United States Coast Guard

Similar documents
Coast Guard Cyber Command. Driving Mission Execution CAPT John Felker Deputy Commander, CGCYBERCOM August 2011

EVERGREEN IV: STRATEGIC NEEDS

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM

Cybersecurity United States National Security Strategy President Barack Obama

SECRETARY OF THE ARMY WASHINGTON

America s Coast Guard. Commandant s Guiding Principles. U.S. Coast Guard

JRSS Discussion Panel Joint Regional Security Stack

Area Maritime Security Committees

TABLE OF CONTENTS EXECUTIVE SUMMARY 1 I. STRATEGIC CONTEXT 4. Security Environment 5. Increasing Expectations 6. Fiscal Realities 7.

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE

Strong. Secure. Engaged: Canada s New Defence Policy

Office of the Under Secretary of Defense for Policy

Leading Intelligence INTEGRATION. Office of the Director of National Intelligence

Crowdsourced Security at the Government Level: It Takes a Nation (of Hackers)

NORAD and USNORTHCOM Technology Needs Mr. John Knutson J8 Office of S&T

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

Department of Defense DIRECTIVE

Executing our Maritime Strategy

National Security and the Accelerating Risk of Climate Change

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

REPORT OF THE STANDING COMMITTEE FOR MARINE SECURITY 1. INTRODUCTION, OPENING REMARKS AND APPROVAL OF AGENDA

NACA 2016 B2B Conference & Expo

DOD DIRECTIVE ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE

CG-9 Internal Controls Program Overview. CG-9 Rory Souther Association of Government Accountants Audio Conference June 8, 2011

WEST POINT CYBER INITIATIVES

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

CSFI Cyberspace Operations Strategist and Planner CSFI- CCOSP

MC Network Modernization Implementation Plan

Advancing Army Energy Security and Microgrids for Mission Readiness

LOE 1 - Unified Network

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)

Navy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces

By 2020, light-emitting diodes will reduce worldwide electrical consumption by 1,400 terawatt-hours annually.

U.S. Coast Guard Washington DC

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

How the Component Commands Support the U.S. Cyber Command Vision

A Call to the Future

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings

United States Army War College. Strategic Cyberspace Operations Guide

America s Airmen are amazing. Even after more than two decades of nonstop. A Call to the Future. The New Air Force Strategic Framework

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command

Federal Bureau of Investigation (FBI)

DOD Insider Threat Management and Analysis Center COUNTERINTELLIGENCE AWARENESS WEBINAR SERIES

UNCLASSIFIED/ AFCEA Alamo Chapter. MG Garrett S. Yee. Acting Cybersecurity Director Army Chief Information Officer/G-6. June 2017 UNCLASSIFIED

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE

Army Network Campaign Plan and Beyond

Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead

6 th Annual Joint Civil & DoD CBRN Symposium

Strategic Vision. Rapidly Delivering Cyber Warfighting Capability From Seabed to Space. Space and Naval Warfare Systems Command

Conducting. Joint, Inter-Organizational and Multi-National (JIM) Training, Testing, Experimentation. in a. Distributive Environment

Domestic Nuclear Detection Office (DNDO)

ALLIANCE MARITIME STRATEGY

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

Department of Defense DIRECTIVE

Defense Industrial Base Conference Overview & Objectives

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

To be prepared for war is one of the most effectual means of preserving peace.

Northern California Area Maritime Security Committee

Joint Information Environment. White Paper. 22 January 2013

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Joint Publication Operations Security

NATO UNCLASSIFIED. 6 January 2016 MC 0472/1 (Final)

Prepared Statement of GEN (Ret) Keith B. Alexander*

Agency Mission Assurance

National Maritime Security Advisory Committee; SUMMARY: The National Maritime Security Advisory Committee

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

New DoD Approaches on the Cyber Survivability of Weapon Systems

UAV s And Homeland Defense Now More Critical Than Ever. LCDR Troy Beshears UAV Platform Manager United States Coast Guard

AVIONICS CYBER TEST AND EVALUATION

Information Operations

navy strategy For AChIevIng InFormAtIon dominance navy strategy For AChIevIng InFormAtIon dominance Foreword

Department of Defense Synchronization and Coordination via Joint Information Environment

Army Operating Concept

And if I impart anything today, let it be this: those partnerships that will carry the day.

A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment

2017 National Fusion Center Association. Annual Training Event. At-a-Glance Program

The key systems and networks that are colloquially referred to as cyberspace

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem

Su S rface Force Strategy Return to Sea Control

July 06, 2012 Executive Order -- Assignment of National Security and Emergency Preparedness Communications Functions EXECUTIVE ORDER

AFCEA Mission Command Industry Engagement Symposium

AFOSI CYBER THREAT PURSUIT: THE AIR FORCE S OUTSIDE THE BOX RESPONSE TO CYBER EXPLOITATION

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501

Department of Defense DIRECTIVE. SUBJECT: Department of Defense Counterproliferation (CP) Implementation

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

Defense Strategies Institute professional educational forum:

DoD Update Insider Threat and the NISP

This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the

Cyber Defense: Securing Military Systems And Critical Civilian Infrastructure From An Electronic 9/11 By Sidney E. Dean Editor READ ONLINE

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

Comptroller Trends. American Society of Military Comptrollers (ASMC) Mini - PDI. 02 March 2017

Next Steps to Revolutionary Change of Spectrum Usage

STATEMENT OF GENERAL KEITH B. ALEXANDER COMMANDER UNITED STATES CYBER COMMAND BEFORE THE SENATE COMMITTEE ON ARMED SERVICES

Strategy Research Project

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

Transcription:

A Preview of the United States Coast Guard Cyber Strategy Rutgers University March 2015 Vice Admiral Chuck Michel

The Evolving Threat Agenda Adversarial Examples Threat Actors Policies, Directives, and Mandates Coast Guard Cyber Strategy Three Strategic Priorities Ensuring Long-Term Success Future Actions Research Opportunities

Evolving Threat A Call to Action Cybersecurity is one of the most serious economic and national security challenges we face as a nation - President Obama, February 2013 Cyber affects the full spectrum of Coast Guard operations it cuts across every aspect of the Coast Guard. We all have a role in cybersecurity and protection of our networks, and we must treat them like the mission-critical assets that they are. - Admiral Zukunft, September 2014 The loss of industrial information and intellectual property through cyber espionage constitutes the greatest transfer of wealth in history. - General Alexander, August 2013 All sectors of our country are at risk the seriousness and the diversity of the threats that this country faces in the cyber domain are increasing on a daily basis. - DNI Director Clapper, March 2013

Adversarial Examples State-Sponsored Hackers Transnational Criminal Organizations Independent Hackers Insider Threats

Threat Actors Criminal Nation-states Insiders Self-inflicted Hacktivists

Executive Branch Policy and Directives Presidential / National Policy DHS Policies / Directives DOD Policies / Directives CG Policies / Directives In Progress NVIC

Cyber Strategy Three Strategic Priorities 1. Defending 2. Enabling Operations 3. Protecting Infrastructure

1. Defending 1. Defending 2. Enabling Operations Goal 1. Identify and Harden Systems and Networks 3. Protecting Infrastructure

1. Defending 1. Defending Goal 2. Understand and Counter Cyber Threats 2. Enabling Operations 3. Protecting Infrastructure

1. Defending 1. Defending Goal 3. Increase Operational Resilience 2. Enabling Operations 3. Protecting Infrastructure

2. Enabling Operations 1. Defending 2. Enabling Operations Goal 1. Incorporate Operations into Mission Planning and Execution 3. Defending

2. Enabling Operations 1. Defending 2. Enabling Operations Goal 2. Deliver Cyber Capabilities to Enhance All Missions 3. Defending

3. Protecting Infrastructure 1. Defending 2. Enabling Operations Goal 1. Risk Assessment Promote Cyber Risk Awareness and Management 3. Protecting Infrastructure CARMA Cyber Security Assessment & Risk Management Approach

3. Protecting Infrastructure 1. Defending Goal 2. Prevention Reduce Cybersecurity Vulnerabilities in the MTS. 2. Enabling Operations 3. Protecting Infrastructure

Ensuring Long-Term Success Seven Cross-Cutting Factors 1. Recognize as an Operational Domain 2. Develop Operational Cyber Guidance/Define Mission Space 3. Leverage Partnerships 4. Communicate in Real-Time 5. Organize for Success 6. Build a Cyber Workforce 7. Invest in the Future

Future Actions Commandant Approval Communications Plan Publication with External Public Release Implementation Plan Ongoing Renewal/Assessment

Research Opportunities Analysis to identify greatest vulnerabilities in maritime domain Identify best options for operational and system cyber resilience Analysis and tools to map and predict dynamic maritime cyber threats Impact analysis for MTS and cascading consequences to nation and economy Nodal and system analysis to identify single-points of failure in MTS Networking analysis solutions to support optimal information sharing with partners

Questions and Comments