Cyberspace: A Fragile Ecosystem Robert F. Lentz Deputy Assistant Secretary of Defense Cyber, Identity and Information Assurance 1 Unclassified//FOUO
UNCLASSIFIED Dependence on Cyberspace Unclassified//FOUO UNCLASSIFIED 2
Looking Ahead . . . Looking Back Waves of IT Industry Growth in the Information Age Grosch’s Moore’s Metcalf’s Law of Law Law Law Transforma4on 10000 10000 Network Network ‐ ‐ Network Network ‐ ‐ Centric Centric Centric Centric Content Content Content Content ‐ ‐ ‐ ‐ 1000 1000 Centric Centric Centric Centric Number of Users (Millions) Number of Users (Millions) PC PC ‐ ‐ Centric Centric PC PC ‐ ‐ Centric Centric 100 100 Systems Systems Systems Systems ‐ ‐ ‐ ‐ Centric Centric Centric Centric 10 10 1 1 1970 1970 1980 1980 1990 1990 2000 2000 2010 2010 2020 2020 2030 2030 Source: David Moschella, “Waves of Power”, 1997 Unclassified//FOUO
Looking Ahead . . . Looking Back (alternate story) 4 Unclassified//FOUO
Paradigm Shift Unclassified//FOUO
UNCLASSIFIED Are you a Starfish or a Spider? Starfish Peered Adaptive Resilient Spider Hierarchical Resists Change Fragile Unclassified//FOUO UNCLASSIFIED 6
Cyber Risk Management Cyber Time & Environment Information Content & Services Individuals, Organizations, Identity Equipment Unclassified//FOUO
UNCLASSIFIED Vignette: The Recapture of Fallujah Unclassified//FOUO UNCLASSIFIED 8
UNCLASSIFIED Vignette: World War II Cryptography Unclassified//FOUO UNCLASSIFIED 9
Shift in Strategic Focus FROM TO • Protect Information • Ensure Operational Success • Dynamic Network and • Static Pre-Placed Defenses Information Operations • Proprietary Point Solutions • Policy-Based Enterprise • People Intensive • Integrated Services • Fragile Information • Resilient Cyber Ecosystem Technology Unclassified//FOUO
Toward a Resilient Cyber Ecosystem E E Secure Information Access Resilient D D C C B B A A Speed of Action A B C D E A B C D E Tools-Based Interoperable Policy-Based Resilient Reactive & Enterprise optimizes Manual Loosely integrated The enterprise Tools and service to user by to tools exchange data to instantiates technologies are dynamically isolating Security assist people with security policy, applied piecemeal and containing effects – administrators follow cyber situational illuminates events and to assist people in including in supply rules and do their awareness helps the operators reacting faster chain and underlying best to “put out fires” find, fix, and target for infrastructure 11 response Unclassified//FOUO
Trends, Challenges, and Opportunities • Strengthen Network Underpinnings • Assure Software & Systems • Managing Attack Surfaces • Reducing Anonymity • Improving Cyber Awareness • Automating Security Content • Mission Based Architectures Unclassified//FOUO
It’s not just about technology . . . National Centers of Academic Excellence in Information Assurance Education 106 Colleges & Universities in 38 States & DC The US Cyber Challenge – discover, train and recruit the best talent in the country Unclassified//FOUO
UNCLASSIFIED Culture Change for Cyberspace . . . Unclassified//FOUO UNCLASSIFIED 14
Recommend
More recommend