SlideShare a Scribd company logo
A	
  Strategy	
  for	
  Addressing	
  Cyber	
  
Security	
  Challenges	
  
Mustaque	
  Ahamad	
  
Professor	
  of	
  Computer	
  Science,	
  Georgia	
  Ins>tute	
  of	
  Technology	
  
Global	
  Professor	
  of	
  Engineering,	
  New	
  York	
  University	
  Abu	
  Dhabi	
  
Co-­‐founder	
  and	
  Chief	
  Scien>st,	
  Pindrop	
  Security	
  
A	
  Couple	
  of	
  Observa>ons	
  
•  Cyber	
  security	
  has	
  become	
  an	
  extremely	
  
important	
  problem	
  for	
  people,	
  businesses	
  and	
  
governments.	
  
•  Addressing	
  cyber	
  security	
  challenges	
  presents	
  
serious	
  challenges.	
  
•  Cyber	
  now	
  reaches	
  into	
  cri>cal	
  physical	
  
systems.	
  
•  Cyber	
  security	
  is	
  going	
  to	
  be	
  a	
  journey,	
  not	
  a	
  
des>na>on.	
  
Are	
  Things	
  Really	
  Bad?	
  
•  Growing	
  sophis>ca>on	
  of	
  the	
  threat	
  landscape	
  
–  Cyber	
  criminals,	
  hack>vits,	
  terrorists	
  and	
  na>on-­‐states	
  
–  Cyber	
  crime	
  costs	
  are	
  reaching	
  half	
  a	
  trillion	
  dollars	
  (In	
  
India,	
  0.21%	
  of	
  GDP,	
  McAfee	
  2014	
  Report)	
  
–  Greatest	
  transfer	
  of	
  wealth	
  (Keith	
  Alexander,	
  
hXp://foreignpolicy.com/2012/07/09/nsa-­‐chief-­‐cybercrime-­‐cons>tutes-­‐the-­‐greatest-­‐transfer-­‐of-­‐wealth-­‐in-­‐history/	
  )	
  
•  Complex	
  technology	
  ecosystem	
  
–  “Reflec>ons	
  on	
  trus>ng	
  trust”	
  
•  People,	
  processes	
  and	
  coordina>on	
  across	
  
mul>ple	
  stakeholders	
  
	
  
Threats	
  +	
  Vulnerabili>es	
  =>	
  AXacks	
  
•  Can	
  we	
  make	
  threats	
  go	
  away?	
  
•  AXribu>on	
  is	
  extremely	
  difficult	
  
•  Global	
  and	
  transna>onal	
  
•  How	
  can	
  we	
  address	
  vulnerabili>es?	
  
•  Security	
  errors	
  in	
  sofware	
  (over	
  1700	
  entries	
  in	
  NVD	
  in	
  last	
  
3	
  months)	
  
•  Asymmetry	
  –	
  aXackers	
  only	
  need	
  to	
  find	
  one	
  bug,	
  we	
  need	
  
to	
  fix	
  all	
  
•  People	
  are	
  weak	
  links	
  
•  Only	
  higher	
  assurance,	
  no	
  perfect	
  security	
  
–  Stronger	
  preven>on	
  and	
  early	
  detec>on	
  
–  	
  Faster	
  recovery	
  and	
  remedia>on	
  
So,	
  What	
  Can	
  We	
  Do?	
  
•  Educa>on	
  
– Developing	
  the	
  “security	
  mindset”	
  
– Undergraduate	
  and	
  graduate	
  programs	
  
•  Research	
  
– Rapidly	
  evolving	
  field	
  
•  Policy,	
  legal	
  and	
  regula>on	
  
– It	
  is	
  much	
  more	
  than	
  technology	
  
Educa>ng	
  Cyber	
  Security	
  Professionals	
  
•  US	
  Na>onal	
  Ini>a>ve	
  for	
  Cybersecurity	
  
Educa>on	
  (NICE)	
  hXp://csrc.nist.gov/nice/framework/	
  
	
  
Capacity	
  Building	
  for	
  Educa>ng	
  Cyber	
  
Security	
  Professionals	
  
•  What	
  do	
  we	
  do?	
  
–  Undergraduate	
  or	
  graduate	
  programs?	
  
–  Integra>ng	
  security	
  concepts	
  in	
  CS	
  curriculum?	
  
–  Voca>onal	
  programs?	
  
•  	
  How	
  do	
  we	
  do	
  it?	
  
–  So,	
  where	
  do	
  we	
  find	
  cyber	
  security	
  faculty?	
  
–  Developing	
  hands	
  on	
  projects	
  and	
  laboratories	
  
•  US	
  Response	
  
–  Centers	
  of	
  Excellence	
  Program	
  (NSA/DHS)	
  
–  Scholarship-­‐for-­‐Service	
  (SFS)	
  Program)	
  
–  NSF	
  SaTC	
  Educa>on	
  Projects	
  
•  Curriculum	
  development,	
  sharing,	
  workshops	
  etc.	
  
Research	
  Capacity	
  Building	
  
•  Evolving	
  threat	
  landscape	
  and	
  rapidly	
  
changing	
  technologies	
  
– Gelng	
  ahead	
  of	
  emerging	
  threats	
  
– “Test	
  and	
  verify”	
  rather	
  than	
  “trust	
  but	
  verify”	
  
•  Diverse	
  set	
  of	
  research	
  challenges	
  
– Trustworthiness	
  of	
  technology	
  to	
  human	
  
dimension	
  
•  Real-­‐world	
  impact	
  of	
  research	
  
– Tech	
  transfer	
  and	
  commercializa>on	
  
Example	
  I:	
  Malware	
  Analysis	
  
•  Scalable	
  malware	
  analysis	
  system	
  
processes	
  approximately	
  250K	
  
samples	
  a	
  day	
  
•  Extrac>ng	
  features	
  from	
  
communica>on	
  paXerns	
  
•  Big	
  data	
  due	
  to	
  deep	
  packet	
  
analysis	
  and	
  event	
  volume	
  
•  Machine	
  learning	
  for	
  aXribu>on	
  
•  Visualiza>on	
  and	
  ac>onable	
  
intelligence	
  
	
  
	
  
	
  
	
  
	
  
	
  
Mariposa	
  Botnet	
  
Tracking	
  and	
  Takedown	
  
Example	
  II:	
  Data-­‐Driven	
  Cyber	
  Risk	
  
•  Collect	
  cyber	
  risk	
  relevant	
  data	
  
from	
  mul>ple	
  sources	
  
– Vulnerabili>es	
  
– Exploit	
  kits	
  and	
  malware	
  
– AXack	
  data	
  (public	
  and	
  	
  
private)	
  
•  Analy>cs	
  and	
  visualiza>on	
  
– Lean	
  back	
  and	
  lean	
  forward	
  
	
  
	
  
	
  
	
  
	
  
	
  
Calendar	
  view	
  of	
  	
  
reported	
  vulnerabili>es	
  
Na>onal	
  R&D	
  Strategy:	
  US	
  Example	
  
•  Na>onal	
  Science	
  Founda>on	
  Secure	
  and	
  Trustworthy	
  
(SaTC)	
  
–  Launched	
  afer	
  developing	
  a	
  na>onal	
  strategy	
  (
hXps://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf)	
  
–  Interdisciplinary	
  including	
  behavioral	
  and	
  economic	
  aspects	
  
•  DHS,	
  DARPA	
  and	
  NSA	
  Ini>a>ves	
  
–  Cri>cal	
  infrastructure	
  security	
  (CPS)	
  
–  Resilient	
  and	
  transparent	
  compu>ng	
  
–  Science	
  of	
  security	
  
•  Networking	
  and	
  Informa>on	
  Technology	
  Research	
  and	
  
Development	
  (NITRD)	
  Program	
  
–  Coordinated	
  across	
  mul>ple	
  agencies	
  
–  High	
  level	
  goal	
  is	
  to	
  maintain	
  US	
  technological	
  leadership	
  in	
  this	
  
field	
  
Cyber	
  Security	
  Policy	
  
•  Policy	
  development	
  is	
  as	
  important	
  as	
  best	
  
technical	
  safeguards	
  
•  Should	
  companies	
  and	
  government	
  agencies	
  
required	
  to	
  prac>ce	
  certain	
  level	
  of	
  cyber	
  
hygiene?	
  
•  Informa>on	
  sharing	
  and	
  coordina>on	
  
•  Privacy	
  
•  Legal	
  and	
  enforcement	
  issues	
  
Lessons	
  Learned	
  
•  Educa>on	
  capacity	
  building	
  
– Aggressively	
  support	
  centers	
  like	
  CERC	
  IIIT	
  Delhi	
  	
  
– CS	
  curriculum	
  needs	
  to	
  be	
  augmented	
  with	
  cyber	
  
security	
  offerings	
  at	
  all	
  levels	
  
– “Educa>ng	
  the	
  educators”	
  –	
  summer	
  schools,	
  
workshops	
  and	
  hosted	
  programs	
  
– What	
  do	
  we	
  do	
  about	
  faculty?	
  
•  Incen>ves	
  for	
  CS	
  faculty	
  members	
  to	
  shif/expand	
  their	
  
research	
  into	
  cyber	
  security	
  
•  Be	
  crea>ve	
  (professor	
  of	
  prac>ce,	
  global	
  professor	
  etc.)	
  
Lessons	
  Learned	
  Contd.	
  
•  Research	
  capacity	
  building	
  
–  You	
  cannot	
  be	
  a	
  major	
  player	
  without	
  a	
  strong	
  research	
  base	
  	
  
•  How	
  many	
  papers	
  at	
  security	
  conferences	
  from	
  India?	
  
–  Launch/seed	
  a	
  few	
  ambi>ous	
  (and	
  high	
  risk)	
  research	
  projects	
  
like	
  NSF’s	
  fron>ers	
  
–  Start/get	
  security	
  conferences	
  to	
  India	
  to	
  grow	
  the	
  community	
  
–  Applied	
  research	
  exper>se	
  
•  Cannot	
  only	
  rely	
  on	
  security	
  vendor	
  professionals	
  for	
  crisis	
  handling	
  
•  CDC	
  for	
  cyber,	
  CERT	
  2.0?	
  
–  Coordina>on	
  across	
  Na>onal	
  Labs,	
  DRDO??	
  
–  Home	
  grown	
  cyber	
  security	
  companies??	
  
Lessons	
  Learned	
  Contd.	
  
•  Cyber	
  security	
  is	
  much	
  more	
  than	
  technology	
  
– Policy,	
  regulatory	
  and	
  legal	
  dimensions	
  
– Cyber	
  security	
  maturity	
  model	
  and	
  best	
  prac>ces	
  
– Preparedness	
  assessment	
  
– Conversa>ons	
  at	
  the	
  highest	
  level	
  (WEF	
  ini>a>ve)	
  
– Informa>on	
  sharing,	
  coordina>on	
  and	
  mutual	
  aid	
  
– Informal	
  trust	
  networks	
  
Conclusions	
  
•  Cyber	
  risk	
  ranks	
  among	
  the	
  top	
  global	
  risks	
  
(2015	
  WEF	
  Global	
  risks	
  report)	
  
•  Na>onal	
  response	
  is	
  of	
  cri>cal	
  importance	
  
•  Need	
  to	
  move	
  at	
  “network	
  speed”	
  
•  It	
  is	
  all	
  about	
  capacity	
  building	
  
•  Ignore	
  research	
  at	
  your	
  own	
  peril	
  
	
  

More Related Content

PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
PDF
ICION 2016 - Cyber Security Governance
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PPTX
2016 - Cyber Security for the Public Sector
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PDF
Cyber Security For Organization Proposal PowerPoint Presentation Slides
PDF
Webinar - Reducing Your Cybersecurity Risk
PPTX
Webinar cybersecurity presentation-6-2018 (final)
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
ICION 2016 - Cyber Security Governance
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
2016 - Cyber Security for the Public Sector
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Webinar - Reducing Your Cybersecurity Risk
Webinar cybersecurity presentation-6-2018 (final)

What's hot (20)

PDF
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
PPTX
Your cyber security webinar
PDF
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
PDF
Cyber resilience itsm academy_april2015
PPTX
The Future of Cybersecurity - October 2015
PDF
Information cyber security
PDF
Cisa ransomware guide
PDF
WhyNormShield
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
PDF
Shift Toward Dynamic Cyber Resilience
PPT
Breaking down the cyber security framework closing critical it security gaps
PPTX
Cyber Security Professionals Viewed via Supply Chain
PDF
Setting up CSIRT
PDF
CSIRT_16_Jun
PDF
Noah Maina: Computer Emergency Response Team (CERT)
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PPT
HIPAA, Privacy, Security, and Good Business
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
Your cyber security webinar
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
Cyber resilience itsm academy_april2015
The Future of Cybersecurity - October 2015
Information cyber security
Cisa ransomware guide
WhyNormShield
Whitepaper Avira about Artificial Intelligence to cyber security
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Shift Toward Dynamic Cyber Resilience
Breaking down the cyber security framework closing critical it security gaps
Cyber Security Professionals Viewed via Supply Chain
Setting up CSIRT
CSIRT_16_Jun
Noah Maina: Computer Emergency Response Team (CERT)
The role of big data, artificial intelligence and machine learning in cyber i...
HIPAA, Privacy, Security, and Good Business
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Ad

Similar to A Strategy for Addressing Cyber Security Challenges (20)

DOCX
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
DOCX
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
PDF
Cyber security: challenges for society- literature review
PDF
Webinar - Reducing the Risk of a Cyber Attack on Utilities
PPTX
Education to cyber security
PPSX
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
PPTX
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
PDF
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
PDF
Dhs cybersecurity-roadmap
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
PPTX
Jack Whitsitt - Yours, Anecdotally
PDF
Cyber Security Planning 101
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
PDF
Cybersecurity Skilling at a Tipping Point.pdf
PDF
Clear and present danger: Cyber Threats and Trends 2017
PDF
FICCI-talk
PDF
Overview of National Cybersecurity Strategy 2023.pdf
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
Asymmetric threat 5_paper
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
Cyber security: challenges for society- literature review
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Education to cyber security
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Dhs cybersecurity-roadmap
CII Whitepaper India Cyber Risk & Resilience Review 2018
Jack Whitsitt - Yours, Anecdotally
Cyber Security Planning 101
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Cybersecurity Skilling at a Tipping Point.pdf
Clear and present danger: Cyber Threats and Trends 2017
FICCI-talk
Overview of National Cybersecurity Strategy 2023.pdf
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Asymmetric threat 5_paper
Ad

More from Cybersecurity Education and Research Centre (16)

PDF
Automated Methods for Identity Resolution across Online Social Networks
PDF
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
PDF
Video Inpainting detection using inconsistencies in optical Flow
PPTX
TASVEER : Tomography of India’s Internet Infrastructure
PDF
Identification and Analysis of Malicious Content on Facebook: A Survey
PPTX
Clotho : Saving Programs from Malformed Strings and Incorrect
PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
PDF
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
PDF
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
PDF
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
PDF
Securing the Digital Enterprise
PDF
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
PDF
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
PDF
Web Application Security 101
PPTX
Exploration of gaps in Bitly's spam detection and relevant countermeasures
PDF
The future of interaction & its security challenges
Automated Methods for Identity Resolution across Online Social Networks
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Video Inpainting detection using inconsistencies in optical Flow
TASVEER : Tomography of India’s Internet Infrastructure
Identification and Analysis of Malicious Content on Facebook: A Survey
Clotho : Saving Programs from Malformed Strings and Incorrect
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Securing the Digital Enterprise
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Web Application Security 101
Exploration of gaps in Bitly's spam detection and relevant countermeasures
The future of interaction & its security challenges

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding

A Strategy for Addressing Cyber Security Challenges

  • 1. A  Strategy  for  Addressing  Cyber   Security  Challenges   Mustaque  Ahamad   Professor  of  Computer  Science,  Georgia  Ins>tute  of  Technology   Global  Professor  of  Engineering,  New  York  University  Abu  Dhabi   Co-­‐founder  and  Chief  Scien>st,  Pindrop  Security  
  • 2. A  Couple  of  Observa>ons   •  Cyber  security  has  become  an  extremely   important  problem  for  people,  businesses  and   governments.   •  Addressing  cyber  security  challenges  presents   serious  challenges.   •  Cyber  now  reaches  into  cri>cal  physical   systems.   •  Cyber  security  is  going  to  be  a  journey,  not  a   des>na>on.  
  • 3. Are  Things  Really  Bad?   •  Growing  sophis>ca>on  of  the  threat  landscape   –  Cyber  criminals,  hack>vits,  terrorists  and  na>on-­‐states   –  Cyber  crime  costs  are  reaching  half  a  trillion  dollars  (In   India,  0.21%  of  GDP,  McAfee  2014  Report)   –  Greatest  transfer  of  wealth  (Keith  Alexander,   hXp://foreignpolicy.com/2012/07/09/nsa-­‐chief-­‐cybercrime-­‐cons>tutes-­‐the-­‐greatest-­‐transfer-­‐of-­‐wealth-­‐in-­‐history/  )   •  Complex  technology  ecosystem   –  “Reflec>ons  on  trus>ng  trust”   •  People,  processes  and  coordina>on  across   mul>ple  stakeholders    
  • 4. Threats  +  Vulnerabili>es  =>  AXacks   •  Can  we  make  threats  go  away?   •  AXribu>on  is  extremely  difficult   •  Global  and  transna>onal   •  How  can  we  address  vulnerabili>es?   •  Security  errors  in  sofware  (over  1700  entries  in  NVD  in  last   3  months)   •  Asymmetry  –  aXackers  only  need  to  find  one  bug,  we  need   to  fix  all   •  People  are  weak  links   •  Only  higher  assurance,  no  perfect  security   –  Stronger  preven>on  and  early  detec>on   –   Faster  recovery  and  remedia>on  
  • 5. So,  What  Can  We  Do?   •  Educa>on   – Developing  the  “security  mindset”   – Undergraduate  and  graduate  programs   •  Research   – Rapidly  evolving  field   •  Policy,  legal  and  regula>on   – It  is  much  more  than  technology  
  • 6. Educa>ng  Cyber  Security  Professionals   •  US  Na>onal  Ini>a>ve  for  Cybersecurity   Educa>on  (NICE)  hXp://csrc.nist.gov/nice/framework/    
  • 7. Capacity  Building  for  Educa>ng  Cyber   Security  Professionals   •  What  do  we  do?   –  Undergraduate  or  graduate  programs?   –  Integra>ng  security  concepts  in  CS  curriculum?   –  Voca>onal  programs?   •   How  do  we  do  it?   –  So,  where  do  we  find  cyber  security  faculty?   –  Developing  hands  on  projects  and  laboratories   •  US  Response   –  Centers  of  Excellence  Program  (NSA/DHS)   –  Scholarship-­‐for-­‐Service  (SFS)  Program)   –  NSF  SaTC  Educa>on  Projects   •  Curriculum  development,  sharing,  workshops  etc.  
  • 8. Research  Capacity  Building   •  Evolving  threat  landscape  and  rapidly   changing  technologies   – Gelng  ahead  of  emerging  threats   – “Test  and  verify”  rather  than  “trust  but  verify”   •  Diverse  set  of  research  challenges   – Trustworthiness  of  technology  to  human   dimension   •  Real-­‐world  impact  of  research   – Tech  transfer  and  commercializa>on  
  • 9. Example  I:  Malware  Analysis   •  Scalable  malware  analysis  system   processes  approximately  250K   samples  a  day   •  Extrac>ng  features  from   communica>on  paXerns   •  Big  data  due  to  deep  packet   analysis  and  event  volume   •  Machine  learning  for  aXribu>on   •  Visualiza>on  and  ac>onable   intelligence               Mariposa  Botnet   Tracking  and  Takedown  
  • 10. Example  II:  Data-­‐Driven  Cyber  Risk   •  Collect  cyber  risk  relevant  data   from  mul>ple  sources   – Vulnerabili>es   – Exploit  kits  and  malware   – AXack  data  (public  and     private)   •  Analy>cs  and  visualiza>on   – Lean  back  and  lean  forward               Calendar  view  of     reported  vulnerabili>es  
  • 11. Na>onal  R&D  Strategy:  US  Example   •  Na>onal  Science  Founda>on  Secure  and  Trustworthy   (SaTC)   –  Launched  afer  developing  a  na>onal  strategy  ( hXps://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf)   –  Interdisciplinary  including  behavioral  and  economic  aspects   •  DHS,  DARPA  and  NSA  Ini>a>ves   –  Cri>cal  infrastructure  security  (CPS)   –  Resilient  and  transparent  compu>ng   –  Science  of  security   •  Networking  and  Informa>on  Technology  Research  and   Development  (NITRD)  Program   –  Coordinated  across  mul>ple  agencies   –  High  level  goal  is  to  maintain  US  technological  leadership  in  this   field  
  • 12. Cyber  Security  Policy   •  Policy  development  is  as  important  as  best   technical  safeguards   •  Should  companies  and  government  agencies   required  to  prac>ce  certain  level  of  cyber   hygiene?   •  Informa>on  sharing  and  coordina>on   •  Privacy   •  Legal  and  enforcement  issues  
  • 13. Lessons  Learned   •  Educa>on  capacity  building   – Aggressively  support  centers  like  CERC  IIIT  Delhi     – CS  curriculum  needs  to  be  augmented  with  cyber   security  offerings  at  all  levels   – “Educa>ng  the  educators”  –  summer  schools,   workshops  and  hosted  programs   – What  do  we  do  about  faculty?   •  Incen>ves  for  CS  faculty  members  to  shif/expand  their   research  into  cyber  security   •  Be  crea>ve  (professor  of  prac>ce,  global  professor  etc.)  
  • 14. Lessons  Learned  Contd.   •  Research  capacity  building   –  You  cannot  be  a  major  player  without  a  strong  research  base     •  How  many  papers  at  security  conferences  from  India?   –  Launch/seed  a  few  ambi>ous  (and  high  risk)  research  projects   like  NSF’s  fron>ers   –  Start/get  security  conferences  to  India  to  grow  the  community   –  Applied  research  exper>se   •  Cannot  only  rely  on  security  vendor  professionals  for  crisis  handling   •  CDC  for  cyber,  CERT  2.0?   –  Coordina>on  across  Na>onal  Labs,  DRDO??   –  Home  grown  cyber  security  companies??  
  • 15. Lessons  Learned  Contd.   •  Cyber  security  is  much  more  than  technology   – Policy,  regulatory  and  legal  dimensions   – Cyber  security  maturity  model  and  best  prac>ces   – Preparedness  assessment   – Conversa>ons  at  the  highest  level  (WEF  ini>a>ve)   – Informa>on  sharing,  coordina>on  and  mutual  aid   – Informal  trust  networks  
  • 16. Conclusions   •  Cyber  risk  ranks  among  the  top  global  risks   (2015  WEF  Global  risks  report)   •  Na>onal  response  is  of  cri>cal  importance   •  Need  to  move  at  “network  speed”   •  It  is  all  about  capacity  building   •  Ignore  research  at  your  own  peril