SlideShare a Scribd company logo
1 of 5
UNCLASSIFIED
1UNCLASSIFIED
Cybersecurity:
The Army’s Perspective
9 February 2018
BG Robert L. Edmonson II
38th Chief of Signal
and Signal School Commandant
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
2UNCLASSIFIED
Cybersecurity Approach and Threats
What We Do
State Threats Insider Threats
Hacktivist Cyber Crimes
• Poor Network
Architecture
• Poor User
Practices
• Poor Network
and Data
Management
Practices
UNCLASSIFIED
3UNCLASSIFIED
Army’s Network Modernization
Applications
UNCLASSIFIED
4UNCLASSIFIED
Cybersecurity Roles and Responsibilities
Network Focused &
Threat Agnostic
Power
Projection
Offensive
Operations
Network
Operations
Info Operations
Fires (Targeting)
Military Intelligence
Cyber & Electronic Warfare
Army Network
Internal | External
Signal
• Defend
• Leverage Intel
• Investigate & Analyze
• Hunt Internal Threats • Collect
• Target
• Operate
• Design, Build & Configure
• Operate, Maintain & Sustain
• Secure
• Oversee & Govern
Defensive
Operations
Cybersecurity
Activities
Mission Focused &
Threat Specific
Big
Data
UNCLASSIFIED
5UNCLASSIFIED
The Army Cybersecurity Team
• Infrastructure Support
• CND Analyst
• Incident Responder
• CNDSP Auditor
• CNDSP Manager
• CND Manager/Auditor
• CND Incident Responder/Analyst
• Network Warfare Planner
• Cyber Defense Chief
• Cyber Operations Chief
Cyber Network
Defenders
Information
Protection Technicians
Signal Officers / Information Systems Engineers
• The Army’s preeminent information systems experts
Training
Military - Civilian

More Related Content

What's hot

How a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart GridHow a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart GridGautham Govind
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15Benjamin D. Brooks, CISSP
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...idsecconf
 
Information security
Information securityInformation security
Information securitylinalona515
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 

What's hot (20)

How a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart GridHow a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart Grid
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Hacking
HackingHacking
Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Hacking
HackingHacking
Hacking
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information security
Information securityInformation security
Information security
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 

Similar to Big Data Analytics & Cybersecurity - How Industry and Government are Using Technology to combat Al Qaeda, ISIS, Narco-terrorist

AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...
AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...
AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...Pukhraj Singh
 
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptxMLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptxijlalahmed11
 
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesFED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesJSchaus & Associates
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2Gaurav Srivastav
 
Rey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxFarzanMansoor1
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesSplunk
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasEmyana Ruth
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...North Texas Chapter of the ISSA
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?IoT Academy
 
funsec_ch02A.pdf
funsec_ch02A.pdffunsec_ch02A.pdf
funsec_ch02A.pdfvietvo683
 
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorConf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorTechExeter
 

Similar to Big Data Analytics & Cybersecurity - How Industry and Government are Using Technology to combat Al Qaeda, ISIS, Narco-terrorist (20)

AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...
AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...
AusCERT 2023 - Non-linear, decentralised and multi-stakeholder incident respo...
 
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptxMLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
MLDSC_Board_Presentation_SecurityAudit_Skyline.pptx
 
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesFED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Rey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin's Resume
Rey Ferdin's Resume
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
 
Cyber Brochure
Cyber BrochureCyber Brochure
Cyber Brochure
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
 
funsec_ch02A.pdf
funsec_ch02A.pdffunsec_ch02A.pdf
funsec_ch02A.pdf
 
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorConf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
 

More from Career Communications Group

Technology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowTechnology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowCareer Communications Group
 
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Career Communications Group
 
Power Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersPower Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersCareer Communications Group
 
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Career Communications Group
 
The Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessThe Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessCareer Communications Group
 
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsWomen in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsCareer Communications Group
 
Mental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionMental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionCareer Communications Group
 
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureImprovising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureCareer Communications Group
 
Authenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderAuthenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderCareer Communications Group
 
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolEmbracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolCareer Communications Group
 
DEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityDEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityCareer Communications Group
 
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceSpeak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceCareer Communications Group
 
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessIntroverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessCareer Communications Group
 
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Career Communications Group
 
Communication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCommunication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCareer Communications Group
 
Building Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceBuilding Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceCareer Communications Group
 

More from Career Communications Group (20)

Technology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowTechnology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should Know
 
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
 
Power Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersPower Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-Managers
 
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
 
The Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessThe Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding Happiness
 
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsWomen in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
 
Mental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionMental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and Inclusion
 
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureImprovising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
 
Authenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderAuthenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a Leader
 
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolEmbracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
X-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar ResumeX-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar Resume
 
DEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityDEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a Reality
 
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceSpeak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
 
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessIntroverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
 
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
 
Communication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCommunication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive People
 
How Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the WorkplaceHow Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the Workplace
 
Building Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceBuilding Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting Performance
 
Interview Skill That Get you Hired
Interview Skill That Get you HiredInterview Skill That Get you Hired
Interview Skill That Get you Hired
 

Recently uploaded

Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?ResolutionFoundation
 
bee engaged with youth - World Bee Day 2024
bee engaged with youth - World Bee Day 2024bee engaged with youth - World Bee Day 2024
bee engaged with youth - World Bee Day 2024Christina Parmionova
 
OilChange: Big Oil Reality Check May 2024
OilChange: Big Oil Reality Check May 2024OilChange: Big Oil Reality Check May 2024
OilChange: Big Oil Reality Check May 2024Energy for One World
 
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...jiyav969
 
2024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 332024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 33JSchaus & Associates
 
Finland's mental health policy and its implementation: a CSO perspective
Finland's mental health policy and its implementation: a CSO perspectiveFinland's mental health policy and its implementation: a CSO perspective
Finland's mental health policy and its implementation: a CSO perspectiveKristian Wahlbeck
 
Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...zoyat9250
 
Medieval Iraq Demographic Factors Yale Historical Review
Medieval Iraq Demographic Factors Yale Historical ReviewMedieval Iraq Demographic Factors Yale Historical Review
Medieval Iraq Demographic Factors Yale Historical Reviewyalehistoricalreview
 
Everything you need to know about your Parish or Town council website & .gov....
Everything you need to know about your Parish or Town council website & .gov....Everything you need to know about your Parish or Town council website & .gov....
Everything you need to know about your Parish or Town council website & .gov....Scribe
 
Program Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxProgram Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxScottMeyers35
 
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...Harm Kiezebrink
 
IEA Global Critical Minerals Outlook2024
IEA Global Critical Minerals Outlook2024IEA Global Critical Minerals Outlook2024
IEA Global Critical Minerals Outlook2024Energy for One World
 
Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024FelixPerez547899
 
researching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffffresearching client.pptxffffffffffffffffffffffffff
researching client.pptxfffffffffffffffffffffffffflolsDocherty
 
History of DAVAO DE ORO Municipality of Maragusan
History of DAVAO DE ORO Municipality of MaragusanHistory of DAVAO DE ORO Municipality of Maragusan
History of DAVAO DE ORO Municipality of Maragusannarzilgulmatico
 
sarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdf
sarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdfsarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdf
sarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdfSarkari Jobs Work
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34JSchaus & Associates
 
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...jiyav969
 
Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...
Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...
Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...vanyaj843
 
16 may, International Day of Living together in peace 2024
16 may, International Day of Living together in peace 202416 may, International Day of Living together in peace 2024
16 may, International Day of Living together in peace 2024Christina Parmionova
 

Recently uploaded (20)

Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?Inflation scarring: How has the cost-of-living crisis changed Britain?
Inflation scarring: How has the cost-of-living crisis changed Britain?
 
bee engaged with youth - World Bee Day 2024
bee engaged with youth - World Bee Day 2024bee engaged with youth - World Bee Day 2024
bee engaged with youth - World Bee Day 2024
 
OilChange: Big Oil Reality Check May 2024
OilChange: Big Oil Reality Check May 2024OilChange: Big Oil Reality Check May 2024
OilChange: Big Oil Reality Check May 2024
 
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls IGI Airport Phone No 9999965857 High Profile ℂall Girl Delhi N...
 
2024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 332024: The FAR - Federal Acquisition Regulations, Part 33
2024: The FAR - Federal Acquisition Regulations, Part 33
 
Finland's mental health policy and its implementation: a CSO perspective
Finland's mental health policy and its implementation: a CSO perspectiveFinland's mental health policy and its implementation: a CSO perspective
Finland's mental health policy and its implementation: a CSO perspective
 
Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Laxmi Nagar Phone No 9999965857 High Profile ℂall Girl Delhi N...
 
Medieval Iraq Demographic Factors Yale Historical Review
Medieval Iraq Demographic Factors Yale Historical ReviewMedieval Iraq Demographic Factors Yale Historical Review
Medieval Iraq Demographic Factors Yale Historical Review
 
Everything you need to know about your Parish or Town council website & .gov....
Everything you need to know about your Parish or Town council website & .gov....Everything you need to know about your Parish or Town council website & .gov....
Everything you need to know about your Parish or Town council website & .gov....
 
Program Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptxProgram Kickoff- Cohort 4______ (2).pptx
Program Kickoff- Cohort 4______ (2).pptx
 
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
Low Atmospheric Pressure Stunning is not a humane alternative to Carbon Dioxi...
 
IEA Global Critical Minerals Outlook2024
IEA Global Critical Minerals Outlook2024IEA Global Critical Minerals Outlook2024
IEA Global Critical Minerals Outlook2024
 
Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024Effective Financial Reporting - May 2024
Effective Financial Reporting - May 2024
 
researching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffffresearching client.pptxffffffffffffffffffffffffff
researching client.pptxffffffffffffffffffffffffff
 
History of DAVAO DE ORO Municipality of Maragusan
History of DAVAO DE ORO Municipality of MaragusanHistory of DAVAO DE ORO Municipality of Maragusan
History of DAVAO DE ORO Municipality of Maragusan
 
sarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdf
sarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdfsarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdf
sarkarijobswork.online-bsf-si-vehicle-mechanic-and-constable-technical-may24.pdf
 
2024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 342024: The FAR - Federal Acquisition Regulations, Part 34
2024: The FAR - Federal Acquisition Regulations, Part 34
 
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
Vip ℂall Girls Akshardham Phone No 9999965857 High Profile ℂall Girl Delhi No...
 
Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...
Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...
Vip ℂall Girls Naraina Phone No 9999965857 High Profile ℂall Girl Delhi No Ad...
 
16 may, International Day of Living together in peace 2024
16 may, International Day of Living together in peace 202416 may, International Day of Living together in peace 2024
16 may, International Day of Living together in peace 2024
 

Big Data Analytics & Cybersecurity - How Industry and Government are Using Technology to combat Al Qaeda, ISIS, Narco-terrorist

  • 1. UNCLASSIFIED 1UNCLASSIFIED Cybersecurity: The Army’s Perspective 9 February 2018 BG Robert L. Edmonson II 38th Chief of Signal and Signal School Commandant UNCLASSIFIED UNCLASSIFIED
  • 2. UNCLASSIFIED 2UNCLASSIFIED Cybersecurity Approach and Threats What We Do State Threats Insider Threats Hacktivist Cyber Crimes • Poor Network Architecture • Poor User Practices • Poor Network and Data Management Practices
  • 4. UNCLASSIFIED 4UNCLASSIFIED Cybersecurity Roles and Responsibilities Network Focused & Threat Agnostic Power Projection Offensive Operations Network Operations Info Operations Fires (Targeting) Military Intelligence Cyber & Electronic Warfare Army Network Internal | External Signal • Defend • Leverage Intel • Investigate & Analyze • Hunt Internal Threats • Collect • Target • Operate • Design, Build & Configure • Operate, Maintain & Sustain • Secure • Oversee & Govern Defensive Operations Cybersecurity Activities Mission Focused & Threat Specific Big Data
  • 5. UNCLASSIFIED 5UNCLASSIFIED The Army Cybersecurity Team • Infrastructure Support • CND Analyst • Incident Responder • CNDSP Auditor • CNDSP Manager • CND Manager/Auditor • CND Incident Responder/Analyst • Network Warfare Planner • Cyber Defense Chief • Cyber Operations Chief Cyber Network Defenders Information Protection Technicians Signal Officers / Information Systems Engineers • The Army’s preeminent information systems experts Training Military - Civilian

Editor's Notes

  1. Overarching Theme Cybersecurity threats are without question the most dangerous threat to our defense systems. To be more resilient – we must, build the right network, build the right force, and train the right skills.   Message: Today, we will look at the Army’s approach to cybersecurity and the three focal areas – how we operate, building the team, and training – to achieve a resilient network.
  2. (UNCLASSIFIED) Cybersecurity 1) Nation states with highly sophisticated cyber programs (Russia—in Ukraine—or China—OPM hack); nations less technically competent but with more disruptive intent (such as Iran or North Korea—SONY hack); profit-motivated criminals; and hackers or extremists motivated by ideology—ISIS 2) Hacktivists are often assessed to be “nuisance threats” conducting unsophisticated DDoS attacks and webpage defacements. However, in the last several years, the number of hacktivists has grown exponentially and hacker collectives have been able to leverage large numbers of willing participants to conduct more effective attacks. 3) Evolving from theft of money data/information /intellectual property to extortion through ransomware/ destruction of network infrastructure —destruction and manipulation of data (Sony)—sophisticated information operations—Russian election interference Eighty percent of cyber incidents can be traced to 3 causes: poor user practices; poor network and data management practices; and poor implementation of network architecture Cybersecurity starts with the user—everyone who uses the Internet or a network. Most breaches can be traced to individuals who fell victim to phishing e-mails or the failure of administrators to perform basic cyber hygiene—a user opened an e-mail and clicked on a bad link; used an easily discoverable password; or a systems administrator failed to make required patches and upgrades. It’s important to remember that the private sector owns and operates over 90 percent of all the networks and cyberspace infrastructure. So in many ways, the private sector is the first line of defense in cyberspace. What we have learned is that the majority of intrusions could be stopped through relatively basic cybersecurity investments including training. Leadership is key. If the head of an organization doesn’t take cybersecurity seriously, no one will.
  3. (UNCLASSIFIED) Network Modernization A resilient network today will depend on a few factors – a robust cybersecurity framework of highly skilled and adaptive operators that are trained to neutralize and prevent threats to the network 1) The Army is aggressively improving its cybersecurity posture with architecture modernization efforts that reduce attack surface area, improve bandwidth and reliability, and fortify our network perimeter defense capability. 2) The current network does not meet the warfighter need to win the fight we are in - Network design, planning, and management are too complex leading to vulnerabilities 3)The Five Goals of the Army Data Strategy 1) Make Data Visible; 2) Make Data Accessible; 3) Make Data Understandable; 4) Make Data Trusted; 5) Make Data Interoperable
  4. (UNCLASSIFIED) Cybersecurity in relationship to the larger Cyber Environment The Army views Cybersecurity as a combination of normal daily Network Operations - passively protecting the network - and Defensive Cyber Operations - Actively seeking intrusions, investigating threats, and analyzing the data.   1) The distinction between Cybersecurity and Cyber Defense is in the specificity of the threat and response. With cybersecurity the threat agnostic, meant to protect against the broad range of actors previously mentioned 2) Cyber Defense and Offense are further broken down, but overlap representing the relationship between activities pursuing threats, versus our own plans to disrupt enemy operations through Cyber and Electronic Warfare. 3) The Army is using data analytics to improve our situational understanding of our networks—to see not only adversary activity, but also to ourselves; and using this information as part of a risk management strategy to inform our cybersecurity decision making. How Army is using BIG DATA The Army is using data analytics to improve our situational understanding of our networks—to see not only adversary activity, but also to ourselves; and using this information as part of a risk management strategy to inform our cybersecurity decision making. We’re using DoD’s Big Data Platform to do four things: 1, share and 2, collect information; and 3, analyze and 4, visualize—multiple petabytes of data from sources across the DoD Information Networks. The Army is developing an analytic framework for conducting advanced cyber defense that initiates with continuous monitoring to “see” the operational environment and establish situational awareness. With the ability to effectively collect and correlate data describing the environment, behavioral analysis and pattern detection will allow us to determine operational baselines. This will then allow us to determine anomalous behavior that deviates from defined norms and use advanced techniques for attribution and discovering the “why” and “how" associated with malicious activity. Initial analytic efforts are heavily weighted toward establishing situational awareness with select capabilities targeting likely threat activity. In concert with DoDs Big Data Platform (BDP), DoD’s Cyber Situational Awareness Cloud is the set of widgets, analytics, ingest code, and data structures deployed on the BDP that provides unified situational awareness across DODIN Operations and Defensive Cyberspace Operations.
  5. (UNCLASSIFIED) Although we may approach Cyber Operations in general differently than civilian counterparts, one commonality is the need to recruit, train, and retain a high quality workforce. 1) The Army is building and recruiting a world-class, preeminent cyber force—created new cyber branch—built Cyber Center of Excellence - All within the past seven years. 2) Cybersecurity Soldiers come from a broad range of backgrounds, from those right out of high school, to College Graduates and Soldiers already proven to have the knowledge and skill to succeed in this demanding field 3) The Army offers many opportunities to receive both specific military training as well as civilian certifications and training - including opportunities in the National Guard and Reserve