National
Cybersecurity
Center
RESPONSE. EDUCATION. TRAINING. RESEARCH
1November 2016
• National Cybersecurity Center (NCC) Activation
• Cyber Characteristics
• NCC Operations Way-ahead
Overview
• January 20th, 2016-NCC incorporated
• April 2016-Bylaws Established
• May 2016-Act signed in May 2016, appropriating $8 million to the
NCC
• July 2016-National Cybersecurity Center name change from NCIC
• TRW building identified as the future home of the NCC
• Board of Directors Established
• Multiple Outreach Activities-March-October
NCC Milestones
• Initial capability Nov 1, 2016
• Governor’s Symposium-November 13-15, 2016
• NCC-OWL Board of Director’s Training-November 16-17, 2016
• Move to permanent residence NLT June 2017-Targeting Jan
2017
NCC Future Accomplishments
Key Engagements
• University of Colorado Colorado Springs
• TRW-NCC Temporary Office Space
• Heidrick & Struggles
• National CEO Search
• Sparks Wilson
• Legal
• Stockman Kast Ryan + CO
• Accounting
• PwC
• Business Plan
Mission & Vision
NCC Mission
The National Cybersecurity Center (NCC)
provides collaborative cybersecurity response
services with comprehensive knowledge and
capabilities through training, education, and
research.
NCC Vision
Enabling cybersecurity information and
expertise for all.
7
Governance
NCC BOARD OF DIRECTORS
Bob Hurst- Chairman of the Board Erik Mitisek- Project X-ite, DU
John Suthers- Mayor of Colorado Springs Nancy Phillips- ViaWest
Pam Shockley-Zalabak- Chancellor, UCCS Martin Wood- UCCS
Christian Anschutz- Anschutz Foundation Mark Weatherford- vArmour
Rhett Hernandez- LTG, US Army Ret Mike Marcotte- Acumen Digital
Dave Anderson- CH2M Hill Kyle Hybl- El Pomar Foundation
Rick Crandall- Aspen Venture Partners
January 2016
March 2016
5 Board of
Directors
April 2016
9 Board of
Directors
May 2016
Chairman,
Bob Hurst
Aug 2016
13
Directors
Nov 2016
IOC
NCC Board Demographics
• CYBER: 4
• PRIVATE SECTOR: 5
• ACADEMIC: 3
• MILITARY/GOVERNMENT: 2
• PHILANTHROPY: 2
• PUBLIC OFFICIAL: 1
• COLORADO SPRINGS: 4
• CORPORATE LEADERS: 3
• PUBLIC CYBER POLICY: 0
• DIVERSITY: 3
• COLORADO: 12
• WASHINGTON DC REP: 1
• SECURITY SERVICES: 0
9
Ed Rios
The NCC: A Deeper Dive
Support from public, private, and nonprofit sectors
Board of directors with government leaders, cyber experts,
academic leaders, and private
Funding from State, Philanthropy, Corporate and Individuals
Permanent facility for training courses and response
Neutral, nonprofit spreading cybersecurity knowledge
11
Challenges/Actions
Expectation Management
Identifying Resources
Develop the business and funding plan
Renovate the TRW facility in Colorado Springs
NCC Initial Operational Capability---1 November 2016
12
• Dedicated to:
• Federal agencies
• States
• Cities
• Local governments
• Private sector
• To engage with real-time information on the latest
trends, security, best practices and educational
resources for them- as well as a place for their teams
to best manage our critical assets.
Cyber Institute (CI)
• Dedicated facility staffed by
• leading experts
• Vendors
• partners (private & public)
• who assist the members of the NCC in
the instance of an attack.
Rapid Response Center (RRC)
• Dedicated center focused on workforce development.
• Will operate the cyber research center.
• The CRETC will be staffed with a strong, collaborative
network with leading minds and institutions around the
U.S.
• National Schools: University of Texas at San Antonio,
Huntsville, George Mason, Norwich, University
Washington
Cyber Research, Education and Training Center
Cyber Characteristics
• Cyber is:
• Cultural
• Generational
• Constantly Changing
Characteristics of Cyber
The social perspectives and practices influenced by the use of
computers and the interconnected networks (Inter net) for
communication, entertainment, and business.
As Americans, almost everything we do in our life is influenced
by cyber
Cyber Culture
• Cyber Anthropology
• Cyber Sociology
• Cyber Psychology
• Cyber Law
• Cyber Economics
• Cyber Warfare
Some Types of Cyber Culture
• Cyber Anthropology
- Cyber Anthropology: relationship between humans and digital-
era technology1
- New 'virtual' communities are no longer defined by geographic or
even ethnic/religious/linguistic boundaries.
o “…Communities are being constructed in cyberspace on the
basis of common affiliative interests, transcending
boundaries of class, nation, race, gender, and language.” 2
Cyber Culture: Social Sciences
1 "Techno-Anthropology course guide". Aalborg University. Retrieved 14 March 2013
2 http://www2.fiu.edu/~mizrachs/CyberAnthropology.html
Cyber Sociology and Social Engineering
• Analysis of online virtual communities and virtual worlds that results in
organizational change catalyzed through the Internet
- Violence?
- Politics?
• Easier to influence decisions and exploit trust than to hack
- Insider Threat
- Social Media & Virtual Communities
- CyberCrime
Cyber Culture: Social Sciences
Cybersphychology
• Journal of Psychosocial Research on Cyberspace
• Excessive Chatting: Need to Text (It can’t wait… even if it means I
can die!)
• Hooked on Social Media— “Selfbook” and Selfies
• Online gaming and other addictions
- AM & OPM
Cyber Culture: Social Sciences
• Software Coding concepts now in children’s toys
- Osmo Coding Toy—among others
o Physical blocks together to create sequences of commands
as computer programming fundamentals
o Use little blocks to build codes, and the watch the effect on
their iPad
o Ages 6-12
• Grandparents vs. smart phone features
• Cybersecurity threats to cybersecurity naive: Old & Young
Cyber Generations
• Law
- US Code: 10, 15, 18, 32, 50
- 7451 - National cybersecurity awareness and education
program
- Intel
- AQ
- Guard
- ITAR (out vs. in)
- Privacy (sure…)
• Economics
- Banking
- Wall Street (SaaS)
- Logistics and Transportation
Cyber Law and Economics
• Networks vs. Networks
- .gov - .mil - .com
• Attribution
• Deterrence
• “Offensive" Cyber
- Warfare
- Intelligence
• Most Importantly: Thresholds
Cyber Warfare
• Moore’s Law
• Dark Net
• Malware coding and tactics
- Counter-coding
• Cyber Forensic Investigation
- Hunting
• Encryption
• Quantum Computing
Cyber’s Constant Change
NCC Operations: The Way-ahead
NCX
3650 N. Nevada
(Former TRW Building. NCC to lease from University of Colorado)
134,592 sq. ft. 10.09 acre lot
Future Home of the NCC
PREVENTION/EDUCATION:
Provide resources for training Boards/Executive Leadership
Provide best practices and current insights to share with S&MBs
Provide training/educational materials for cyber awareness
Identify needs for education and certification
EVENT RESPONSE CAPABILITY
Volunteer SMEs for proactive threat mitigation
Identify corporate core competencies for response option database
IMPROVED RISK MANAGEMENT
Collect/provide government and private sector cyber risk data
Provide analysis for R & D to mitigate developing threats
How Might We Partner?
30
NCC Recent and Coming Events
CIAB Brief- Friday, 7 October
Hogan-Lovells Cybersecurity Seminar –Thursday, 13 October
Colorado Technology Association-Colorado Tech Summit-Wednesday, 19
October
NCC Community Update-October 20th 2016
NCC CI’s Governor’s Symposium-13-15 November
NCC-OWL Board Training-16-17 November
31
National Cybersecurity Center
Phone (719) 255-5225
1867 Austin Bluffs Pkwy Suite 200
Colorado Springs, CO 80918
www.NationalCybersecurityCenter.org
Questions and Discussion

Ed Rios - New ncc brief

  • 1.
  • 2.
    • National CybersecurityCenter (NCC) Activation • Cyber Characteristics • NCC Operations Way-ahead Overview
  • 3.
    • January 20th,2016-NCC incorporated • April 2016-Bylaws Established • May 2016-Act signed in May 2016, appropriating $8 million to the NCC • July 2016-National Cybersecurity Center name change from NCIC • TRW building identified as the future home of the NCC • Board of Directors Established • Multiple Outreach Activities-March-October NCC Milestones
  • 4.
    • Initial capabilityNov 1, 2016 • Governor’s Symposium-November 13-15, 2016 • NCC-OWL Board of Director’s Training-November 16-17, 2016 • Move to permanent residence NLT June 2017-Targeting Jan 2017 NCC Future Accomplishments
  • 5.
    Key Engagements • Universityof Colorado Colorado Springs • TRW-NCC Temporary Office Space • Heidrick & Struggles • National CEO Search • Sparks Wilson • Legal • Stockman Kast Ryan + CO • Accounting • PwC • Business Plan
  • 6.
    Mission & Vision NCCMission The National Cybersecurity Center (NCC) provides collaborative cybersecurity response services with comprehensive knowledge and capabilities through training, education, and research. NCC Vision Enabling cybersecurity information and expertise for all.
  • 7.
    7 Governance NCC BOARD OFDIRECTORS Bob Hurst- Chairman of the Board Erik Mitisek- Project X-ite, DU John Suthers- Mayor of Colorado Springs Nancy Phillips- ViaWest Pam Shockley-Zalabak- Chancellor, UCCS Martin Wood- UCCS Christian Anschutz- Anschutz Foundation Mark Weatherford- vArmour Rhett Hernandez- LTG, US Army Ret Mike Marcotte- Acumen Digital Dave Anderson- CH2M Hill Kyle Hybl- El Pomar Foundation Rick Crandall- Aspen Venture Partners January 2016 March 2016 5 Board of Directors April 2016 9 Board of Directors May 2016 Chairman, Bob Hurst Aug 2016 13 Directors Nov 2016 IOC
  • 8.
    NCC Board Demographics •CYBER: 4 • PRIVATE SECTOR: 5 • ACADEMIC: 3 • MILITARY/GOVERNMENT: 2 • PHILANTHROPY: 2 • PUBLIC OFFICIAL: 1 • COLORADO SPRINGS: 4 • CORPORATE LEADERS: 3 • PUBLIC CYBER POLICY: 0 • DIVERSITY: 3 • COLORADO: 12 • WASHINGTON DC REP: 1 • SECURITY SERVICES: 0
  • 9.
  • 10.
    The NCC: ADeeper Dive Support from public, private, and nonprofit sectors Board of directors with government leaders, cyber experts, academic leaders, and private Funding from State, Philanthropy, Corporate and Individuals Permanent facility for training courses and response Neutral, nonprofit spreading cybersecurity knowledge
  • 11.
    11 Challenges/Actions Expectation Management Identifying Resources Developthe business and funding plan Renovate the TRW facility in Colorado Springs NCC Initial Operational Capability---1 November 2016
  • 12.
    12 • Dedicated to: •Federal agencies • States • Cities • Local governments • Private sector • To engage with real-time information on the latest trends, security, best practices and educational resources for them- as well as a place for their teams to best manage our critical assets. Cyber Institute (CI)
  • 13.
    • Dedicated facilitystaffed by • leading experts • Vendors • partners (private & public) • who assist the members of the NCC in the instance of an attack. Rapid Response Center (RRC)
  • 14.
    • Dedicated centerfocused on workforce development. • Will operate the cyber research center. • The CRETC will be staffed with a strong, collaborative network with leading minds and institutions around the U.S. • National Schools: University of Texas at San Antonio, Huntsville, George Mason, Norwich, University Washington Cyber Research, Education and Training Center
  • 15.
  • 16.
    • Cyber is: •Cultural • Generational • Constantly Changing Characteristics of Cyber
  • 17.
    The social perspectivesand practices influenced by the use of computers and the interconnected networks (Inter net) for communication, entertainment, and business. As Americans, almost everything we do in our life is influenced by cyber Cyber Culture
  • 18.
    • Cyber Anthropology •Cyber Sociology • Cyber Psychology • Cyber Law • Cyber Economics • Cyber Warfare Some Types of Cyber Culture
  • 19.
    • Cyber Anthropology -Cyber Anthropology: relationship between humans and digital- era technology1 - New 'virtual' communities are no longer defined by geographic or even ethnic/religious/linguistic boundaries. o “…Communities are being constructed in cyberspace on the basis of common affiliative interests, transcending boundaries of class, nation, race, gender, and language.” 2 Cyber Culture: Social Sciences 1 "Techno-Anthropology course guide". Aalborg University. Retrieved 14 March 2013 2 http://www2.fiu.edu/~mizrachs/CyberAnthropology.html
  • 20.
    Cyber Sociology andSocial Engineering • Analysis of online virtual communities and virtual worlds that results in organizational change catalyzed through the Internet - Violence? - Politics? • Easier to influence decisions and exploit trust than to hack - Insider Threat - Social Media & Virtual Communities - CyberCrime Cyber Culture: Social Sciences
  • 21.
    Cybersphychology • Journal ofPsychosocial Research on Cyberspace • Excessive Chatting: Need to Text (It can’t wait… even if it means I can die!) • Hooked on Social Media— “Selfbook” and Selfies • Online gaming and other addictions - AM & OPM Cyber Culture: Social Sciences
  • 22.
    • Software Codingconcepts now in children’s toys - Osmo Coding Toy—among others o Physical blocks together to create sequences of commands as computer programming fundamentals o Use little blocks to build codes, and the watch the effect on their iPad o Ages 6-12 • Grandparents vs. smart phone features • Cybersecurity threats to cybersecurity naive: Old & Young Cyber Generations
  • 23.
    • Law - USCode: 10, 15, 18, 32, 50 - 7451 - National cybersecurity awareness and education program - Intel - AQ - Guard - ITAR (out vs. in) - Privacy (sure…) • Economics - Banking - Wall Street (SaaS) - Logistics and Transportation Cyber Law and Economics
  • 24.
    • Networks vs.Networks - .gov - .mil - .com • Attribution • Deterrence • “Offensive" Cyber - Warfare - Intelligence • Most Importantly: Thresholds Cyber Warfare
  • 25.
    • Moore’s Law •Dark Net • Malware coding and tactics - Counter-coding • Cyber Forensic Investigation - Hunting • Encryption • Quantum Computing Cyber’s Constant Change
  • 26.
  • 27.
  • 28.
    3650 N. Nevada (FormerTRW Building. NCC to lease from University of Colorado) 134,592 sq. ft. 10.09 acre lot Future Home of the NCC
  • 29.
    PREVENTION/EDUCATION: Provide resources fortraining Boards/Executive Leadership Provide best practices and current insights to share with S&MBs Provide training/educational materials for cyber awareness Identify needs for education and certification EVENT RESPONSE CAPABILITY Volunteer SMEs for proactive threat mitigation Identify corporate core competencies for response option database IMPROVED RISK MANAGEMENT Collect/provide government and private sector cyber risk data Provide analysis for R & D to mitigate developing threats How Might We Partner?
  • 30.
    30 NCC Recent andComing Events CIAB Brief- Friday, 7 October Hogan-Lovells Cybersecurity Seminar –Thursday, 13 October Colorado Technology Association-Colorado Tech Summit-Wednesday, 19 October NCC Community Update-October 20th 2016 NCC CI’s Governor’s Symposium-13-15 November NCC-OWL Board Training-16-17 November
  • 31.
    31 National Cybersecurity Center Phone(719) 255-5225 1867 Austin Bluffs Pkwy Suite 200 Colorado Springs, CO 80918 www.NationalCybersecurityCenter.org Questions and Discussion