Evolving a Cyberspace Doctrine
The Process
Michael E. Ruiz
CTO, Net-Enabled Operations
Deloitte Consulting LLP
April 16, 2010
Objective
Discuss the Evolution of Cyberspace
 Provide a Context for discussing Cyber Space
 Share some ideas on Cyber Warfare Doctrine

An appreciation of the complexity and emergence of
Cyberspace domain in Warfare
-2-

SATX - Evolving a Cyberspace Doctrine.pptx

 Present possible Cyberspace Operations Center for the Future
Background
The DoD and Intel communities have engaged in Cyberspace under the
auspice of Information Assurance and Network Security for at least three
decades.
 Security has to be more than policy
– Policy must be implementable
– Enforcement must be understood during policy definition

 Information Sharing requires trust; trust creates risk.
– We have been slow to adopt a posture of risk mitigation
– Risk avoidance is still a cultural mindset

 Cyber Operation is the emerging mission

The Enemy is within the Wire
-3-

SATX - Evolving a Cyberspace Doctrine.pptx

– The next war will have a significant cyber component
Components of Cyberspace

Cyber
Warfare

Cyber
Homeland
Security
Cyber Space

Cyber Law
Enforcement
Continuum of Cyber Security and Operations
Security
Engineering &
Integration

Cyber Security

Information
Assurance
Practices

Cyber Operation

Network Security
Operation
Centers
(NSOC)
-5-

Cyber Space
Operation
Centers
(CSOC)

Active

Passive

Security
Strategy

Non-Kinetic
Cyber Attack
Monitoring
Active
Action
Certification
Defense of
and
Cyber Assets
Accreditation

SATX - Evolving a Cyberspace Doctrine.pptx

Security
Architecture

Vulnerability
Remediation

Coordinated
Kinetic and Non-Kinetic
Action
Cyber Warfare Doctrine

Doctrine

Leadership

Organization

Personnel

Training

Facilities

-6-

SATX - Evolving a Cyberspace Doctrine.pptx

Materiel
Cyber Command and Control
Command and Control (C2) is “the exercise of
authority and direction by a properly designated
commander over assigned and attached forces
in the accomplishment of the mission...”
- The DoD Dictionary of Military and Associated Terms
Cyber Command and Control
 Gather Information Related to Cyber Threats and Vulnerabilities (Data
fusion)
 Analyze the cyber threats and vulnerabilities (Analytical Tools)
 Visualize the cyber threats and vulnerabilities (Shared Situational
Awareness)

 Disseminate cyber threats information and collaborate on the
information (Wiki and Web 2.0)
 Coordinate the response planning and execution (Remediation and
Operations Teams)

-9-

SATX - Evolving a Cyberspace Doctrine.pptx

 Interface with internal and external entities (public, private and open
source) to share and integrate information
- 10 -

SATX - Evolving a Cyberspace Doctrine.pptx

Cyber Command and Control Reference Model
Data/Information Sources

 Data Collection and Fusion Environment - Combination of real-time
data from cyber assets combined with historical data provides context for
evaluating threats

- 11 -

SATX - Evolving a Cyberspace Doctrine.pptx

 Interface with internal and external entities (public, private and open
source) to share and integrate information
- 12 -

SATX - Evolving a Cyberspace Doctrine.pptx

The Core of Cyberspace Operation Center
The Communities of Interest (COI)

- 13 -

SATX - Evolving a Cyberspace Doctrine.pptx

 Disseminate cyber threats information and collaborate on the
information
 Enterprise Service for Federated
Management and Cross Domain
Information Sharing

 Coordinate the response planning and
execution (Remediation and
Operations Teams)
- 14 -

SATX - Evolving a Cyberspace Doctrine.pptx

Federated Security Space Operations Centers
Conclusion
Asymmetric, highly decentralized organization are impossible to stop with
centralized approaches.
Creating an environment for spontaneity is crucial to enabling highly
centralized organization to act and operate as decentralized forces.
Technology is not the solution it is an enabler … the solution requires a
blend of People, Process, and Technology working to a common goal.
 De-incentivize our adversary
 Train the work force
 Create Tactics, Techniques, and Procedure to wage and protect the Cyber
domain

- 15 -

SATX - Evolving a Cyberspace Doctrine.pptx

 Allow flexibility and agility in creating capability.
Copyright © 2009 Deloitte Development LLC. All rights reserved.

More Related Content

PDF
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
PDF
IT Solutions for 3 Common Small Business Problems
PDF
Cybersecurity and the Role of Converged Infrastructure June 2016
PPTX
Encryption Algorithms for Cloud
PDF
PDF
Securing The Journey To The Cloud
PDF
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PDF
Cybersecurity Summit AHR20 NIST framework Cimetrics
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
IT Solutions for 3 Common Small Business Problems
Cybersecurity and the Role of Converged Infrastructure June 2016
Encryption Algorithms for Cloud
Securing The Journey To The Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
Cybersecurity Summit AHR20 NIST framework Cimetrics

What's hot (19)

PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Personal & Trusted cloud
DOCX
Fire col a collaborative protection network
PDF
Top Ten Challenges of Securing Smart Infrastructure
PDF
Limitless xdr meetup
PDF
A study on_security_and_privacy_issues_o
PDF
Security in the cloud planning guide
PPTX
Top Cited Papers - International Journal of Network Security & Its Applicatio...
PPTX
How is ai important to the future of cyber security
PPTX
Security Architecture and Design - CISSP
PPTX
Top Cited Papers - International Journal of Network Security & Its Applicatio...
PPTX
Towards a Digital teammate to support sensemaking in Cyber Security teams
PPTX
CRTC Cloud- Michael Sandberg
PDF
Iaetsd secure data storage against attacks in cloud
PDF
Phil Carter of IDC: An analyst point of view
PDF
7. Big data proposal to go lean in public
PPTX
Cloud computing security- critical infrastructures
PPT
Security architecture analyses brief 21 april 2015
PDF
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Personal & Trusted cloud
Fire col a collaborative protection network
Top Ten Challenges of Securing Smart Infrastructure
Limitless xdr meetup
A study on_security_and_privacy_issues_o
Security in the cloud planning guide
Top Cited Papers - International Journal of Network Security & Its Applicatio...
How is ai important to the future of cyber security
Security Architecture and Design - CISSP
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Towards a Digital teammate to support sensemaking in Cyber Security teams
CRTC Cloud- Michael Sandberg
Iaetsd secure data storage against attacks in cloud
Phil Carter of IDC: An analyst point of view
7. Big data proposal to go lean in public
Cloud computing security- critical infrastructures
Security architecture analyses brief 21 april 2015
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Ad

Similar to Evolving a Cyber Space Doctrine (20)

PPTX
PDF
Supply Chain Network Design Essay
PDF
Mashup ecosystem globecom
PDF
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
PDF
Open Source Platforms Integration for the Development of an Architecture of C...
PPTX
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
PPTX
Cloud Computing : Top to Bottom
PDF
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
PDF
Nat'l Defense Univ: Lessons Learned in CLoud Computing
PDF
Vol12_No2
PDF
NCOIC GCC OWS-10 presentation 10 7 2013
PDF
Cloud Testbeds for Standards Development and Innovation
PDF
Cloud Expo 2010 Cloud Computing in DoD
PDF
The Security Of Cloud Computing
PDF
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
PDF
It auditing to assure a secure cloud computing
DOC
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
PPTX
Research data management 1.5
PPT
Sbrc 2014 Painel SDN
PPTX
Cloud_ Storage_Security_Using_Blockchain.pptx
Supply Chain Network Design Essay
Mashup ecosystem globecom
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Open Source Platforms Integration for the Development of an Architecture of C...
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain...
Cloud Computing : Top to Bottom
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Vol12_No2
NCOIC GCC OWS-10 presentation 10 7 2013
Cloud Testbeds for Standards Development and Innovation
Cloud Expo 2010 Cloud Computing in DoD
The Security Of Cloud Computing
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
It auditing to assure a secure cloud computing
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Research data management 1.5
Sbrc 2014 Painel SDN
Cloud_ Storage_Security_Using_Blockchain.pptx
Ad

Recently uploaded (20)

PDF
CloudStack 4.21: First Look Webinar slides
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
Chapter 5: Probability Theory and Statistics
PDF
WOOl fibre morphology and structure.pdf for textiles
PPT
Geologic Time for studying geology for geologist
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
August Patch Tuesday
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
The various Industrial Revolutions .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Five Habits of High-Impact Board Members
CloudStack 4.21: First Look Webinar slides
Univ-Connecticut-ChatGPT-Presentaion.pdf
Modernising the Digital Integration Hub
Chapter 5: Probability Theory and Statistics
WOOl fibre morphology and structure.pdf for textiles
Geologic Time for studying geology for geologist
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DP Operators-handbook-extract for the Mautical Institute
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
August Patch Tuesday
A comparative study of natural language inference in Swahili using monolingua...
NewMind AI Weekly Chronicles – August ’25 Week III
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
STKI Israel Market Study 2025 version august
Taming the Chaos: How to Turn Unstructured Data into Decisions
The various Industrial Revolutions .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Getting Started with Data Integration: FME Form 101
Five Habits of High-Impact Board Members

Evolving a Cyber Space Doctrine

  • 1. Evolving a Cyberspace Doctrine The Process Michael E. Ruiz CTO, Net-Enabled Operations Deloitte Consulting LLP April 16, 2010
  • 2. Objective Discuss the Evolution of Cyberspace  Provide a Context for discussing Cyber Space  Share some ideas on Cyber Warfare Doctrine An appreciation of the complexity and emergence of Cyberspace domain in Warfare -2- SATX - Evolving a Cyberspace Doctrine.pptx  Present possible Cyberspace Operations Center for the Future
  • 3. Background The DoD and Intel communities have engaged in Cyberspace under the auspice of Information Assurance and Network Security for at least three decades.  Security has to be more than policy – Policy must be implementable – Enforcement must be understood during policy definition  Information Sharing requires trust; trust creates risk. – We have been slow to adopt a posture of risk mitigation – Risk avoidance is still a cultural mindset  Cyber Operation is the emerging mission The Enemy is within the Wire -3- SATX - Evolving a Cyberspace Doctrine.pptx – The next war will have a significant cyber component
  • 5. Continuum of Cyber Security and Operations Security Engineering & Integration Cyber Security Information Assurance Practices Cyber Operation Network Security Operation Centers (NSOC) -5- Cyber Space Operation Centers (CSOC) Active Passive Security Strategy Non-Kinetic Cyber Attack Monitoring Active Action Certification Defense of and Cyber Assets Accreditation SATX - Evolving a Cyberspace Doctrine.pptx Security Architecture Vulnerability Remediation Coordinated Kinetic and Non-Kinetic Action
  • 8. Command and Control (C2) is “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission...” - The DoD Dictionary of Military and Associated Terms
  • 9. Cyber Command and Control  Gather Information Related to Cyber Threats and Vulnerabilities (Data fusion)  Analyze the cyber threats and vulnerabilities (Analytical Tools)  Visualize the cyber threats and vulnerabilities (Shared Situational Awareness)  Disseminate cyber threats information and collaborate on the information (Wiki and Web 2.0)  Coordinate the response planning and execution (Remediation and Operations Teams) -9- SATX - Evolving a Cyberspace Doctrine.pptx  Interface with internal and external entities (public, private and open source) to share and integrate information
  • 10. - 10 - SATX - Evolving a Cyberspace Doctrine.pptx Cyber Command and Control Reference Model
  • 11. Data/Information Sources  Data Collection and Fusion Environment - Combination of real-time data from cyber assets combined with historical data provides context for evaluating threats - 11 - SATX - Evolving a Cyberspace Doctrine.pptx  Interface with internal and external entities (public, private and open source) to share and integrate information
  • 12. - 12 - SATX - Evolving a Cyberspace Doctrine.pptx The Core of Cyberspace Operation Center
  • 13. The Communities of Interest (COI) - 13 - SATX - Evolving a Cyberspace Doctrine.pptx  Disseminate cyber threats information and collaborate on the information
  • 14.  Enterprise Service for Federated Management and Cross Domain Information Sharing  Coordinate the response planning and execution (Remediation and Operations Teams) - 14 - SATX - Evolving a Cyberspace Doctrine.pptx Federated Security Space Operations Centers
  • 15. Conclusion Asymmetric, highly decentralized organization are impossible to stop with centralized approaches. Creating an environment for spontaneity is crucial to enabling highly centralized organization to act and operate as decentralized forces. Technology is not the solution it is an enabler … the solution requires a blend of People, Process, and Technology working to a common goal.  De-incentivize our adversary  Train the work force  Create Tactics, Techniques, and Procedure to wage and protect the Cyber domain - 15 - SATX - Evolving a Cyberspace Doctrine.pptx  Allow flexibility and agility in creating capability.
  • 16. Copyright © 2009 Deloitte Development LLC. All rights reserved.

Editor's Notes

  • #7: Doctrine –addresses the much needed Tactics, Techniques and Procedures (TTPs) for operating in a cyber realm.Cyber ISR techniques are needed – today we focus on protection of our networks tomorrow we need to understand how our enemies will use there networkCyber C2 Procedures are required – What threats require remediation in the form of patch? And What threats require operations in the form of an MP going to a desk or covert operative being tasked to find out more about a particular organization or group?What does the Cyber Kill Chain look like? When are our actions an act of war and when are the a protective posture?Friedman in his Book “The Next Hundred Years” asserts that Russia will take defensive measure - creating buffer around its border to protect itself from encroaching Europeans. These actions will appear aggressive to some.Estonia Cyber war in April 2007 – mostly Do's Attacks and Botnet spam attacksGeorgia Takes a Beating in the Cyber war With Russia - By JOHN MARKOFF - the New York Times – August 11, 2008Organization – defines the organizational structures needed to successfully implement a cyber warfare organization, specifically the work BearingPoint is doing for the Army G2 for cyber operations.The Creation of Cyber Command – a unified command to address Cyber ChallengesThe Creation of the 24th Air Force – a numbered Air Force dedicated to working on Cyber ChallengesThe Creation of the Army Cyber DirectorateThe Navy reorganization – combining the N2/N6 and designating new cyber authorities.Training – how we train our troops … what are we teaching in the school house and is it the right thingBefore we can start training we have to establish DoctrineContinuous improvement is needed to ensure we are training correctly – new ways of updating the school house will be needed as this domain changes so rapidlyMateriel – describes a reference model / implementation pattern for implementing future cyber command and control systems.Personnel – how do we motivate a workforce that is counter to all military honors and traditions to join the Cyber Warfare machineHuge cultural challenges await.The Story of our EVP and our Cyber GuysFacilities – illustrates the types of facilities (i.e. Network Operation Centers, Security Operation Centers, and Cyber Space Operation Centers) and the processes for federating across agency / organizational boundaries.
  • #14: Messaging Web ApplicationsProtection BoundariesPhysical SecurityTelecommunication NetworksAccess Control