundamentally change the “business model” of cyberspace </li></ul><ul><li>Requires comprehensive focus </li></ul><ul><li>International cooperation is essential </li></ul>(c) 2008, All Rights Reserved. Gilligan Group Inc.
  4. 4. Actions Needed <ul><li>Recognize lack of cybersecurity as an international crisis </li></ul><ul><li>Establish necessary partnerships </li></ul><ul><ul><li>Government to Private Sector </li></ul></ul><ul><ul><li>Government to Government </li></ul></ul><ul><li>“ Redesign” Internet and Software Development/Deployment Models </li></ul><ul><ul><li>Deploy more secure protocols immediately </li></ul></ul><ul><ul><li>Require industry to deliver “secure” software </li></ul></ul>(c) 2008, All Rights Reserved. Gilligan Group Inc.
  5. 5. Actions Needed Continued <ul><li>Field robust cyber user authentication paradigm </li></ul><ul><li>Accelerate maturing of legal and policy frameworks (legal, military, international cooperation) </li></ul>(c) 2008, All Rights Reserved. Gilligan Group Inc.

×