SlideShare a Scribd company logo
1 of 32
Download to read offline
Von Welch, Director
Craig Jackson, Senior Policy Analyst
Susan Sons, Senior Systems Analyst
Naval Surface Warfare Center Crane Division
28 August 2015
Outline
1. Overview and History of CACR
2. CACR Expertise: Risk Management, Policy,
Compliance
3. CACR Activities: CTSC, SWAMP, XSIM,
Education/Internships
4. CACR Events: Seminar Series, Summits
2
CACR
Founded by then CIO Michael McRobbie
in 2003
“...university-wide research center that would
bridge our operational strengths and practical
experience with our academic units [and]
bridge technical specialties in cybersecurity
with business, law and the behavior
disciplines.”
3
Cybersecurity @ IU
CACR’s IU Partner Organizations
•REN-ISAC
•SOIC (Master’s Degree in Cybersecurity)
•University Information Security Office
•University Information Policy Office
•Maurer School of Law
•Kelley School of Business
•IUPUI School of Science
•Pervasive Technology Institute Research Center
4
IU’s NSA/DHS Designations
Indiana University designated as a National Center of
Academic Excellence in Information Assurance / Cyber
Defense through academic year 2021.
5
CACR is External Facing
Base funding from OVPIT, President’s Office, but primarily grant-
funded applied research.
Since its origination in 2003, over $16 million in external funding
from: Lilly Endowment, Inc., the National Science Foundation,
the Department of Energy, the Department of Homeland
Security, the National Institutes of Health, and others.
External partners: CMU/PSC, U. of Illinois/NCSA, U. of Wisconsin,
U. of Wisconsin-Milwaukee, Morgridge Institute for Research.
6
Applied Research
CACR’s mission is to advance the state of cybersecurity practice, interdisciplinary
research, and understanding in order to serve Indiana University, the state of Indiana,
and our national and global communities.
Some guiding principles:
● Stay grounded: CACR takes on operational cybersecurity responsibilities.
● Real-world problem-oriented research in collaboration with funding partners.
● Tackle all aspects of problem: technical, policy, legal, social.
● Draw on Indiana University’s wide range of scholarly expertise in computer
science, informatics, accounting and information systems, criminal justice, law,
organizational behavior, public policy, and other disciplines.
7
Cybersecurity Historically
Firewalls, IDS,
encryption, logs,
passwords,...
8
Cybersecurity is an Interdisciplinary
Challenge today
9
http://www.bankinfosecurity.com/
Cybersecurity as a Risk Management Tool
Cybersecurity supports the organization by
managing risks to its business mission.
Must understand what is critical to business
mission and apply resources appropriately.
Must balance resources between prevention,
detection, and response to risks.
10
CACR Expertise: Risk Management,
Policy, Compliance
11
Risk Management & Resilience
● Familiarity w/ many frameworks: FISMA / NIST RMF, NIST
Framework for Improving Critical Infrastructure
Cybersecurity, HIPAA, ISO, MITRE’s resilience work
● Assist organizations in navigating and applying these
frameworks, conducting risk assessments, balancing
prevention, detection, response, fight thru, and recovery;
evaluating their information security programs
● Experience applying risk management to novel environments
and particular missions where one-size-fits-all doesn’t cut it
● We know the pitfalls: effort / resources; failure of orgs and
auditors to understand risk acceptance 12
Policy & Law
Policy: provide leadership, guidance, and a
convening function on national and international
levels; often bringing people together who
otherwise would never talk
policy: assist organizations
in creating, navigating, enforcing,
and educating personnel on
the detailed policies and laws
that both limit and enable our missions
13
Image credit: Bob Cowles
Compliance
• FISMA and HIPAA
• Establish NIST-based Risk Management Framework (RMF) at IU
• Use it to align IU’s central systems with HIPAA & FISMA
• Assist IU biomedical researchers to tackle HIPAA
• Develop compliance resources for IU
• Education
• Provide HIPAA and FISMA training locally and nationally
• Outreach
• Provide cyber compliance assistance to other academic and research
institutions
• Provide national leadership on compliance issues in research and academia
14
Key CACR Projects
15
16
Image credit: NSF/K. Thompson
17
TrustedCI.org:
Center for Trustworthy Scientific
Cyberinfrastructure
Providing leadership and addressing
cybersecurity challenges for the NSF community.
CTSC’s Accomplishments
● Engaged with >20 NSF science projects to provide
cybersecurity leadership.
● Organized 2013-15 NSF Cybersecurity Summits for
Large Facilities and CI
● Developed and provided training & best practices.
● Developed Cybersecurity Program Guide for NSF CI
● Authoring cybersecurity chapter for NSF Large
Facilities Manual
18
Software Assurance Marketplace
(SWAMP)
We rely increasingly on our
software stacks – both the
ones we write and others.
Open nature leads to large
attack surfaces.
Software integrity is critical.
19
Funded by DHS:
Morgridge Institute for
Research (lead)
University of Illinois Urbana
Champaign
University of Wisconsin –
Madison
Indiana University
20
Explosion of Software
Plus cars, medical devices, Internet of Things….
And where are all those programmers?
21
A Framework for Software Assurance
22
Results
Packa
ge
Packa
gePackage
Tool
Tool
Tool
Platfor
m
Platfor
mPlatform
Current: 396 &
bring your own
Current: 8
Perform
Assess-
ment
Result
Viewe
r
Result
Viewe
r
Result
Viewer
Current: 2
Current: 700+ Cores
View
Results
Parse
Results
Parsed
Results
Current: 9
eXtreme Scale Identity Management
for Science (XSIM)
Traditional computing with
users all managed by data
center.
Modern science has large multi-
site collaborations.
Funded by DOE/ASCR
23
Image credit: Ian
Bird/CERN
Science collaboratory identity management
• Based on interviews with 18 sites and projects.
• Simple model for describing collaboratory IdM.
• Identified factors that inhibit and encourage
delegation from computing center to collaboration.
24
Security Matters
A trusted voice for the
general public.
Real world practice
cybersecurity
guidance videos.
http://www.securitymatters.iu.edu/
25
Internships
● Working with students from multiple disciplines: law/policy,
computer science, engineering
● Students work alongside CACR Senior Analysts on policy
issues, selecting and implementing security controls,
providing training, and assessing the security needs of novel
technologies and implementations.
● Big attractants: exposure to unusual technologies and
environments, opportunities for professional development
rather than getting penned in on rote tasks.
26
CACR 2015-16 Seminar Series
Every other Thursday at
noon in Law 335.
Free and open to the
public. Lunch provided.
27
9/3/15 Stacy Prowell, ORNL
10/1/15 Sadia Afroz, U. Berkeley
10/15/15 Bart Miller, U. Wisconsin
11/5/15 Abhi Shelat, U. Virginia
12/10/15 Kathryn Seigfried-Spellar,
Purdue U.
1/21/16 Lujo Bauer, CMU
2/4/16 Serge Egelman, U. Berkeley
2/18/16 Matt Bishop, U. Cal-Davis
3/24/16 LeAnn Miller, Sandia
4/7/16 Yang Wang, Syracuse U.
4/21/16 Adam Slagell, U.
Illinois/NCSA
CACR Cybersecurity Summit
2014 Summit
● Featured two senior Homeland Security officials
responsible for cyber operations and R&D.
2015 Summit Coming Soon!
● September 15, 2015
● Hine Hall, IUPUI, Indianapolis
● Featuring Ron Ross, NIST
28
2015 CACR Summit Agenda
• Morning Keynote Address:
• Ron Ross, NIST
• Morning Panel:
• Enterprise Risk Management
• Merri Beth Lavagnino, Indiana University
• Ron Ross, NIST
• Hans Vargas, Indiana Office of Technology and IN-ISAC
• Lunch Keynote Address:
• Harvey Rishikof, Crowell & Moring
• Afternoon Panel:
• Privacy, Promises and Shortcomings of Technology
29
2015 CACR Summit Agenda
Cybercrime and Fraud Track
• Speaker/Topic: Stephen Reynolds, Stephen Reynolds & Nick Merker - Ice Miller
• “Preventing, Insuring and Surviving Fund Transfer Fraud”
• Speaker/Topic: Mark Villinski, Kaspersky Lab North America
• “The Explosion of Cybercrime - The 5 Ways IT May be an Accomplice”
Privacy Track
• Speaker/Topic: Nate Anderson, Sears Holding Company
• “Privacy Lessons from the Field”
Governance, Risk Management & Compliance Track
• Speaker/Topic: Jeff Foresman, Rook Security
• “Compliance vs. Security – How to Build a Secure Compliance Program”
• Speaker/Topic: Scot Ganow, Esq., CIPP/US, Faruki, Ireland & Cox P.L.L.
• “Getting in Shape for Breach Season”
30
2015 CACR Summit
• Registration: https://uits.iu.edu/cybersecurity-summit
• Additional Information: Contact CACR at cacr@indiana.edu
31
Thank you.
Von Welch vwelch@iu.edu
Craig Jackson scjackso@indiana.edu
Susan Sons susstewa@iu.edu
cacr.iu.edu
32

More Related Content

What's hot

Sample Incident Response Plan
Sample Incident Response PlanSample Incident Response Plan
Sample Incident Response PlanMatthew J McMahon
 
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNorth Texas Chapter of the ISSA
 
Webinar notes: Welcome to your worst day ever
Webinar notes: Welcome to your worst day everWebinar notes: Welcome to your worst day ever
Webinar notes: Welcome to your worst day everSophia Price
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...PacificResearchPlatform
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
 
Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDPacificResearchPlatform
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Addressing cyber security
Addressing cyber securityAddressing cyber security
Addressing cyber securityFemi Ashaye
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewFemi Ashaye
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?Nex-Tech
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Higher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk CustomersHigher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk CustomersAdam Tice
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesBlack Duck by Synopsys
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Adam Tice
 

What's hot (20)

Sample Incident Response Plan
Sample Incident Response PlanSample Incident Response Plan
Sample Incident Response Plan
 
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
 
Webinar notes: Welcome to your worst day ever
Webinar notes: Welcome to your worst day everWebinar notes: Welcome to your worst day ever
Webinar notes: Welcome to your worst day ever
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhD
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Addressing cyber security
Addressing cyber securityAddressing cyber security
Addressing cyber security
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Post naval thesis in cyber security
Post naval thesis in cyber securityPost naval thesis in cyber security
Post naval thesis in cyber security
 
Higher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk CustomersHigher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk Customers
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 

Viewers also liked

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsVon Welch
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingVon Welch
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015Von Welch
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsVon Welch
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015Von Welch
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
Children's SS classes brochure 2015-16
Children's SS classes brochure 2015-16Children's SS classes brochure 2015-16
Children's SS classes brochure 2015-16Rhonda Clausen
 
Damascus uni certificate
Damascus uni certificateDamascus uni certificate
Damascus uni certificateLubna Nser
 
Buku panduan prolanis
Buku panduan prolanisBuku panduan prolanis
Buku panduan prolaniseka1400
 
Blue berry physiological disorders A Lecture By Allah Dad Khan To FFS Trai...
Blue berry  physiological disorders   A Lecture By Allah Dad Khan To FFS Trai...Blue berry  physiological disorders   A Lecture By Allah Dad Khan To FFS Trai...
Blue berry physiological disorders A Lecture By Allah Dad Khan To FFS Trai...Mr.Allah Dad Khan
 
Certificate-BOE330 Designing and Deploying A Solution
Certificate-BOE330 Designing and Deploying A SolutionCertificate-BOE330 Designing and Deploying A Solution
Certificate-BOE330 Designing and Deploying A SolutionCharles Brown
 

Viewers also liked (16)

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific Collaborations
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next Steps
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Centre for Conflict Management & Transforrmation (CCMT)-The Transformer Magaz...
Centre for Conflict Management & Transforrmation (CCMT)-The Transformer Magaz...Centre for Conflict Management & Transforrmation (CCMT)-The Transformer Magaz...
Centre for Conflict Management & Transforrmation (CCMT)-The Transformer Magaz...
 
Children's SS classes brochure 2015-16
Children's SS classes brochure 2015-16Children's SS classes brochure 2015-16
Children's SS classes brochure 2015-16
 
Damascus uni certificate
Damascus uni certificateDamascus uni certificate
Damascus uni certificate
 
Buku panduan prolanis
Buku panduan prolanisBuku panduan prolanis
Buku panduan prolanis
 
Blue berry physiological disorders A Lecture By Allah Dad Khan To FFS Trai...
Blue berry  physiological disorders   A Lecture By Allah Dad Khan To FFS Trai...Blue berry  physiological disorders   A Lecture By Allah Dad Khan To FFS Trai...
Blue berry physiological disorders A Lecture By Allah Dad Khan To FFS Trai...
 
Certificate-BOE330 Designing and Deploying A Solution
Certificate-BOE330 Designing and Deploying A SolutionCertificate-BOE330 Designing and Deploying A Solution
Certificate-BOE330 Designing and Deploying A Solution
 
CFAR symposium_3.19.15
CFAR symposium_3.19.15CFAR symposium_3.19.15
CFAR symposium_3.19.15
 

Similar to CACR Experts Address Cybersecurity Challenges

DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
CTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusCTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusjbasney
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Information security
Information securityInformation security
Information securitykevin_donovan
 
Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020Carol Smith
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestrationChadni Islam
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 

Similar to CACR Experts Address Cybersecurity Challenges (20)

DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
CTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusCTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campus
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Information security
Information securityInformation security
Information security
 
Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 

Recently uploaded

Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 

Recently uploaded (20)

Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 

CACR Experts Address Cybersecurity Challenges

  • 1. Von Welch, Director Craig Jackson, Senior Policy Analyst Susan Sons, Senior Systems Analyst Naval Surface Warfare Center Crane Division 28 August 2015
  • 2. Outline 1. Overview and History of CACR 2. CACR Expertise: Risk Management, Policy, Compliance 3. CACR Activities: CTSC, SWAMP, XSIM, Education/Internships 4. CACR Events: Seminar Series, Summits 2
  • 3. CACR Founded by then CIO Michael McRobbie in 2003 “...university-wide research center that would bridge our operational strengths and practical experience with our academic units [and] bridge technical specialties in cybersecurity with business, law and the behavior disciplines.” 3
  • 4. Cybersecurity @ IU CACR’s IU Partner Organizations •REN-ISAC •SOIC (Master’s Degree in Cybersecurity) •University Information Security Office •University Information Policy Office •Maurer School of Law •Kelley School of Business •IUPUI School of Science •Pervasive Technology Institute Research Center 4
  • 5. IU’s NSA/DHS Designations Indiana University designated as a National Center of Academic Excellence in Information Assurance / Cyber Defense through academic year 2021. 5
  • 6. CACR is External Facing Base funding from OVPIT, President’s Office, but primarily grant- funded applied research. Since its origination in 2003, over $16 million in external funding from: Lilly Endowment, Inc., the National Science Foundation, the Department of Energy, the Department of Homeland Security, the National Institutes of Health, and others. External partners: CMU/PSC, U. of Illinois/NCSA, U. of Wisconsin, U. of Wisconsin-Milwaukee, Morgridge Institute for Research. 6
  • 7. Applied Research CACR’s mission is to advance the state of cybersecurity practice, interdisciplinary research, and understanding in order to serve Indiana University, the state of Indiana, and our national and global communities. Some guiding principles: ● Stay grounded: CACR takes on operational cybersecurity responsibilities. ● Real-world problem-oriented research in collaboration with funding partners. ● Tackle all aspects of problem: technical, policy, legal, social. ● Draw on Indiana University’s wide range of scholarly expertise in computer science, informatics, accounting and information systems, criminal justice, law, organizational behavior, public policy, and other disciplines. 7
  • 9. Cybersecurity is an Interdisciplinary Challenge today 9 http://www.bankinfosecurity.com/
  • 10. Cybersecurity as a Risk Management Tool Cybersecurity supports the organization by managing risks to its business mission. Must understand what is critical to business mission and apply resources appropriately. Must balance resources between prevention, detection, and response to risks. 10
  • 11. CACR Expertise: Risk Management, Policy, Compliance 11
  • 12. Risk Management & Resilience ● Familiarity w/ many frameworks: FISMA / NIST RMF, NIST Framework for Improving Critical Infrastructure Cybersecurity, HIPAA, ISO, MITRE’s resilience work ● Assist organizations in navigating and applying these frameworks, conducting risk assessments, balancing prevention, detection, response, fight thru, and recovery; evaluating their information security programs ● Experience applying risk management to novel environments and particular missions where one-size-fits-all doesn’t cut it ● We know the pitfalls: effort / resources; failure of orgs and auditors to understand risk acceptance 12
  • 13. Policy & Law Policy: provide leadership, guidance, and a convening function on national and international levels; often bringing people together who otherwise would never talk policy: assist organizations in creating, navigating, enforcing, and educating personnel on the detailed policies and laws that both limit and enable our missions 13 Image credit: Bob Cowles
  • 14. Compliance • FISMA and HIPAA • Establish NIST-based Risk Management Framework (RMF) at IU • Use it to align IU’s central systems with HIPAA & FISMA • Assist IU biomedical researchers to tackle HIPAA • Develop compliance resources for IU • Education • Provide HIPAA and FISMA training locally and nationally • Outreach • Provide cyber compliance assistance to other academic and research institutions • Provide national leadership on compliance issues in research and academia 14
  • 17. 17 TrustedCI.org: Center for Trustworthy Scientific Cyberinfrastructure Providing leadership and addressing cybersecurity challenges for the NSF community.
  • 18. CTSC’s Accomplishments ● Engaged with >20 NSF science projects to provide cybersecurity leadership. ● Organized 2013-15 NSF Cybersecurity Summits for Large Facilities and CI ● Developed and provided training & best practices. ● Developed Cybersecurity Program Guide for NSF CI ● Authoring cybersecurity chapter for NSF Large Facilities Manual 18
  • 19. Software Assurance Marketplace (SWAMP) We rely increasingly on our software stacks – both the ones we write and others. Open nature leads to large attack surfaces. Software integrity is critical. 19 Funded by DHS: Morgridge Institute for Research (lead) University of Illinois Urbana Champaign University of Wisconsin – Madison Indiana University
  • 20. 20 Explosion of Software Plus cars, medical devices, Internet of Things….
  • 21. And where are all those programmers? 21
  • 22. A Framework for Software Assurance 22 Results Packa ge Packa gePackage Tool Tool Tool Platfor m Platfor mPlatform Current: 396 & bring your own Current: 8 Perform Assess- ment Result Viewe r Result Viewe r Result Viewer Current: 2 Current: 700+ Cores View Results Parse Results Parsed Results Current: 9
  • 23. eXtreme Scale Identity Management for Science (XSIM) Traditional computing with users all managed by data center. Modern science has large multi- site collaborations. Funded by DOE/ASCR 23 Image credit: Ian Bird/CERN
  • 24. Science collaboratory identity management • Based on interviews with 18 sites and projects. • Simple model for describing collaboratory IdM. • Identified factors that inhibit and encourage delegation from computing center to collaboration. 24
  • 25. Security Matters A trusted voice for the general public. Real world practice cybersecurity guidance videos. http://www.securitymatters.iu.edu/ 25
  • 26. Internships ● Working with students from multiple disciplines: law/policy, computer science, engineering ● Students work alongside CACR Senior Analysts on policy issues, selecting and implementing security controls, providing training, and assessing the security needs of novel technologies and implementations. ● Big attractants: exposure to unusual technologies and environments, opportunities for professional development rather than getting penned in on rote tasks. 26
  • 27. CACR 2015-16 Seminar Series Every other Thursday at noon in Law 335. Free and open to the public. Lunch provided. 27 9/3/15 Stacy Prowell, ORNL 10/1/15 Sadia Afroz, U. Berkeley 10/15/15 Bart Miller, U. Wisconsin 11/5/15 Abhi Shelat, U. Virginia 12/10/15 Kathryn Seigfried-Spellar, Purdue U. 1/21/16 Lujo Bauer, CMU 2/4/16 Serge Egelman, U. Berkeley 2/18/16 Matt Bishop, U. Cal-Davis 3/24/16 LeAnn Miller, Sandia 4/7/16 Yang Wang, Syracuse U. 4/21/16 Adam Slagell, U. Illinois/NCSA
  • 28. CACR Cybersecurity Summit 2014 Summit ● Featured two senior Homeland Security officials responsible for cyber operations and R&D. 2015 Summit Coming Soon! ● September 15, 2015 ● Hine Hall, IUPUI, Indianapolis ● Featuring Ron Ross, NIST 28
  • 29. 2015 CACR Summit Agenda • Morning Keynote Address: • Ron Ross, NIST • Morning Panel: • Enterprise Risk Management • Merri Beth Lavagnino, Indiana University • Ron Ross, NIST • Hans Vargas, Indiana Office of Technology and IN-ISAC • Lunch Keynote Address: • Harvey Rishikof, Crowell & Moring • Afternoon Panel: • Privacy, Promises and Shortcomings of Technology 29
  • 30. 2015 CACR Summit Agenda Cybercrime and Fraud Track • Speaker/Topic: Stephen Reynolds, Stephen Reynolds & Nick Merker - Ice Miller • “Preventing, Insuring and Surviving Fund Transfer Fraud” • Speaker/Topic: Mark Villinski, Kaspersky Lab North America • “The Explosion of Cybercrime - The 5 Ways IT May be an Accomplice” Privacy Track • Speaker/Topic: Nate Anderson, Sears Holding Company • “Privacy Lessons from the Field” Governance, Risk Management & Compliance Track • Speaker/Topic: Jeff Foresman, Rook Security • “Compliance vs. Security – How to Build a Secure Compliance Program” • Speaker/Topic: Scot Ganow, Esq., CIPP/US, Faruki, Ireland & Cox P.L.L. • “Getting in Shape for Breach Season” 30
  • 31. 2015 CACR Summit • Registration: https://uits.iu.edu/cybersecurity-summit • Additional Information: Contact CACR at cacr@indiana.edu 31
  • 32. Thank you. Von Welch vwelch@iu.edu Craig Jackson scjackso@indiana.edu Susan Sons susstewa@iu.edu cacr.iu.edu 32