Presentation to the Patterson School of Diplomacy at the University of Kentucky on cultural legacies and cyber security strategy, based on an article I published in Survival.
This document summarizes a presentation about analyzing large datasets and drawing conclusions from evidence. It cautions that the analyst's assumptions can influence their analysis and that solid methodology is important. Relationships may be missed if analysis focuses only on superficial measures. Presenting findings clearly is also important, as counterintuitive conclusions require strong evidence and elegant insights can be undermined through poor visualization.
Data Mining & Analytics for U.S. Airlines On-Time Performance Mingxuan Li
The document analyzes on-time performance data of U.S. airlines from 2008 using various data mining techniques. It describes the dataset, which contains over 1.5 million records of airline flights with 17 variables. It then preprocesses the data, analyzes the variables, and applies methods like association rules, cluster analysis, decision trees, random forests, and classification to identify factors that influence flight delays.
Turning big data into big value césar hernandezAMDIA-Integra
El documento habla sobre cómo las empresas pueden obtener valor de los grandes volúmenes de datos (Big Data). Explica que las empresas deben darle sentido a los datos al vincularlos con los objetivos del negocio y generar valor mediante el entendimiento de los clientes y campañas multicanal personalizadas. También presenta estudios de caso de cómo Cisco y Best Western han tenido éxito al implementar estas estrategias.
Big Data, Big Customer Value, Big ResultsMundo Contact
Este documento presenta los conceptos clave de Big Data y cómo las empresas pueden obtener valor de los grandes volúmenes de datos. Define Big Data, discute los desafíos como la calidad y consistencia de los datos, y describe siete pasos para el análisis de Big Data que incluyen la recolección, procesamiento, almacenamiento y consumo de datos. El objetivo final es que las empresas puedan tomar mejores decisiones comerciales y ofrecer una experiencia más personalizada para los clientes basada en los datos.
Airline flights delay prediction- 2014 Spring Data Mining ProjectHaozhe Wang
This document discusses building a model to predict flight delays using historical flight data. It covers the business problem of flight delays costing airlines and passengers billions annually. The literature review finds that delays cost airlines on average $11,300 per flight. The document then describes understanding a dataset on flight delays, preparing the data by selecting and deriving attributes, and modeling using naive Bayes and decision tree algorithms. The best performing model is a J48 decision tree with a ROC area of 0.85, which could help airlines identify factors contributing to delays and optimize operations.
Introducción a Big Data. HDInsight - Webcast Technet SolidQSolidQ
Este documento presenta una introducción a Big Data, incluyendo las tendencias de la industria, definiciones de Big Data, ejemplos de datos masivos, y utilidades de Big Data. También describe escenarios de análisis empresarial utilizando herramientas como Hadoop, Hive y HDInsight, y cómo Microsoft Excel puede usarse para explotar y analizar grandes conjuntos de datos.
Airline and Airport Big Data: Impact and EfficienciesJoshua Marks
Keynote presentation at Routes 2014 in Chicago - how big data changes aviation efficiencies, and what airlines and airports need to know about cloud data warehouses, real-time integration and predictive analytics.
This document summarizes a presentation about analyzing large datasets and drawing conclusions from evidence. It cautions that the analyst's assumptions can influence their analysis and that solid methodology is important. Relationships may be missed if analysis focuses only on superficial measures. Presenting findings clearly is also important, as counterintuitive conclusions require strong evidence and elegant insights can be undermined through poor visualization.
Data Mining & Analytics for U.S. Airlines On-Time Performance Mingxuan Li
The document analyzes on-time performance data of U.S. airlines from 2008 using various data mining techniques. It describes the dataset, which contains over 1.5 million records of airline flights with 17 variables. It then preprocesses the data, analyzes the variables, and applies methods like association rules, cluster analysis, decision trees, random forests, and classification to identify factors that influence flight delays.
Turning big data into big value césar hernandezAMDIA-Integra
El documento habla sobre cómo las empresas pueden obtener valor de los grandes volúmenes de datos (Big Data). Explica que las empresas deben darle sentido a los datos al vincularlos con los objetivos del negocio y generar valor mediante el entendimiento de los clientes y campañas multicanal personalizadas. También presenta estudios de caso de cómo Cisco y Best Western han tenido éxito al implementar estas estrategias.
Big Data, Big Customer Value, Big ResultsMundo Contact
Este documento presenta los conceptos clave de Big Data y cómo las empresas pueden obtener valor de los grandes volúmenes de datos. Define Big Data, discute los desafíos como la calidad y consistencia de los datos, y describe siete pasos para el análisis de Big Data que incluyen la recolección, procesamiento, almacenamiento y consumo de datos. El objetivo final es que las empresas puedan tomar mejores decisiones comerciales y ofrecer una experiencia más personalizada para los clientes basada en los datos.
Airline flights delay prediction- 2014 Spring Data Mining ProjectHaozhe Wang
This document discusses building a model to predict flight delays using historical flight data. It covers the business problem of flight delays costing airlines and passengers billions annually. The literature review finds that delays cost airlines on average $11,300 per flight. The document then describes understanding a dataset on flight delays, preparing the data by selecting and deriving attributes, and modeling using naive Bayes and decision tree algorithms. The best performing model is a J48 decision tree with a ROC area of 0.85, which could help airlines identify factors contributing to delays and optimize operations.
Introducción a Big Data. HDInsight - Webcast Technet SolidQSolidQ
Este documento presenta una introducción a Big Data, incluyendo las tendencias de la industria, definiciones de Big Data, ejemplos de datos masivos, y utilidades de Big Data. También describe escenarios de análisis empresarial utilizando herramientas como Hadoop, Hive y HDInsight, y cómo Microsoft Excel puede usarse para explotar y analizar grandes conjuntos de datos.
Airline and Airport Big Data: Impact and EfficienciesJoshua Marks
Keynote presentation at Routes 2014 in Chicago - how big data changes aviation efficiencies, and what airlines and airports need to know about cloud data warehouses, real-time integration and predictive analytics.
This document discusses a big data project analyzing US airline flight data. The project aims to analyze over 500GB of flight data from the past 5 years to identify the top airlines and airports experiencing delays. Hadoop and MapReduce will be used to process and analyze the large dataset. The analysis will identify the top carriers experiencing delays as well as the top states and airports with departure delays. Findings will be visualized through graphs and a thematic map of US airline delays by state.
Big Data Analytics for Commercial aviation and AerospaceSeda Eskiler
globalaviationaerospace.com
An opportunity for insight in the changing commercial aerospace business
Vision for New Applications of Analytic Insight in Commercial Aerospace
Benefit of Big Data Analytics for the Airline Operator
Modern, Mobile Experience
Big Data Analytics In Action
Predictive Analytics To Prevent Engine Events
Predictive Analytics Improves Safety and Quality
Predictive Analytics Keeps More Planes in the Air
Big Data no es una moda ni algo que esté por venir. Gran parte de las organizaciones ya cuentan con bases de datos tan grandes que requieren usar herramientas especiales. Ésta presentación nos ayuda a dar el primer paso, a conocer que en realidad qué es y como funciona, así como a adentrarnos en este maravilloso mundo de los datos al por mayor.
Big Data se refiere a grandes conjuntos de datos que son difíciles de manejar debido a su velocidad de generación, múltiples fuentes y formatos. El tamaño, velocidad y variedad de los datos crean complejidad a la hora de recopilarlos, almacenarlos, buscarlos, compartirlos, analizarlos y procesarlos. Nuevas tecnologías como MapReduce, bases de datos NoSQL y algoritmos genéticos ayudan a abordar estos desafíos.
Airline Analytics: Decision Analytics Centers of ExcellenceBooz Allen Hamilton
Booz Allen's Decision Analytics Center of Excellence employs modeling and simulation, decision science, operations research, and quantitative analysis to deliver data-driven solutions that improve performance, optimize flows, and help stakeholders understand what and when events are likely to occur.
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
This document summarizes a presentation on rising cyber escalation between the US, Iran, and Russia involving threats to industrial control systems. It discusses different response options countries may take in retaliation for ICS attacks. It then provides intelligence on recent activities by Iranian and Russian state-sponsored hacking groups Xenotime, Dymalloy, and Magnallium. The presentation outlines key threat behaviors to identify and recommends approaches for threat hunting and response planning, including understanding network assets, detecting attacks, and having response plans and exercises in place.
Special Operations Summit (Tampa, FL - December 2011)Alexa Deaton
The document provides information about a training conference on transforming global capabilities for special operations forces. The conference includes a Human Geography Focus Day on December 12th featuring briefings on topics such as latest SOF needs and lessons learned from counterinsurgency operations. The main summit days are on December 13-14th and include keynotes from military leaders and sessions on irregular warfare capabilities, operating in Africa, and technology for SOF forces.
This document summarizes key issues regarding cybersecurity and policy. It identifies four issue areas requiring attention: 1) offense will usually beat defense given enough time; 2) deterring escalation is important, but exploitation and attack during crises is difficult to distinguish; 3) restricting cyber capabilities is impossible but restricting use may be possible with challenges; and 4) attribution is difficult and not a solution against sophisticated threats. The document cautions that secrecy clouds public discussion and cyber conflict is interconnected with other domains.
Responding to and recovering from sophisticated security attacksIBM
This document discusses four steps organizations can take to help protect themselves from sophisticated cyber attacks:
1. Prioritize business objectives and set a risk tolerance by determining what is most important to the security of the business.
2. Protect the organization with a proactive security plan by identifying vulnerable areas, types of threats, and areas where an attack could cause the greatest loss.
3. Prepare a response plan for when an attack does occur by learning from past incidents and ensuring the ability to detect, respond to, and recover from attacks.
4. Promote a culture of security awareness across the organization to help prevent attacks from being successful.
Professor Martin Gill, Director, Perpetuity Research CSSaunders
A presentation by Professor Martin Gill, Director, Perpetuity Research on the role of private security in tackling cybercrime, delivered at the Police Foundation's annual conference 'Policing and Justice for a Digital Age'.
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
Making real sense of enterprise Cloud computing in the context of your business is not always a trivial task. The volume, diversity and intensity of opinions on what cloud can do for your organization are relentless, as are the pressures to lower IT costs, speed up implementations, simplify enterprise IT and deliver more value in your own organizations.
Shifting your mission critical systems to the cloud presents a formidable range of challenges for many organizations, least of which the potential loss of control over your disaster recovery capability. Conversely, keeping your enterprise IT systems where you can see them, and using the cloud to manage your backups and disaster recovery may appear to run counter to the prevailing perception that the cloud is the ultimate destination for all IT systems.
In this presentation, Rob Livingstone will be covering off some of the key considerations of disaster recovery planning in the hybrid cloud environment and how, paradoxically, cloud could either be the cause of your disaster or has the potential to save you from one. He will be offering practical insights and tips on how you should approach the cloud when it comes to planning for the worst so that you come out looking your best.
This document discusses the growing threat of cyber attacks and the need for organizations to build cyber resilience. It notes that financial institutions in particular may have become distracted from cyber risks in recent years. The key issues outlined are that cyber attacks represent an undeclared war, failures can be silent, risk is challenging to analyze, and cyber risk is systemic. It defines cyber resistance as having secure design, mature controls, good risk decisions and other practices, while cyber resilience relies more on situational awareness, technical agility, and organizational readiness to solve problems. Building successful cyber programs requires addressing all of these aspects through specialist practices and developing capabilities ahead of standards.
Cyber-enabled adversaries: Emerging aspect of targeted attacksAdam Klus
The presentation outlines three archetypes of adversaries operating within cyber domain: cyber-constrained, cyber-endowed, and cyber-enabled. The key point is the increasing/emerging focus on using cyber instruments in complementary fashion to generate cross-domain synergies, rather than applying them as a sole or standalone mode of attack.
This document summarizes a presentation on cloud computing given by Rob Livingstone. The presentation covers: perspectives on cloud and how its meaning depends on context; the transition from current confusion around cloud to greater understanding; challenges of public cloud like security and disaster recovery; a 14-point checklist for deciding if public cloud is appropriate; how asymmetry of cloud understanding between IT and business can increase risks; the rise of shadow IT departments; the shift from viewing IT as a cost center to a utility; influences of cloud on IT careers; and that the future of cloud is now but its benefits require understanding costs, values, risks, and when to adopt or exit technologies. The presentation concludes with time for discussions and questions.
The document discusses the concepts of business agility, antifragility, and how organizations can thrive in uncertain times. It notes that while business agility is important, antifragility is needed to gain advantages from disruptions. Antifragile organizations embrace uncertainty, develop options and redundancies, and introduce "shocks" to test themselves. Specific strategies mentioned include safe-to-fail experiments, shipping products often, and modeling innovation teams after Netflix's "Simian Army". The document argues that the COVID-19 pandemic highlights the need for antifragility over mere resilience or agility.
Countering Violent Extremism In Urban Environments Through Design Issuezadok001
This document discusses countering violent extremism through urban design. It begins by outlining different types of violent extremism and their motivations. It then discusses characteristics of the built environment that could attract extremist attacks, such as mass transit systems, government buildings, and iconic structures. The document emphasizes that a risk-led and iterative process is needed when designing spaces to consider threats. It provides an example of assessing different threat levels and establishing design basis threats. It also discusses the importance of considering an organization's risk appetite. The key implications highlighted for designers and owners include assessing threats and risks early, including security considerations in initial designs, and engaging advisors.
The document discusses how information security practitioners are overburdened due to the increasing complexity of technologies and rate of change. It proposes forming "Infosec Trust Groups" where organizations in the same sector or region can share resources and intelligence to help specialize skills, increase efficiency, and reduce costs. Working together in these groups could help address issues like staff shortages and help turn raw intelligence into more actionable threat analysis.
Are you confident in your company's cyber security posture? Read the latest S-RM report for guidance on mapping a path to cyber confidence: https://www.s-rminform.com/cyber-confidence/?utm_campaign=Cyber_Confidence&utm_source=slideshare&utm_medium=social
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? Andrew Futter will provide a comprehensive assessment of the worrying and little-understood cyber challenge to nuclear weapons and explain how the many dynamics we label as “cyber” will impact the way that the world thinks about and manages the bomb. The talk will cut through the hype surrounding the cyber phenomenon and provide a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence, and crisis management. He will make the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of "hacking the bomb."
This document discusses a big data project analyzing US airline flight data. The project aims to analyze over 500GB of flight data from the past 5 years to identify the top airlines and airports experiencing delays. Hadoop and MapReduce will be used to process and analyze the large dataset. The analysis will identify the top carriers experiencing delays as well as the top states and airports with departure delays. Findings will be visualized through graphs and a thematic map of US airline delays by state.
Big Data Analytics for Commercial aviation and AerospaceSeda Eskiler
globalaviationaerospace.com
An opportunity for insight in the changing commercial aerospace business
Vision for New Applications of Analytic Insight in Commercial Aerospace
Benefit of Big Data Analytics for the Airline Operator
Modern, Mobile Experience
Big Data Analytics In Action
Predictive Analytics To Prevent Engine Events
Predictive Analytics Improves Safety and Quality
Predictive Analytics Keeps More Planes in the Air
Big Data no es una moda ni algo que esté por venir. Gran parte de las organizaciones ya cuentan con bases de datos tan grandes que requieren usar herramientas especiales. Ésta presentación nos ayuda a dar el primer paso, a conocer que en realidad qué es y como funciona, así como a adentrarnos en este maravilloso mundo de los datos al por mayor.
Big Data se refiere a grandes conjuntos de datos que son difíciles de manejar debido a su velocidad de generación, múltiples fuentes y formatos. El tamaño, velocidad y variedad de los datos crean complejidad a la hora de recopilarlos, almacenarlos, buscarlos, compartirlos, analizarlos y procesarlos. Nuevas tecnologías como MapReduce, bases de datos NoSQL y algoritmos genéticos ayudan a abordar estos desafíos.
Airline Analytics: Decision Analytics Centers of ExcellenceBooz Allen Hamilton
Booz Allen's Decision Analytics Center of Excellence employs modeling and simulation, decision science, operations research, and quantitative analysis to deliver data-driven solutions that improve performance, optimize flows, and help stakeholders understand what and when events are likely to occur.
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
This document summarizes a presentation on rising cyber escalation between the US, Iran, and Russia involving threats to industrial control systems. It discusses different response options countries may take in retaliation for ICS attacks. It then provides intelligence on recent activities by Iranian and Russian state-sponsored hacking groups Xenotime, Dymalloy, and Magnallium. The presentation outlines key threat behaviors to identify and recommends approaches for threat hunting and response planning, including understanding network assets, detecting attacks, and having response plans and exercises in place.
Special Operations Summit (Tampa, FL - December 2011)Alexa Deaton
The document provides information about a training conference on transforming global capabilities for special operations forces. The conference includes a Human Geography Focus Day on December 12th featuring briefings on topics such as latest SOF needs and lessons learned from counterinsurgency operations. The main summit days are on December 13-14th and include keynotes from military leaders and sessions on irregular warfare capabilities, operating in Africa, and technology for SOF forces.
This document summarizes key issues regarding cybersecurity and policy. It identifies four issue areas requiring attention: 1) offense will usually beat defense given enough time; 2) deterring escalation is important, but exploitation and attack during crises is difficult to distinguish; 3) restricting cyber capabilities is impossible but restricting use may be possible with challenges; and 4) attribution is difficult and not a solution against sophisticated threats. The document cautions that secrecy clouds public discussion and cyber conflict is interconnected with other domains.
Responding to and recovering from sophisticated security attacksIBM
This document discusses four steps organizations can take to help protect themselves from sophisticated cyber attacks:
1. Prioritize business objectives and set a risk tolerance by determining what is most important to the security of the business.
2. Protect the organization with a proactive security plan by identifying vulnerable areas, types of threats, and areas where an attack could cause the greatest loss.
3. Prepare a response plan for when an attack does occur by learning from past incidents and ensuring the ability to detect, respond to, and recover from attacks.
4. Promote a culture of security awareness across the organization to help prevent attacks from being successful.
Professor Martin Gill, Director, Perpetuity Research CSSaunders
A presentation by Professor Martin Gill, Director, Perpetuity Research on the role of private security in tackling cybercrime, delivered at the Police Foundation's annual conference 'Policing and Justice for a Digital Age'.
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
Making real sense of enterprise Cloud computing in the context of your business is not always a trivial task. The volume, diversity and intensity of opinions on what cloud can do for your organization are relentless, as are the pressures to lower IT costs, speed up implementations, simplify enterprise IT and deliver more value in your own organizations.
Shifting your mission critical systems to the cloud presents a formidable range of challenges for many organizations, least of which the potential loss of control over your disaster recovery capability. Conversely, keeping your enterprise IT systems where you can see them, and using the cloud to manage your backups and disaster recovery may appear to run counter to the prevailing perception that the cloud is the ultimate destination for all IT systems.
In this presentation, Rob Livingstone will be covering off some of the key considerations of disaster recovery planning in the hybrid cloud environment and how, paradoxically, cloud could either be the cause of your disaster or has the potential to save you from one. He will be offering practical insights and tips on how you should approach the cloud when it comes to planning for the worst so that you come out looking your best.
This document discusses the growing threat of cyber attacks and the need for organizations to build cyber resilience. It notes that financial institutions in particular may have become distracted from cyber risks in recent years. The key issues outlined are that cyber attacks represent an undeclared war, failures can be silent, risk is challenging to analyze, and cyber risk is systemic. It defines cyber resistance as having secure design, mature controls, good risk decisions and other practices, while cyber resilience relies more on situational awareness, technical agility, and organizational readiness to solve problems. Building successful cyber programs requires addressing all of these aspects through specialist practices and developing capabilities ahead of standards.
Cyber-enabled adversaries: Emerging aspect of targeted attacksAdam Klus
The presentation outlines three archetypes of adversaries operating within cyber domain: cyber-constrained, cyber-endowed, and cyber-enabled. The key point is the increasing/emerging focus on using cyber instruments in complementary fashion to generate cross-domain synergies, rather than applying them as a sole or standalone mode of attack.
This document summarizes a presentation on cloud computing given by Rob Livingstone. The presentation covers: perspectives on cloud and how its meaning depends on context; the transition from current confusion around cloud to greater understanding; challenges of public cloud like security and disaster recovery; a 14-point checklist for deciding if public cloud is appropriate; how asymmetry of cloud understanding between IT and business can increase risks; the rise of shadow IT departments; the shift from viewing IT as a cost center to a utility; influences of cloud on IT careers; and that the future of cloud is now but its benefits require understanding costs, values, risks, and when to adopt or exit technologies. The presentation concludes with time for discussions and questions.
The document discusses the concepts of business agility, antifragility, and how organizations can thrive in uncertain times. It notes that while business agility is important, antifragility is needed to gain advantages from disruptions. Antifragile organizations embrace uncertainty, develop options and redundancies, and introduce "shocks" to test themselves. Specific strategies mentioned include safe-to-fail experiments, shipping products often, and modeling innovation teams after Netflix's "Simian Army". The document argues that the COVID-19 pandemic highlights the need for antifragility over mere resilience or agility.
Countering Violent Extremism In Urban Environments Through Design Issuezadok001
This document discusses countering violent extremism through urban design. It begins by outlining different types of violent extremism and their motivations. It then discusses characteristics of the built environment that could attract extremist attacks, such as mass transit systems, government buildings, and iconic structures. The document emphasizes that a risk-led and iterative process is needed when designing spaces to consider threats. It provides an example of assessing different threat levels and establishing design basis threats. It also discusses the importance of considering an organization's risk appetite. The key implications highlighted for designers and owners include assessing threats and risks early, including security considerations in initial designs, and engaging advisors.
The document discusses how information security practitioners are overburdened due to the increasing complexity of technologies and rate of change. It proposes forming "Infosec Trust Groups" where organizations in the same sector or region can share resources and intelligence to help specialize skills, increase efficiency, and reduce costs. Working together in these groups could help address issues like staff shortages and help turn raw intelligence into more actionable threat analysis.
Are you confident in your company's cyber security posture? Read the latest S-RM report for guidance on mapping a path to cyber confidence: https://www.s-rminform.com/cyber-confidence/?utm_campaign=Cyber_Confidence&utm_source=slideshare&utm_medium=social
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? Andrew Futter will provide a comprehensive assessment of the worrying and little-understood cyber challenge to nuclear weapons and explain how the many dynamics we label as “cyber” will impact the way that the world thinks about and manages the bomb. The talk will cut through the hype surrounding the cyber phenomenon and provide a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence, and crisis management. He will make the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of "hacking the bomb."
This document provides an overview of cyber weapons. It defines cyber weapons as computer code used to threaten or cause harm to systems or living beings. Cyber weapons have two components - a penetration component to gain access to targeted systems, and a payload component to achieve intended effects like data destruction. Characteristics of cyber weapons include their dual-use nature for intelligence and attacks, difficulty in attribution, and potential for unintended consequences. The document discusses various definitions of cyber weapons and elements that comprise cyber weapons like vulnerabilities, exploits, and propagation methods. It also outlines the unique features of cyber weapons in cyberspace.
Presentation by Larry Clinton, President of the Internet Security Alliance (ISA) to the 66th Annual Fowler Seminar on Oct 12 2012 titled Evolution of the Cyber Threat - A Unified Systems Approach.
1. Strategic Culture and
Cyber Security
Patterson School of Diplomacy
& International Commerce
9 April 2012
W. Alexander Vacca, Ph.D.
Corporate Director- Business Assessment
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
2. How Culture Matters
• Shared among groups of individuals
– Cross cuts organizational and national boundaries
– Cross cuts generations
– Cross cuts personal experiences
• Provides the “evoked set” of relevant analogies and metaphors
– Guides the search for relevant information
– Suggests the motives of other actors
– Suggests cause-effect relationships
– Implies probability of policy success or failure
– Constrains the search for policy options
• Shapes the processing of new information
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
2
3. Two Approaches to Warfare
Mahan Douhet
The Commons Possess Transverse
Offense / Defense Balanced Fleet Best Defense is Offense
Force Targeting Military Civil & Industrial
“Moral” Effects Secondary Crucial
Climax of War Defeat the Fleet Obliterate the Cities
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
3
4. Mahan: From SLOC to CLOC
• The modern economy is dependent upon the “Cyber Lines of
Communication” (CLOC).
• Build a force capable of ensuring freedom of the CLOC. Focus efforts
on defeating enemy actions within cyberspace, including building a
robust defense.
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
4
5. Douhet: Victory Through Cyber Power!
• Pass through cyberspace to conduct decisive kinetic operations
• Defense is a low priority, maintain the ability to conduct cyber offense
and achieve cyber deterrence
• Civil and industrial targeting can break the will and ability of an enemy
to fight
• Pay close attention to the links between cyber means and kinetic
effects
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
5
6. Cyber Security in the USAF Today
“Cyber, as a warfighting domain . . . like
air, favors the offense. If you’re defending in
cyber, you’re already too late. Cyber delivers on
the original promise of air power. If you don’t
dominate in cyber, you cannot dominate in
other domains. If you’re a developed
country, you can’t conduct daily life [after a
large scale cyber attack], your life comes to a
screeching halt.”
- Lani Kass (Director USAF Cyberspace Taskforce), 2007
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
6
7. The Rise of Cyber Deterrence
• Deterrence is comforting and familiar
– For Policymakers: a peaceful and successful Cold War
– For the Military: support for military spending
– For Analysts: a framework well studied and specified
• But is it applicable?
– Myriad of cyber actors
– Multiple motives for cyber actions
– Problems of attribution
– Linking deterrent penalties to deterrent triggers
• Students of strategic studies and the “Culture of Deterrence”?
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
7
8. Some Policy Implications
• Knowledge about the roots of analytical perspectives (ie, knowing your
history) provides insight into the logic of others.
• Beware the logic of policy metaphors and analogies (“e-
Katrina”, “Cyber Pearl Harbor”).
• Bring multiple cultural perspectives to bear on problems of national
importance (especially new problems).
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
8
9. For Further Discussion…
Gluttons for punishment are advised to consult:
Vacca, W. Alexander. “Military Culture and Cyber Security,”
Survival 53:6 (December 2011), pages 159-176
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
9