Sandia National Laboratories operates a Cyber Tracer Program and RECOIL facility to conduct research on improving cyber security capabilities. The programs bring together applied research in human cognition and cyber security to enhance analyst performance, identify successful candidate traits, and accelerate learning for incident response teams. Research methods include using scenario-based exercises like Tracer FIRE and cognitive studies to develop a national cadre of expert cyber analysts and defenders.
HPCC Systems Engineering Summit Presentation - Collaborative Research with FA...HPCC Systems
Presenters: Borko Furht, Department of Electrical & Computer Engineering and Computer Science, FAU
In 2009, Florida Atlantic University (FAU) received a grant from the National Science Foundation (NSF) to create the site of the Center for Advanced Knowledge Enablement (CAKE) as an Industry/University Cooperative Research Center (I/UCRC) that provides a framework for interaction between university faculty and industry in the areas of information technology, communication, and computing. LexisNexis is currently one of the CAKE industry members. In this session, we will talk about the significance of the membership, joint accomplishments, contributions back to the HPCC Systems community, as well as sharing experiences on including a Data Intensive Computing program in the FAU curriculum.
NOTE: This is one of 3 presentations for this session and is the 2nd one shown in the accompanying YouTube video.
BMNT's Hacking for Defense - Mission Results 2016BMNT Partners
Born out of a combination of the rapid problem sourcing and curation Pete Newell developed on the battlefields of Iraq and Afghanistan, and Steve Blank’s Lean Startup process, Hacking for Defense (H4D) has set the national security arena afire. H4D projects have earned recognition as the fastest way to bring technological innovations to bear on defense’s thorniest problems,
whether through a BMNT enterprise effort, or a graduate-level course facilitated by Hacking for Defense, Inc (H4Di).
We’ve developed strong partnerships with academics at Stanford, Columbia, and Georgetown Universities; military organizations like DIUx, JIDO and the NGA; and with countless startups throughout Silicon Valley. Through these relationships, we’ve been able to create a vibrant ecosystem passionate about identifying, isolating and solving problems no matter what their form.
We are proud of how far we’ve come in the last year and we are already gearing up for more in 2017. Next year promises explosive growth throughout our ventures and our team is sure that they will continue to deliver the transformative results our national security forces need.
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
This document summarizes the cybersecurity research agenda of the U.S. Department of Homeland Security Science and Technology Directorate. It discusses how DHS is focusing on areas like critical infrastructure security, open source software, cyber-physical systems, and new technology programs. The research aims to drive innovation in cybersecurity solutions through collaboration with academia, industry and open source communities to address evolving threats and transition technologies for real-world use.
Distributed Scalable Systems Short OverviewRNeches
Closing description of work in the Distributed Scalable Systems Division just prior to reorganization as the Collaborative Systems component of the merged Computational Systems and Technology Division.
The document discusses several concepts and projects from Sandia National Laboratories' Advanced Concepts Group related to analyzing and addressing terrorism as a complex problem. These include developing computational models and simulations to better understand terrorist recruitment and behavior ("Seldon"), creating a network of experts to share knowledge about terrorism issues ("Knownet"), and exploring novel human-machine collaboration systems using physiological sensors ("Mentor/Pal"). The goal is to improve understanding of terrorism as a complex adaptive system and develop new tools to help mitigate related threats.
The Department of Energy's Integrated Research Infrastructure (IRI)Globus
We will provide an overview of DOE’s IRI initiative as it moves into early implementation, what drives the IRI vision, and the role of DOE in the larger national research ecosystem.
HPCC Systems Engineering Summit Presentation - Collaborative Research with FA...HPCC Systems
Presenters: Borko Furht, Department of Electrical & Computer Engineering and Computer Science, FAU
In 2009, Florida Atlantic University (FAU) received a grant from the National Science Foundation (NSF) to create the site of the Center for Advanced Knowledge Enablement (CAKE) as an Industry/University Cooperative Research Center (I/UCRC) that provides a framework for interaction between university faculty and industry in the areas of information technology, communication, and computing. LexisNexis is currently one of the CAKE industry members. In this session, we will talk about the significance of the membership, joint accomplishments, contributions back to the HPCC Systems community, as well as sharing experiences on including a Data Intensive Computing program in the FAU curriculum.
NOTE: This is one of 3 presentations for this session and is the 2nd one shown in the accompanying YouTube video.
BMNT's Hacking for Defense - Mission Results 2016BMNT Partners
Born out of a combination of the rapid problem sourcing and curation Pete Newell developed on the battlefields of Iraq and Afghanistan, and Steve Blank’s Lean Startup process, Hacking for Defense (H4D) has set the national security arena afire. H4D projects have earned recognition as the fastest way to bring technological innovations to bear on defense’s thorniest problems,
whether through a BMNT enterprise effort, or a graduate-level course facilitated by Hacking for Defense, Inc (H4Di).
We’ve developed strong partnerships with academics at Stanford, Columbia, and Georgetown Universities; military organizations like DIUx, JIDO and the NGA; and with countless startups throughout Silicon Valley. Through these relationships, we’ve been able to create a vibrant ecosystem passionate about identifying, isolating and solving problems no matter what their form.
We are proud of how far we’ve come in the last year and we are already gearing up for more in 2017. Next year promises explosive growth throughout our ventures and our team is sure that they will continue to deliver the transformative results our national security forces need.
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
This document summarizes the cybersecurity research agenda of the U.S. Department of Homeland Security Science and Technology Directorate. It discusses how DHS is focusing on areas like critical infrastructure security, open source software, cyber-physical systems, and new technology programs. The research aims to drive innovation in cybersecurity solutions through collaboration with academia, industry and open source communities to address evolving threats and transition technologies for real-world use.
Distributed Scalable Systems Short OverviewRNeches
Closing description of work in the Distributed Scalable Systems Division just prior to reorganization as the Collaborative Systems component of the merged Computational Systems and Technology Division.
The document discusses several concepts and projects from Sandia National Laboratories' Advanced Concepts Group related to analyzing and addressing terrorism as a complex problem. These include developing computational models and simulations to better understand terrorist recruitment and behavior ("Seldon"), creating a network of experts to share knowledge about terrorism issues ("Knownet"), and exploring novel human-machine collaboration systems using physiological sensors ("Mentor/Pal"). The goal is to improve understanding of terrorism as a complex adaptive system and develop new tools to help mitigate related threats.
The Department of Energy's Integrated Research Infrastructure (IRI)Globus
We will provide an overview of DOE’s IRI initiative as it moves into early implementation, what drives the IRI vision, and the role of DOE in the larger national research ecosystem.
Seminario Web
"Herramientas y técnicas para la Gestión del Conocimiento Nuclear"
Claudio Henrique dos Santos Grecco, PostDoc
Organizado por la Red LAPRAM
2 de octubre 2020
This document provides an agenda and summaries for the 8th Annual Image Fusion Summit taking place from November 16-18, 2009 in Washington D.C. The summit will feature presentations and discussions on multi-sensor and intelligence fusion technologies from representatives across the military, government, and private sector. Topics will include new architectures for tactical persistent surveillance, performance metrics for digital imaging sensors and fused systems, and applications of image fusion data. The document promotes registering for the summit and interacting with leaders in areas like program management, science and technology, and electro-optical device research and development.
Big Data as a Catalyst for Collaboration & InnovationPhilip Bourne
Big data is disrupting biomedical research through digitization of data sources. The National Institutes of Health (NIH) launched the Big Data to Knowledge (BD2K) initiative to support this disruption. BD2K funds various programs including data sharing policies, data science training, and the development of shared infrastructure and standards. This infrastructure includes the "Commons" which would provide discoverable, accessible, interoperable and reusable research objects to catalyze collaboration using open APIs and computing platforms. SRP could interact with BD2K through initiatives like open science competitions, data standards development, and leadership in trans-NIH big data efforts.
FAIRness Assessment of the Library of Integrated Network-based Cellular Signa...Kathleen Jagodnik
The FAIR Guiding Principles facilitate the Findability, Accessibility, Interoperability, and Reusability of digital resources. The Library of Integrated Network-based Cellular Signatures (LINCS) Project has sought to implement the FAIR principles in the provision of its resources in order to optimize usability. We have surveyed the FAIR principles and are implementing specific facets within the LINCS resources. Subsequently, with reference to the literature and other efforts to measure FAIRness, we are developing quantitative metrics to assess the FAIRness of each dataset and resource in order to provide users with objective measures of the characteristics of the LINCS project. Assessing and improving the FAIRness of LINCS is an ongoing effort by our team that will benefit from community input to ensure that all LINCS users are optimally engaged with this resource.
Secured cloud support for global softwareijseajournal
This document summarizes a research paper that proposes a methodology called TSPS (Theory/SWEBOK/Project Security) to improve software engineering education. The methodology aims to collaborate between academic and industrial practices. It involves students working on projects with guidance from both mentors and industry practitioners. Data from literature reviews on software security engineering education is analyzed. A cloud-based system is developed to securely store project documents by encrypting and splitting files across multiple cloud nodes. The methodology and secure cloud storage approach are concluded to provide strategies to mitigate risks in software projects and benefit both education and industry.
IronHacks Live: Info session #3 - COVID-19 Data Science ChallengePurdue RCODI
This IronHacks Live: Info Session provided details on the Summer 2020: COVID-19 Data Science Challenge hosted by the IronHacks Team at the Research Center for Open Digital Innovation (RCODI) at Purdue University.
The Center for Applied Cybersecurity Research (CACR) at Indiana University was founded in 2003 to conduct interdisciplinary cybersecurity research and provide expertise in risk management, policy, and compliance. CACR has over $16 million in external funding and partnerships with organizations such as CMU, U of Illinois, and U of Wisconsin. It works on key projects like the Cybersecurity for Trustworthy Scientific Cyberinfrastructure to help scientific collaborations and the Software Assurance Marketplace to improve software integrity. CACR also runs education and outreach programs including internships, a seminar series, and an annual cybersecurity summit.
This document is a dissertation submitted by John Dunne to the University of Glamorgan for the degree of MSc. It examines the threat posed by Deep Web and OSINT-based attacks and whether current information security controls are sufficient. The dissertation consists of an introduction, 5 main sections analyzing the Deep Web, OSINT techniques, gaining unauthorized access, a survey of security professionals, and conclusions/recommendations. It also includes appendices with supporting materials.
Ricardo Javier Gutiérrez Campos completed a Coursera specialization in Cybersecurity consisting of 5 courses covering usable security, software security, hardware security, cryptography, and a capstone project. The specialization was offered through a collaboration between the University of Maryland's College of Information Studies, Department of Computer Science, and Electrical and Computer Engineering Department. It covered fundamental concepts for building secure systems from the hardware level to the software interface using cryptography. Participants developed a security-oriented way of thinking to understand adversaries and build defensive systems.
The Software Sustainability Institute (SSI) provides services to help research groups sustain their software over the long term. It collaborates with groups in various fields to improve key software through advice, training, and partnerships. Case studies describe projects in fields like fusion energy, climate modeling, geospatial data, and computational chemistry. The SSI aims to promote best practices and change perceptions so software is recognized as a valuable long-term asset, not just for initial research. Sustaining software requires support for both technical aspects and community engagement over decades.
Neches Full Cv, Nsf Cyber Infrastructure, June 2012RNeches
This document provides a full curriculum vitae for Robert Neches, including his education, technical interests, and professional history. It details that he currently serves as the Director of Advanced Engineering Initiatives at the US Department of Defense, and held previous positions at USC researching distributed systems, decision support, and information management. It provides details on his roles managing research programs and groups at DARPA and USC from 1982 to the present.
An Engineering Technology Capstone Project The Snow Load Network.pdfAshley Hernandez
This project involved the development of a solar-powered remote sensor network to measure snow load characteristics on building roofs. A team of students and faculty from the University of New Hampshire partnered with a small company, 2KR Systems, to develop the system. The project goals were to design weatherproof sensor nodes containing load cells, a microcontroller, and wireless communication capabilities to monitor and report snow loads. Funding was obtained from state programs to support the collaboration between academia and industry. The project provided students with hands-on experience while helping 2KR Systems launch a new commercial product to monitor roof snow loads.
BMNT provides concise summaries of key documents. This document summarizes BMNT's work over the past year, including their Hacking for Defense and Hacking for X programs. It describes how BMNT has created an innovation pipeline called Hacking for X that rapidly delivers solutions to hard problems through partnerships with universities, the military, startups and more. The document outlines BMNT's methodology and provides examples of projects with organizations like the National Geospatial-Intelligence Agency, Defense Innovation Unit Experimental, and Joint Improvised Threat Defeat Agency.
Multi-vocal Review of security orchestrationChadni Islam
The document summarizes a literature review on security orchestration. The review analyzed papers from various sources to understand different aspects of security orchestration such as definitions, challenges it addresses, proposed solutions, adoption practices, and architectural considerations. Key findings include that security orchestration aims to integrate disparate security tools, automate incident response workflows, and bridge the gap between detection and response. It addresses issues like lack of interoperability, skills shortage and inefficient manual processes. Taxonomies of proposed solutions and open challenges in technology, people and processes are also discussed.
The document proposes developing software to enable secure and authorized dynamic group resource management. It aims to implement attribute-based access control and dynamic delegation of access rights to address limitations in existing group-centric applications. The research plan involves three phases: literature review and requirements analysis; core implementation of access control and delegation features; and testing, performance analysis, and real-world deployment. The proposed software would facilitate secure collaboration and resource sharing for educational institutions and organizations.
Cyberenvironments integrate shared and custom cyberinfrastructure resources into a process-oriented framework to support scientific communities and allow researchers to focus on their work rather than managing infrastructure. They enable more complex multi-disciplinary challenges to be tackled through enhanced knowledge production and application. Key challenges include coordinating distributed resources and users without centralization and evolving systems rapidly to keep pace with advancing science.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Seminario Web
"Herramientas y técnicas para la Gestión del Conocimiento Nuclear"
Claudio Henrique dos Santos Grecco, PostDoc
Organizado por la Red LAPRAM
2 de octubre 2020
This document provides an agenda and summaries for the 8th Annual Image Fusion Summit taking place from November 16-18, 2009 in Washington D.C. The summit will feature presentations and discussions on multi-sensor and intelligence fusion technologies from representatives across the military, government, and private sector. Topics will include new architectures for tactical persistent surveillance, performance metrics for digital imaging sensors and fused systems, and applications of image fusion data. The document promotes registering for the summit and interacting with leaders in areas like program management, science and technology, and electro-optical device research and development.
Big Data as a Catalyst for Collaboration & InnovationPhilip Bourne
Big data is disrupting biomedical research through digitization of data sources. The National Institutes of Health (NIH) launched the Big Data to Knowledge (BD2K) initiative to support this disruption. BD2K funds various programs including data sharing policies, data science training, and the development of shared infrastructure and standards. This infrastructure includes the "Commons" which would provide discoverable, accessible, interoperable and reusable research objects to catalyze collaboration using open APIs and computing platforms. SRP could interact with BD2K through initiatives like open science competitions, data standards development, and leadership in trans-NIH big data efforts.
FAIRness Assessment of the Library of Integrated Network-based Cellular Signa...Kathleen Jagodnik
The FAIR Guiding Principles facilitate the Findability, Accessibility, Interoperability, and Reusability of digital resources. The Library of Integrated Network-based Cellular Signatures (LINCS) Project has sought to implement the FAIR principles in the provision of its resources in order to optimize usability. We have surveyed the FAIR principles and are implementing specific facets within the LINCS resources. Subsequently, with reference to the literature and other efforts to measure FAIRness, we are developing quantitative metrics to assess the FAIRness of each dataset and resource in order to provide users with objective measures of the characteristics of the LINCS project. Assessing and improving the FAIRness of LINCS is an ongoing effort by our team that will benefit from community input to ensure that all LINCS users are optimally engaged with this resource.
Secured cloud support for global softwareijseajournal
This document summarizes a research paper that proposes a methodology called TSPS (Theory/SWEBOK/Project Security) to improve software engineering education. The methodology aims to collaborate between academic and industrial practices. It involves students working on projects with guidance from both mentors and industry practitioners. Data from literature reviews on software security engineering education is analyzed. A cloud-based system is developed to securely store project documents by encrypting and splitting files across multiple cloud nodes. The methodology and secure cloud storage approach are concluded to provide strategies to mitigate risks in software projects and benefit both education and industry.
IronHacks Live: Info session #3 - COVID-19 Data Science ChallengePurdue RCODI
This IronHacks Live: Info Session provided details on the Summer 2020: COVID-19 Data Science Challenge hosted by the IronHacks Team at the Research Center for Open Digital Innovation (RCODI) at Purdue University.
The Center for Applied Cybersecurity Research (CACR) at Indiana University was founded in 2003 to conduct interdisciplinary cybersecurity research and provide expertise in risk management, policy, and compliance. CACR has over $16 million in external funding and partnerships with organizations such as CMU, U of Illinois, and U of Wisconsin. It works on key projects like the Cybersecurity for Trustworthy Scientific Cyberinfrastructure to help scientific collaborations and the Software Assurance Marketplace to improve software integrity. CACR also runs education and outreach programs including internships, a seminar series, and an annual cybersecurity summit.
This document is a dissertation submitted by John Dunne to the University of Glamorgan for the degree of MSc. It examines the threat posed by Deep Web and OSINT-based attacks and whether current information security controls are sufficient. The dissertation consists of an introduction, 5 main sections analyzing the Deep Web, OSINT techniques, gaining unauthorized access, a survey of security professionals, and conclusions/recommendations. It also includes appendices with supporting materials.
Ricardo Javier Gutiérrez Campos completed a Coursera specialization in Cybersecurity consisting of 5 courses covering usable security, software security, hardware security, cryptography, and a capstone project. The specialization was offered through a collaboration between the University of Maryland's College of Information Studies, Department of Computer Science, and Electrical and Computer Engineering Department. It covered fundamental concepts for building secure systems from the hardware level to the software interface using cryptography. Participants developed a security-oriented way of thinking to understand adversaries and build defensive systems.
The Software Sustainability Institute (SSI) provides services to help research groups sustain their software over the long term. It collaborates with groups in various fields to improve key software through advice, training, and partnerships. Case studies describe projects in fields like fusion energy, climate modeling, geospatial data, and computational chemistry. The SSI aims to promote best practices and change perceptions so software is recognized as a valuable long-term asset, not just for initial research. Sustaining software requires support for both technical aspects and community engagement over decades.
Neches Full Cv, Nsf Cyber Infrastructure, June 2012RNeches
This document provides a full curriculum vitae for Robert Neches, including his education, technical interests, and professional history. It details that he currently serves as the Director of Advanced Engineering Initiatives at the US Department of Defense, and held previous positions at USC researching distributed systems, decision support, and information management. It provides details on his roles managing research programs and groups at DARPA and USC from 1982 to the present.
An Engineering Technology Capstone Project The Snow Load Network.pdfAshley Hernandez
This project involved the development of a solar-powered remote sensor network to measure snow load characteristics on building roofs. A team of students and faculty from the University of New Hampshire partnered with a small company, 2KR Systems, to develop the system. The project goals were to design weatherproof sensor nodes containing load cells, a microcontroller, and wireless communication capabilities to monitor and report snow loads. Funding was obtained from state programs to support the collaboration between academia and industry. The project provided students with hands-on experience while helping 2KR Systems launch a new commercial product to monitor roof snow loads.
BMNT provides concise summaries of key documents. This document summarizes BMNT's work over the past year, including their Hacking for Defense and Hacking for X programs. It describes how BMNT has created an innovation pipeline called Hacking for X that rapidly delivers solutions to hard problems through partnerships with universities, the military, startups and more. The document outlines BMNT's methodology and provides examples of projects with organizations like the National Geospatial-Intelligence Agency, Defense Innovation Unit Experimental, and Joint Improvised Threat Defeat Agency.
Multi-vocal Review of security orchestrationChadni Islam
The document summarizes a literature review on security orchestration. The review analyzed papers from various sources to understand different aspects of security orchestration such as definitions, challenges it addresses, proposed solutions, adoption practices, and architectural considerations. Key findings include that security orchestration aims to integrate disparate security tools, automate incident response workflows, and bridge the gap between detection and response. It addresses issues like lack of interoperability, skills shortage and inefficient manual processes. Taxonomies of proposed solutions and open challenges in technology, people and processes are also discussed.
The document proposes developing software to enable secure and authorized dynamic group resource management. It aims to implement attribute-based access control and dynamic delegation of access rights to address limitations in existing group-centric applications. The research plan involves three phases: literature review and requirements analysis; core implementation of access control and delegation features; and testing, performance analysis, and real-world deployment. The proposed software would facilitate secure collaboration and resource sharing for educational institutions and organizations.
Cyberenvironments integrate shared and custom cyberinfrastructure resources into a process-oriented framework to support scientific communities and allow researchers to focus on their work rather than managing infrastructure. They enable more complex multi-disciplinary challenges to be tackled through enhanced knowledge production and application. Key challenges include coordinating distributed resources and users without centralization and evolving systems rapidly to keep pace with advancing science.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1. Photos placed in horizontal position
with even amount of white space
between photos and header
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin
Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND NO. 2011-XXXXP
Cyber Tracer Program
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin
Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. Sand2016-????
SAND2016-4413PE
2. Cyber Tracer Program & RECOIL
Combining Applied Research in Human Cognition and
Cyber Security to Improve Capabilities and Accelerate
Learning of Operational Incident Response Teams
2
3. Cyber Tracer Program
Our mission is to conduct research and develop techniques
to:
Create a community of cyber defenders sharing expertise, skills, and
competencies that raises the standards of individuals and the overall
community of defenders
Attract, inspire, and grow the next generation of expert cyber
defenders for the US
Support educational institutions to create educational capabilities and
infrastructure to foster the development of future cyber defenders
3
4. What if we…
Could enhance the performance
of human analysts engaged in
cyber defense?
Could improve the ability to
identify candidates that will be
successful cyber analysts?
How? By exploiting Sandia’s
demonstrated experience in
cyber security live exercises
(Tracer FIRE and RECOIL ForCE)
and the emerging technology of
neuroscience along with cutting
edge work in machine learning
at Sandia…
4
Then, we might be able
to build a national cadre
of “Grand Masters” in
Cyber and up our game
against our adversaries.
5. DOE/NNSA MSI & Federal
Research Funding
5
$25M/5-year grant from DOE to
establish a Cyber Security
Consortium amongst 14 MSI
Universities (Norfolk State
University is lead PI)
$500K AFRL grant to study
human effects of weapon
induced failures from high power
microwave
LDRD has generated interest from
other FFRDC’s to collaborate or
license Tracer FIRE technology for
their research:
CMU CERT
Air Force Research Lab
Office of SecDef
6. DOE/NNSA MSI & Federal Research
Funding (cont.)
6
Beta-tested new scenario called
Dragonfly and Tracer environment at
LLNL in July 2014 (this prototype is being
used for research data collection and to
train staff and students used at events for
DOE/JC-3 and Universities
All of the software and hardware was
created by summer students in the MSI
and/or CCD program
Will serve as a test case to integrate into
University curriculum (targets: Norfolk
State, Bowie State, UNM, TTU, and
University of Arizona)
7. RECOIL
7
Created to collaborate with academia,
industry, and government to facilitate
experiments that apply a
multidisciplinary approach in cyber
using:
1) case study analysis of adversary
techniques and exploit methods;
2) big data analytics and machine learning;
and
3) cognitive psychology and cognitive
neuroscience.
This multidisciplinary approach of cyber
security practitioners, psychologists,
sociologists, and computer science
researchers working together offers a
powerful combination of skills and
experience that can be applied in a
unique research facility.
Research capability and facility that fosters the integration of
cyber security and cognitive science
“Achieving cybersecurity is far more than a
technical problem: it is fundamentally a people
problem, and since cybersecurity is a people
problem, there must be a people solution.”
Lt Colonel Kern, Pell Center
8. SNL RECOIL Research
Research Question:
How do we train and develop high-performing Cyber Security Incident
Response Teams (CSIRTs) in the US that can solve today’s complex
cyber challenges.
Approach:
Narrative-Based and Scenario/Problem-Based Learning Competitions
Neuroscience based Cognitive Research and
Competency/Performance Modeling for Cyber Defenders
Identify methods of assessing and recruiting qualified candidates to
work in cyber security
Determine the influence of creativity and cognitive flexibility in expert
cyber defenders
Identify methods to reduce cognitive workload
8
9. RECOIL Roadmap
9
Integrating Human Performance Research and Big Data Science
to Develop National Cadre of Cyber Experts
Cognitive
research of
defenders
Big data and
machine
learning
Situational
understandin
g of
adversary
Identify KSAs
and traits of
experts (cyber
ninjas)
Devise accelerated
learning techniques for
novices to become
cyber ninjas
2016 2018 2020
Integrate cognitive research
methods into operational
environments so continual
learning takes place
Develop cyber
based machine
learning (ML)
frameworks
Integrate and
deploy ML into
cyber defenders
tools
Enable analysts to
continually improve
and tweak ML
Correlate discrete data
sources into composite view
for querying and
interpretation by analysts
Year
Characterize adversary
based on data
interpretation
Project adversary
behavior and conduct
proactive cyber defense
2022
10. Tracer FIRE (Forensic Incident Response Exercise)
Focus is on Incident Response Training
Real World Exercise Requires Student to Put the Pieces of the
Incident Together or What is Referred to as the Cyber Kill
Chain
Who is the adversary?
How did they get in?
What did they want and did they acquire it?
How to prevent recurring incidents?
Students Investigate an APT (Advanced Persistent Threat)
Style Adversary Throughout the Event
Tracer FIRE Team Provides the Expertise, Infrastructure, &
Network for the Exercise
10
11. Goal of Tracer FIRE
11
Allow students to achieve this state of “Flow” in
Cyber Incident Response
Flow
“ is the mental state of
operation in which a
person in an activity is
fully immersed in a feeling
of energized focus, full
involvement, and success
in the process of the
activity.”
Mihaly Csikszentmihalyi
12. Scenario Driven Learning
TF5 Scenario was created with the
concept of narrative based learning:
Enables participants to enhance their
understanding of cyber related
problems and their solutions in
contextually-meaningful ways
Similar to medical education where
students spend time in residency
before qualification as a doctor.
12
ShmuxBux Coffee Company Under Attack
13. Incident Responders Learning
13
How to recognize adversarial tactics within the
context of the kill chain:
Reconnaissance
Attack vector
Exploitation
Exfiltration
Implicit Learning objectives:
Look beyond the clues
Infer adversarial intention!
Overall goal is to promote critical thinking
14. Tracer FIRE
14
Concept &
Tool
Training
Concept &
Tool
Training
Incident
Response
Exercise
Incident
Response
Exercise
Concept &
Tool
Training
Concept &
Tool
Training
Incident
Response
Exercise
Incident
Response
Exercise
Incident
Response
Exercise
Incident
Response
Exercise
Debriefing
Debriefing
Self Select Teams
Team 1
Team 2
Team 3
Day 1 Day 2 Last Day
15. Tracer FIRE Options
Tracer FIRE event can be 2 days, 3 days, or a full week
Previously Developed Events are Available
Concept and Tool Training Can be Customized for Customer
Needs
Incident Response Exercise Can be Customized to Customer
Needs by Creating Scenarios that Match your systems and
networks i.e., power plant scenario for power plant operators
15
16. Tracer FIRE Outcomes
Promotes Critical Thinking & Problem Solving
Provides Training on Tools & Capabilities to Perform Incident Response
Provides Students with a Better Understanding of the Cyber Kill Chain &
Why it is Important in Incident Response
Allows Students to Interact with Live Malware Without Compromising
Their Own Systems
Promotes Collaboration Between Team Members
Co-workers
Colleagues from other institutions
Strengthens Relationships Between Co-Workers
RECOIL Capabilities Can Be Added to Tracer FIRE Platform
Identifying student level of expertise
Human factors research
Case study analysis of adversary techniques & exploit methods
16
17. Previous Scenario Showcase
Tracer FIRE 6 Scenario:
“Canuckistan”
Students are
incident responders
for Canuckistan
Power Company.
17
Diagram of Scenario Network Design
18. Canuckistan: Threat Actors
18
nC0Gnito video and threat narrative
based on Dragonfly Campaign
• Environmental Hacktivist Group
called nC0Gnito
• Demands that Canuckistan Power
shut down and convert to clean
energy such as wind and solar or
face a complete take over of their
power generation facility
Created by Lauren Lockett (UNM), Kelly Cole,
Susan Fowler (Purdue) and Rebecca Hart
(Ohio State)
19. Canuckistan: Tracer News Network
19
• Injects the relevant and
irrelevant news and
information into scenario and
requires teams to
comprehend narrative and
research
• Provides researchers ability to
measure situational
understanding and awareness
of teams while they
participate in exercise
• Motivates teams to perform
intelligence analysis as they
progress through exercise
Content Management System
20. Canuckistan: SCADA Model
20
• Design implemented Raspberry Pi’s to
simulate a SCADA system for power
generation
• Portable system that can be taken to Tracer
FIRE events on the road
• Realistic HMI display that emulates power
plant SCADA systems and power grids to
educate cybersecurity experts on how to
respond to energy crisis scenarios like
blackouts from cyber attacks
Power Generation Simulation
Jeremy Gin (University of
Arizona), Matthew Letter
(UNM) and Marcos Torres
(UNM), and Rain Dartt
(Rose-Hulman Institute)
21. Event Debrief & Research Efforts
21
Event Debrief
• Teams are asked to make sense of their
analysis that they performed during the week
and tell a complete story of what the
adversary did and their possible motives and
intentions
• Provides teams opportunity to reflect on what
they did and observed during the week
Research Efforts
• Teams have agreed to be videotaped and
research is underway to analyze team and
individual performance aspects
• Sandia’s cognitive team has designed agent
software to monitor students workflow and
application usage
• Sandia is exploring research methods that
include measurement of participants eye
tracking and EEG
• Objective is to gain a fundamental
understanding of cognitive skills of individuals
and teams while they perform under stress
during a simulated cyber attack
Team DeadBeef Cafe Briefing at ENDEX