SlideShare a Scribd company logo
1 of 16
Evolving a Cyberspace Doctrine
The Process
Michael E. Ruiz
CTO, Net-Enabled Operations
Deloitte Consulting LLP
April 16, 2010
Objective
Discuss the Evolution of Cyberspace
 Provide a Context for discussing Cyber Space
 Share some ideas on Cyber Warfare Doctrine

An appreciation of the complexity and emergence of
Cyberspace domain in Warfare
-2-

SATX - Evolving a Cyberspace Doctrine.pptx

 Present possible Cyberspace Operations Center for the Future
Background
The DoD and Intel communities have engaged in Cyberspace under the
auspice of Information Assurance and Network Security for at least three
decades.
 Security has to be more than policy
– Policy must be implementable
– Enforcement must be understood during policy definition

 Information Sharing requires trust; trust creates risk.
– We have been slow to adopt a posture of risk mitigation
– Risk avoidance is still a cultural mindset

 Cyber Operation is the emerging mission

The Enemy is within the Wire
-3-

SATX - Evolving a Cyberspace Doctrine.pptx

– The next war will have a significant cyber component
Components of Cyberspace

Cyber
Warfare

Cyber
Homeland
Security
Cyber Space

Cyber Law
Enforcement
Continuum of Cyber Security and Operations
Security
Engineering &
Integration

Cyber Security

Information
Assurance
Practices

Cyber Operation

Network Security
Operation
Centers
(NSOC)
-5-

Cyber Space
Operation
Centers
(CSOC)

Active

Passive

Security
Strategy

Non-Kinetic
Cyber Attack
Monitoring
Active
Action
Certification
Defense of
and
Cyber Assets
Accreditation

SATX - Evolving a Cyberspace Doctrine.pptx

Security
Architecture

Vulnerability
Remediation

Coordinated
Kinetic and Non-Kinetic
Action
Cyber Warfare Doctrine

Doctrine

Leadership

Organization

Personnel

Training

Facilities

-6-

SATX - Evolving a Cyberspace Doctrine.pptx

Materiel
Cyber Command and Control
Command and Control (C2) is “the exercise of
authority and direction by a properly designated
commander over assigned and attached forces
in the accomplishment of the mission...”
- The DoD Dictionary of Military and Associated Terms
Cyber Command and Control
 Gather Information Related to Cyber Threats and Vulnerabilities (Data
fusion)
 Analyze the cyber threats and vulnerabilities (Analytical Tools)
 Visualize the cyber threats and vulnerabilities (Shared Situational
Awareness)

 Disseminate cyber threats information and collaborate on the
information (Wiki and Web 2.0)
 Coordinate the response planning and execution (Remediation and
Operations Teams)

-9-

SATX - Evolving a Cyberspace Doctrine.pptx

 Interface with internal and external entities (public, private and open
source) to share and integrate information
- 10 -

SATX - Evolving a Cyberspace Doctrine.pptx

Cyber Command and Control Reference Model
Data/Information Sources

 Data Collection and Fusion Environment - Combination of real-time
data from cyber assets combined with historical data provides context for
evaluating threats

- 11 -

SATX - Evolving a Cyberspace Doctrine.pptx

 Interface with internal and external entities (public, private and open
source) to share and integrate information
- 12 -

SATX - Evolving a Cyberspace Doctrine.pptx

The Core of Cyberspace Operation Center
The Communities of Interest (COI)

- 13 -

SATX - Evolving a Cyberspace Doctrine.pptx

 Disseminate cyber threats information and collaborate on the
information
 Enterprise Service for Federated
Management and Cross Domain
Information Sharing

 Coordinate the response planning and
execution (Remediation and
Operations Teams)
- 14 -

SATX - Evolving a Cyberspace Doctrine.pptx

Federated Security Space Operations Centers
Conclusion
Asymmetric, highly decentralized organization are impossible to stop with
centralized approaches.
Creating an environment for spontaneity is crucial to enabling highly
centralized organization to act and operate as decentralized forces.
Technology is not the solution it is an enabler … the solution requires a
blend of People, Process, and Technology working to a common goal.
 De-incentivize our adversary
 Train the work force
 Create Tactics, Techniques, and Procedure to wage and protect the Cyber
domain

- 15 -

SATX - Evolving a Cyberspace Doctrine.pptx

 Allow flexibility and agility in creating capability.
Copyright © 2009 Deloitte Development LLC. All rights reserved.

More Related Content

What's hot

Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
Fire col a collaborative protection network
Fire col a collaborative protection networkFire col a collaborative protection network
Fire col a collaborative protection networkIMPULSE_TECHNOLOGY
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSPSrishti Ahuja
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsRick van der Kleij
 
CRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergCRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergKrisValerio
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd Iaetsd
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in publicMrsAlways RigHt
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Bill Ross
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 

What's hot (19)

Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Personal & Trusted cloud
Personal & Trusted cloudPersonal & Trusted cloud
Personal & Trusted cloud
 
Fire col a collaborative protection network
Fire col a collaborative protection networkFire col a collaborative protection network
Fire col a collaborative protection network
 
Top Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart InfrastructureTop Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart Infrastructure
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSP
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teams
 
CRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergCRTC Cloud- Michael Sandberg
CRTC Cloud- Michael Sandberg
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in public
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 

Similar to Evolving a Cyber Space Doctrine

Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design EssayTracy Berry
 
Mashup ecosystem globecom
Mashup ecosystem globecomMashup ecosystem globecom
Mashup ecosystem globecomOscar Caicedo
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
 
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...CREST @ University of Adelaide
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to BottomIstiyak Siddiquee
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Cloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationCloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationAlan Sill
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDGovCloud Network
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Ericsson
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5John Martin
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 

Similar to Evolving a Cyber Space Doctrine (20)

1
11
1
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design Essay
 
Mashup ecosystem globecom
Mashup ecosystem globecomMashup ecosystem globecom
Mashup ecosystem globecom
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...
 
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Vol12_No2
Vol12_No2Vol12_No2
Vol12_No2
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Cloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationCloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and Innovation
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoD
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5
 
Sbrc 2014 Painel SDN
Sbrc 2014 Painel SDNSbrc 2014 Painel SDN
Sbrc 2014 Painel SDN
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Evolving a Cyber Space Doctrine

  • 1. Evolving a Cyberspace Doctrine The Process Michael E. Ruiz CTO, Net-Enabled Operations Deloitte Consulting LLP April 16, 2010
  • 2. Objective Discuss the Evolution of Cyberspace  Provide a Context for discussing Cyber Space  Share some ideas on Cyber Warfare Doctrine An appreciation of the complexity and emergence of Cyberspace domain in Warfare -2- SATX - Evolving a Cyberspace Doctrine.pptx  Present possible Cyberspace Operations Center for the Future
  • 3. Background The DoD and Intel communities have engaged in Cyberspace under the auspice of Information Assurance and Network Security for at least three decades.  Security has to be more than policy – Policy must be implementable – Enforcement must be understood during policy definition  Information Sharing requires trust; trust creates risk. – We have been slow to adopt a posture of risk mitigation – Risk avoidance is still a cultural mindset  Cyber Operation is the emerging mission The Enemy is within the Wire -3- SATX - Evolving a Cyberspace Doctrine.pptx – The next war will have a significant cyber component
  • 5. Continuum of Cyber Security and Operations Security Engineering & Integration Cyber Security Information Assurance Practices Cyber Operation Network Security Operation Centers (NSOC) -5- Cyber Space Operation Centers (CSOC) Active Passive Security Strategy Non-Kinetic Cyber Attack Monitoring Active Action Certification Defense of and Cyber Assets Accreditation SATX - Evolving a Cyberspace Doctrine.pptx Security Architecture Vulnerability Remediation Coordinated Kinetic and Non-Kinetic Action
  • 8. Command and Control (C2) is “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission...” - The DoD Dictionary of Military and Associated Terms
  • 9. Cyber Command and Control  Gather Information Related to Cyber Threats and Vulnerabilities (Data fusion)  Analyze the cyber threats and vulnerabilities (Analytical Tools)  Visualize the cyber threats and vulnerabilities (Shared Situational Awareness)  Disseminate cyber threats information and collaborate on the information (Wiki and Web 2.0)  Coordinate the response planning and execution (Remediation and Operations Teams) -9- SATX - Evolving a Cyberspace Doctrine.pptx  Interface with internal and external entities (public, private and open source) to share and integrate information
  • 10. - 10 - SATX - Evolving a Cyberspace Doctrine.pptx Cyber Command and Control Reference Model
  • 11. Data/Information Sources  Data Collection and Fusion Environment - Combination of real-time data from cyber assets combined with historical data provides context for evaluating threats - 11 - SATX - Evolving a Cyberspace Doctrine.pptx  Interface with internal and external entities (public, private and open source) to share and integrate information
  • 12. - 12 - SATX - Evolving a Cyberspace Doctrine.pptx The Core of Cyberspace Operation Center
  • 13. The Communities of Interest (COI) - 13 - SATX - Evolving a Cyberspace Doctrine.pptx  Disseminate cyber threats information and collaborate on the information
  • 14.  Enterprise Service for Federated Management and Cross Domain Information Sharing  Coordinate the response planning and execution (Remediation and Operations Teams) - 14 - SATX - Evolving a Cyberspace Doctrine.pptx Federated Security Space Operations Centers
  • 15. Conclusion Asymmetric, highly decentralized organization are impossible to stop with centralized approaches. Creating an environment for spontaneity is crucial to enabling highly centralized organization to act and operate as decentralized forces. Technology is not the solution it is an enabler … the solution requires a blend of People, Process, and Technology working to a common goal.  De-incentivize our adversary  Train the work force  Create Tactics, Techniques, and Procedure to wage and protect the Cyber domain - 15 - SATX - Evolving a Cyberspace Doctrine.pptx  Allow flexibility and agility in creating capability.
  • 16. Copyright © 2009 Deloitte Development LLC. All rights reserved.

Editor's Notes

  1. Doctrine –addresses the much needed Tactics, Techniques and Procedures (TTPs) for operating in a cyber realm.Cyber ISR techniques are needed – today we focus on protection of our networks tomorrow we need to understand how our enemies will use there networkCyber C2 Procedures are required – What threats require remediation in the form of patch? And What threats require operations in the form of an MP going to a desk or covert operative being tasked to find out more about a particular organization or group?What does the Cyber Kill Chain look like? When are our actions an act of war and when are the a protective posture?Friedman in his Book “The Next Hundred Years” asserts that Russia will take defensive measure - creating buffer around its border to protect itself from encroaching Europeans. These actions will appear aggressive to some.Estonia Cyber war in April 2007 – mostly Do's Attacks and Botnet spam attacksGeorgia Takes a Beating in the Cyber war With Russia - By JOHN MARKOFF - the New York Times – August 11, 2008Organization – defines the organizational structures needed to successfully implement a cyber warfare organization, specifically the work BearingPoint is doing for the Army G2 for cyber operations.The Creation of Cyber Command – a unified command to address Cyber ChallengesThe Creation of the 24th Air Force – a numbered Air Force dedicated to working on Cyber ChallengesThe Creation of the Army Cyber DirectorateThe Navy reorganization – combining the N2/N6 and designating new cyber authorities.Training – how we train our troops … what are we teaching in the school house and is it the right thingBefore we can start training we have to establish DoctrineContinuous improvement is needed to ensure we are training correctly – new ways of updating the school house will be needed as this domain changes so rapidlyMateriel – describes a reference model / implementation pattern for implementing future cyber command and control systems.Personnel – how do we motivate a workforce that is counter to all military honors and traditions to join the Cyber Warfare machineHuge cultural challenges await.The Story of our EVP and our Cyber GuysFacilities – illustrates the types of facilities (i.e. Network Operation Centers, Security Operation Centers, and Cyber Space Operation Centers) and the processes for federating across agency / organizational boundaries.
  2. Messaging Web ApplicationsProtection BoundariesPhysical SecurityTelecommunication NetworksAccess Control