1 / 4

CNCI – from the top

CNCI – from the top. Susan Alexander CTO for Information and Identity Assurance OSD. Email: Susan.Alexander@osd.mil. Motivators . America’s dependence on cyber infrastructure for social, economic and physical security Vulnerability of infrastructure to asymmetric attack

gwenllian
Download Presentation

CNCI – from the top

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CNCI – from the top Susan Alexander CTO for Information and Identity Assurance OSD Email: Susan.Alexander@osd.mil

  2. Motivators • America’s dependence on cyber infrastructure for social, economic and physical security • Vulnerability of infrastructure to asymmetric attack • Lack of a coordinated, national-level plan to do anything about this

  3. Init 9 - Leap-ahead workshop • August 30-31, Rosslyn • Tap extant efforts with academia • NCDI • Nat’l Research Council • Industry • Intel, Microsoft, Mitre, et al • Gov’t • NSF, IARPA, DARPA, NSA/NIARL, OSTP, NIST, DDR&E, DHS, ASD(NII), JCS

  4. CyberNation: a game we must winLeap-ahead strategy • Morph the gameboard - ever-changing terrain • Resilient networks/systems; adaptive defense • Change the rules - protocols that favor us • Accountable flows; anonymity and attribution • Up the Stakes - increase risk for the adversary • Armed data; network mines • Build it right - no hidden vulnerabilities • Secure systems engineering • Deploy it fast - faster than the adversary • Secure systems assembly

More Related