SlideShare a Scribd company logo
Approved for Public Release
Approved for Public Release
Cyber Situational Awareness
AFCEA Technet
25 August, 2015
Mr. Malcolm Martin
US Army Cyber Center of Excellence
Chief, Cyber Support Element-Ft. Leavenworth, KS.
Approved for Public Release
Approved for Public Release
Purpose
Provide discussion of Army Cyber Situational
Awareness (Cyber SA): “what it is, who uses it, and
how Cyber SA may be applied”, today and in the
future, for Unified Land Operations (ULO).
– What has changed? Conflicts and Impacts of Cyber.
– The Cyber Domain - How is it defined?
– Constant threat and actors
– Cyber SA Concept and Operational framework
– Cyber SA Impact as holistic aspect of ULO
– Army Cyber SA applied
– Culture change
Approved for Public Release
Approved for Public Release
2007: Syria – Israel
• September 2007 – Israeli Air Force
attacks suspected nuclear facility under
construction in Syria.
• First large-scale example of combined
cyber and electromagnetic means –
believed that Israelis used EW to deliver
a cyber attack/network control
capability to the Syrian radar which
executed the code on receipt.
• Prior to attack, Syrian IADS along
ingress/egress routes could not ‘see’,
allowing IAF planes to fly undetected by
radar into Syria and attack the site
unimpeded.
• Overall result was disruption of Syrian
IADS by an electronic/cyber attack
that enabled kinetic strike of nuclear
site.
Approved for Public Release
Approved for Public Release
Georgia-Russia 2008
• August 2008 – Russian troops
cross into South Ossetia w/
stated intent to defend their
“Russian compatriots”.
• Combined Arms assault was
preceded and enabled by a
multifaceted cyber attack
against Georgian gov’t and
military infrastructure and
defacement of web sites
• Distributed denial of service
(DDoS) attacks combined with
EW jamming disrupted and
denied comms simultaneous to
an integrated propaganda
(MISO and MILDEC) campaign
• Overall operation should be
considered the first large scale
‘hybrid’ combined arms
operation (air, land, cyber).
Approved for Public Release
Approved for Public Release
Ukraine-Russia 2015
Russia’s battle with Ukraine is being fought partly in cyberspace where it may have greater room for escalation
because nations increasingly accept covert cyber attack as a valid form of international pressure when more
traditional options are too violent – or too visible.
The rule of thumb for seeing disruptive cyber attacks before they happen
is that “physical conflicts beget cyber conflicts.”
The current cyber battle also could spread if the overall strategic
confrontation deepens, say toward a second Cold War. Such a stand-off,
pitting Russia against the United States, NATO, and Ukraine
“The Russian occupation of Ukraine in 2014 was carried out with a
military show of force – informed and supported by a coordinated cyber-
spying campaign”.
• The situation in Ukraine has seen relations between Russia and the West deteriorate
to almost Cold War levels
Approved for Public Release
Approved for Public Release
Cyberspace Domain
CYBERSPACE: Cyberspace is a global
domain within the information environment
consisting of the interdependent network of
information technology infrastructures and
resident data, including the Internet,
telecommunications networks, computer
systems, and embedded processors and
controllers (JP 1-02).
Characteristics:
• Manmade domain…ever changing
• Physical, functional, cognitive, logical/virtual and social
• Programming code and protocols define rules of the domain
• Environment and TTPs evolve at speed of code
• Constant presence – Phase 0 on-going
• Unlimited, instantaneous (operational) reach
Success in this domain means being smarter, more creative, faster,
and stealthier than your opponent
Approved for Public Release
Approved for Public Release
Back Up Slides
UNCLASSIFIED
7
The Growth of the Cyber Domain
Everyone, including the adversary, uses the Internet
Size of the Internet
1.2 Zetta bytes
Size of the Internet
16 Exabytes
Size of the Internet
1 Exabytes
DECEMBER 1995
16 million Internet users
MARCH 2001
458 million Internet users
March 2014
2.5 billion Internet users
Approved for Public Release
Approved for Public Release
Cyber Adversary Tactics, Techniques, and Procedures
Hostile Actor
Planning /
Scanning
Web Server/
Webpages
Users
Exploitation Lateral Movement Adversary Intent /
Exfiltration
Reconnaissance
Espionage
Destructive Malware
Email
Target System
- Users/decision-makers
- Their devices
and associated
IP addresses
- Data, databases,
and websites
- Network infrastructure
- Physical locations
Cyberspace Threats
Approved for Public Release
Approved for Public Release
Cyber Situational Awareness Defined
JP 3-12 Cyberspace Operations (CO)
• Cyberspace SA is the requisite current and predictive knowledge of
cyberspace and the OE upon which CO depend, including all factors affecting
friendly and adversary cyberspace forces.
• DODIN operations activities are the foundation of cyberspace SA, therefore,
DODIN operations are fundamental to the commander’s SA of the OE.
• Accurate and comprehensive SA is critical for rapid decision making in a
constantly changing OE and engaging an elusive adaptive adversary.”
• SA of friendly cyberspace is provided today by the Services and agencies
operating their portions of the DODIN. DISA does this through the theater
NETOPS centers to the CCMD theater/global NETOPS control centers,
USCYBERCOM Joint Operations Center, Joint Functional Component
Command for Space’s Joint Space Operations Center and their
Service/agency leadership. They coordinate with each other as required to
ensure operational effectiveness.
Approved for Public Release
Approved for Public Release
Why do we need Cyber SA?
• The Internet was originally designed as an open system to allow scientists
and researchers to send data to one another quickly, rather than with built in
security measures.
• Without stronger investments in cyber security and cyber defenses, data
systems across the world remain open and susceptible to exploitation and
attack.
• Malicious actors use cyberspace to steal data and intellectual property for
their own economic or political goals.
• The increased use of cyber attacks as a political instrument reflects a
dangerous trend for international relations.
• Therefore, the U.S. assumes that potential adversaries will seek to target
U.S. or allied critical infrastructure and military networks to gain a strategic
advantage.
Source: THE DEPARTMENT OF DEFENSE CYBER STRATEGY, April 2015
Approved for Public Release
Approved for Public Release
The Operational Framework
“The inclusion of the cyberspace domain and the EMS greatly expands and complicates the
operational framework transforming a limited physical battlefield to a global battlefield.” – FM 3-38
FM 3-12 (TBP)/FM 3-38: Operate in the
Cyberspace Domain / Electromagnetic
Spectrum
xx
xx
x
x
x
x
x
DIV
x
SUST
ADRP 3-0: Operate in the Land Domain
“The operational framework provides Army leaders with basic conceptual
options for visualizing and describing operations.” – ADRP 3-0
Approved for Public Release
Approved for Public Release
Cyber SA Functional Elements
(U) TRADOC Pamphlet (TP) 525-3-0, The Army Capstone Concept (ACC), asserts
that future Army requires the capability to provide leaders and Soldiers that
understand how and when adversaries employ CO and cyberspace capabilities,
how to mitigate adversary actions, and how to respond to gain and maintain the
cyberspace advantage within the OE in support of ULO
Approved for Public Release
Approved for Public Release
Army Cyber SA CONOPS
13
Cyber SA Functional Delineation
Big Data Network View
Cyber Mission Forces
DODIN, DCO and OCO
CONUS and Expeditionary
JIE, COE, LWN
Corps, Division and BCT
Commanders & Staffs
Home Station and Deployed
Command Post Computing
Environment
Contextualizes three interrelated
“Awareness” outputs:
Threat, Network, and Mission;
And the ability to plan operations!
xxx
CEM
x
xx
CEM
CEM
e.g.Big Data
Analytics/ Dagger-like
e.g. GoogleEarth-like
Cyber Analytics (Big Data)
JIMIndustry Commercial
JTF-L
“What is needed to achieve Cyber SA; how will Cyber SA be integrated into the COP;
and how will Cyber SA be used to plan, prepare, execute, and assess operations?”
JTF-C
Approved for Public Release
Approved for Public Release
Depicting Cyber in ULO
Cyber SA utilizes standard geospatial reference map displays resident in future
command post computing environment. Overlay creation tools available and provide
export/sharing of displayed data directly to the Common Operational Picture (COP).
Standard geospatial
reference maps
Web application
accessibility through future
computing environment
1
4
Approved for Public Release
Approved for Public Release
Aspects of Cyber SA
• Cyber SIGACTS
• Display Active Emitters
• Filters: 3G, 4G, WiFi, Radar
• Cyber actors & activity
1
5
• Should be able to
select actors by
multiple functions or
entities*
* Entity refers to operational units &
organizations w/n AOR
Approved for Public Release
Approved for Public Release
Unified Land/Cyber Ops & Planning
• CEMA Running Estimate
• Mission Analysis, COA
Development, Wargaming
1
6
Approved for Public Release
Approved for Public Release
“Changing your organizational culture is the toughest task you will ever take on. Your
organizational culture was formed over years of interaction between the participants in the
organization. Changing the accepted organizational culture can feel like rolling rocks uphill.”
“How to Change Your Culture: Organizational Culture Change”
Susan M. Heathfield
Management and Organization Development
“The most important area for transformation is the space "between our
warfighters' ears," said the chairman of the Joint Chiefs of Staff. "If you don't
try, and you stay locked in the doctrine that brought you there, you're going
to fail. You've got to adapt." “Changing military culture key to transformation”
General Richard B. Myers
Chairman, Joint Chiefs of Staff
“Transforming the Army means more of a mindset change, as
opposed to just changing wiring diagrams or equipment.
Transformation is a journey, not a destination.”
Army Chief of Staff Gen. George W. Casey Jr.
Change in Cultural Thinking
Approved for Public Release
Approved for Public Release
Mr. Malcolm W. “Mack” Martin
US Army Cyber Center of Excellence
Chief, Cyber Support Element – Fort Leavenworth, KS.
malcolm.w.martin2.civ@mail.mil
Office: (913) 684-4600
Mobile: (913) 991-3505
Questions?

More Related Content

What's hot

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Hamed Moghaddam
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
Priyanka Aash
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
Rahul Neel Mani
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 

What's hot (20)

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 

Viewers also liked

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Asaduzzaman Kanok
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
AFCEA International
 
Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015
Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015
Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015
AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
AFCEA International
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
AFCEA International
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
AFCEA International
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
David Sweigert
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
AFCEA International
 
Ben Gibson
Ben GibsonBen Gibson
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
Jorge Sebastiao
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
AFCEA International
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
Valeriu Margescu
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
Karl Wolfgang
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
AFCEA International
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
Mikko Jakonen
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
Jorge Sebastiao
 

Viewers also liked (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015
Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015
Opening Ceremony and Welcome: MG Fogarty at TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
 
Ben Gibson
Ben GibsonBen Gibson
Ben Gibson
 
HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 

Similar to Cyber Situational Awareness: TechNet Augusta 2015

Network Centric Warfare
Network Centric WarfareNetwork Centric Warfare
Network Centric Warfare
VeerPratapSingh73
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
Udaysharma3
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
Brian Mollett
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Ivan Sang
 
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptxU11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
14941
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
David Sweigert
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET Journal
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
AFCEA International
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInformation Technology
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
APNIC
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Marco Lisi
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
 
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
JunSeok Seo
 
Cyberoperations202310221.pdf
Cyberoperations202310221.pdfCyberoperations202310221.pdf
Cyberoperations202310221.pdf
molej86513
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
European Services Institute
 
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Cisco Crisis Response
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in Space
DIGIJAKS
 
Global cybersecurity on earth + in space
Global cybersecurity on earth + in spaceGlobal cybersecurity on earth + in space
Global cybersecurity on earth + in space
DIGIJAKS
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
TI Safe
 

Similar to Cyber Situational Awareness: TechNet Augusta 2015 (20)

Network Centric Warfare
Network Centric WarfareNetwork Centric Warfare
Network Centric Warfare
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
LTE WP FINAL
LTE WP FINALLTE WP FINAL
LTE WP FINAL
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptxU11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
 
Cyberoperations202310221.pdf
Cyberoperations202310221.pdfCyberoperations202310221.pdf
Cyberoperations202310221.pdf
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in Space
 
Global cybersecurity on earth + in space
Global cybersecurity on earth + in spaceGlobal cybersecurity on earth + in space
Global cybersecurity on earth + in space
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 

More from AFCEA International

William Halal
William HalalWilliam Halal
William Halal
AFCEA International
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
AFCEA International
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
AFCEA International
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
AFCEA International
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
AFCEA International
 
Lin Wells
Lin WellsLin Wells
Tod Levitt
Tod LevittTod Levitt
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
AFCEA International
 
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA International
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
AFCEA International
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
AFCEA International
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
AFCEA International
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
AFCEA International
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015
AFCEA International
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
AFCEA International
 
The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015
AFCEA International
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
AFCEA International
 
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
AFCEA International
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
AFCEA International
 

More from AFCEA International (20)

William Halal
William HalalWilliam Halal
William Halal
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Lin Wells
Lin WellsLin Wells
Lin Wells
 
Tod Levitt
Tod LevittTod Levitt
Tod Levitt
 
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
 
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
 
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
 

Recently uploaded

2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Christina Parmionova
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
viderakai
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
SERUDS INDIA
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
Cuyahoga County Planning Commission
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
johnmarimigallon
 
Government Service OPSI Playbook FINAL.pdf
Government Service OPSI Playbook FINAL.pdfGovernment Service OPSI Playbook FINAL.pdf
Government Service OPSI Playbook FINAL.pdf
MoffatNyamadzawo2
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
Roger Valdez
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 

Recently uploaded (20)

2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
 
Government Service OPSI Playbook FINAL.pdf
Government Service OPSI Playbook FINAL.pdfGovernment Service OPSI Playbook FINAL.pdf
Government Service OPSI Playbook FINAL.pdf
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 

Cyber Situational Awareness: TechNet Augusta 2015

  • 1. Approved for Public Release Approved for Public Release Cyber Situational Awareness AFCEA Technet 25 August, 2015 Mr. Malcolm Martin US Army Cyber Center of Excellence Chief, Cyber Support Element-Ft. Leavenworth, KS.
  • 2. Approved for Public Release Approved for Public Release Purpose Provide discussion of Army Cyber Situational Awareness (Cyber SA): “what it is, who uses it, and how Cyber SA may be applied”, today and in the future, for Unified Land Operations (ULO). – What has changed? Conflicts and Impacts of Cyber. – The Cyber Domain - How is it defined? – Constant threat and actors – Cyber SA Concept and Operational framework – Cyber SA Impact as holistic aspect of ULO – Army Cyber SA applied – Culture change
  • 3. Approved for Public Release Approved for Public Release 2007: Syria – Israel • September 2007 – Israeli Air Force attacks suspected nuclear facility under construction in Syria. • First large-scale example of combined cyber and electromagnetic means – believed that Israelis used EW to deliver a cyber attack/network control capability to the Syrian radar which executed the code on receipt. • Prior to attack, Syrian IADS along ingress/egress routes could not ‘see’, allowing IAF planes to fly undetected by radar into Syria and attack the site unimpeded. • Overall result was disruption of Syrian IADS by an electronic/cyber attack that enabled kinetic strike of nuclear site.
  • 4. Approved for Public Release Approved for Public Release Georgia-Russia 2008 • August 2008 – Russian troops cross into South Ossetia w/ stated intent to defend their “Russian compatriots”. • Combined Arms assault was preceded and enabled by a multifaceted cyber attack against Georgian gov’t and military infrastructure and defacement of web sites • Distributed denial of service (DDoS) attacks combined with EW jamming disrupted and denied comms simultaneous to an integrated propaganda (MISO and MILDEC) campaign • Overall operation should be considered the first large scale ‘hybrid’ combined arms operation (air, land, cyber).
  • 5. Approved for Public Release Approved for Public Release Ukraine-Russia 2015 Russia’s battle with Ukraine is being fought partly in cyberspace where it may have greater room for escalation because nations increasingly accept covert cyber attack as a valid form of international pressure when more traditional options are too violent – or too visible. The rule of thumb for seeing disruptive cyber attacks before they happen is that “physical conflicts beget cyber conflicts.” The current cyber battle also could spread if the overall strategic confrontation deepens, say toward a second Cold War. Such a stand-off, pitting Russia against the United States, NATO, and Ukraine “The Russian occupation of Ukraine in 2014 was carried out with a military show of force – informed and supported by a coordinated cyber- spying campaign”. • The situation in Ukraine has seen relations between Russia and the West deteriorate to almost Cold War levels
  • 6. Approved for Public Release Approved for Public Release Cyberspace Domain CYBERSPACE: Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers (JP 1-02). Characteristics: • Manmade domain…ever changing • Physical, functional, cognitive, logical/virtual and social • Programming code and protocols define rules of the domain • Environment and TTPs evolve at speed of code • Constant presence – Phase 0 on-going • Unlimited, instantaneous (operational) reach Success in this domain means being smarter, more creative, faster, and stealthier than your opponent
  • 7. Approved for Public Release Approved for Public Release Back Up Slides UNCLASSIFIED 7 The Growth of the Cyber Domain Everyone, including the adversary, uses the Internet Size of the Internet 1.2 Zetta bytes Size of the Internet 16 Exabytes Size of the Internet 1 Exabytes DECEMBER 1995 16 million Internet users MARCH 2001 458 million Internet users March 2014 2.5 billion Internet users
  • 8. Approved for Public Release Approved for Public Release Cyber Adversary Tactics, Techniques, and Procedures Hostile Actor Planning / Scanning Web Server/ Webpages Users Exploitation Lateral Movement Adversary Intent / Exfiltration Reconnaissance Espionage Destructive Malware Email Target System - Users/decision-makers - Their devices and associated IP addresses - Data, databases, and websites - Network infrastructure - Physical locations Cyberspace Threats
  • 9. Approved for Public Release Approved for Public Release Cyber Situational Awareness Defined JP 3-12 Cyberspace Operations (CO) • Cyberspace SA is the requisite current and predictive knowledge of cyberspace and the OE upon which CO depend, including all factors affecting friendly and adversary cyberspace forces. • DODIN operations activities are the foundation of cyberspace SA, therefore, DODIN operations are fundamental to the commander’s SA of the OE. • Accurate and comprehensive SA is critical for rapid decision making in a constantly changing OE and engaging an elusive adaptive adversary.” • SA of friendly cyberspace is provided today by the Services and agencies operating their portions of the DODIN. DISA does this through the theater NETOPS centers to the CCMD theater/global NETOPS control centers, USCYBERCOM Joint Operations Center, Joint Functional Component Command for Space’s Joint Space Operations Center and their Service/agency leadership. They coordinate with each other as required to ensure operational effectiveness.
  • 10. Approved for Public Release Approved for Public Release Why do we need Cyber SA? • The Internet was originally designed as an open system to allow scientists and researchers to send data to one another quickly, rather than with built in security measures. • Without stronger investments in cyber security and cyber defenses, data systems across the world remain open and susceptible to exploitation and attack. • Malicious actors use cyberspace to steal data and intellectual property for their own economic or political goals. • The increased use of cyber attacks as a political instrument reflects a dangerous trend for international relations. • Therefore, the U.S. assumes that potential adversaries will seek to target U.S. or allied critical infrastructure and military networks to gain a strategic advantage. Source: THE DEPARTMENT OF DEFENSE CYBER STRATEGY, April 2015
  • 11. Approved for Public Release Approved for Public Release The Operational Framework “The inclusion of the cyberspace domain and the EMS greatly expands and complicates the operational framework transforming a limited physical battlefield to a global battlefield.” – FM 3-38 FM 3-12 (TBP)/FM 3-38: Operate in the Cyberspace Domain / Electromagnetic Spectrum xx xx x x x x x DIV x SUST ADRP 3-0: Operate in the Land Domain “The operational framework provides Army leaders with basic conceptual options for visualizing and describing operations.” – ADRP 3-0
  • 12. Approved for Public Release Approved for Public Release Cyber SA Functional Elements (U) TRADOC Pamphlet (TP) 525-3-0, The Army Capstone Concept (ACC), asserts that future Army requires the capability to provide leaders and Soldiers that understand how and when adversaries employ CO and cyberspace capabilities, how to mitigate adversary actions, and how to respond to gain and maintain the cyberspace advantage within the OE in support of ULO
  • 13. Approved for Public Release Approved for Public Release Army Cyber SA CONOPS 13 Cyber SA Functional Delineation Big Data Network View Cyber Mission Forces DODIN, DCO and OCO CONUS and Expeditionary JIE, COE, LWN Corps, Division and BCT Commanders & Staffs Home Station and Deployed Command Post Computing Environment Contextualizes three interrelated “Awareness” outputs: Threat, Network, and Mission; And the ability to plan operations! xxx CEM x xx CEM CEM e.g.Big Data Analytics/ Dagger-like e.g. GoogleEarth-like Cyber Analytics (Big Data) JIMIndustry Commercial JTF-L “What is needed to achieve Cyber SA; how will Cyber SA be integrated into the COP; and how will Cyber SA be used to plan, prepare, execute, and assess operations?” JTF-C
  • 14. Approved for Public Release Approved for Public Release Depicting Cyber in ULO Cyber SA utilizes standard geospatial reference map displays resident in future command post computing environment. Overlay creation tools available and provide export/sharing of displayed data directly to the Common Operational Picture (COP). Standard geospatial reference maps Web application accessibility through future computing environment 1 4
  • 15. Approved for Public Release Approved for Public Release Aspects of Cyber SA • Cyber SIGACTS • Display Active Emitters • Filters: 3G, 4G, WiFi, Radar • Cyber actors & activity 1 5 • Should be able to select actors by multiple functions or entities* * Entity refers to operational units & organizations w/n AOR
  • 16. Approved for Public Release Approved for Public Release Unified Land/Cyber Ops & Planning • CEMA Running Estimate • Mission Analysis, COA Development, Wargaming 1 6
  • 17. Approved for Public Release Approved for Public Release “Changing your organizational culture is the toughest task you will ever take on. Your organizational culture was formed over years of interaction between the participants in the organization. Changing the accepted organizational culture can feel like rolling rocks uphill.” “How to Change Your Culture: Organizational Culture Change” Susan M. Heathfield Management and Organization Development “The most important area for transformation is the space "between our warfighters' ears," said the chairman of the Joint Chiefs of Staff. "If you don't try, and you stay locked in the doctrine that brought you there, you're going to fail. You've got to adapt." “Changing military culture key to transformation” General Richard B. Myers Chairman, Joint Chiefs of Staff “Transforming the Army means more of a mindset change, as opposed to just changing wiring diagrams or equipment. Transformation is a journey, not a destination.” Army Chief of Staff Gen. George W. Casey Jr. Change in Cultural Thinking
  • 18. Approved for Public Release Approved for Public Release Mr. Malcolm W. “Mack” Martin US Army Cyber Center of Excellence Chief, Cyber Support Element – Fort Leavenworth, KS. malcolm.w.martin2.civ@mail.mil Office: (913) 684-4600 Mobile: (913) 991-3505 Questions?