SlideShare a Scribd company logo
Understanding Technology Stakeholders:
Their Progress and Challenges
John M. Gilligan
www.gilligangroupinc.com
Software Assurance Forum
November 4, 2009
Topics
• Historical Perspectives
• Cyber Security Threats--A National Crisis
• Cyber Security Commission Recommendations
• Near Term Opportunities
• Longer-Term Game Changing Initiatives
• Closing Thoughts
2
Historical Perspectives
• Internet, software industry, (personal) computers
—rooted in creativity not engineering
• Security in the Cold War Era
– Security “Gurus”—Keepers of the Kingdom
• The World Wide Web changes the security
landscape-- forever
• Post Cold War: The Age of Information Sharing
3Legacy of the past is now our “Achilles Heel”
Cyber Security Threats Today—
A New “Ball Game”
• Our way of life depends on a reliable cyberspace
• Intellectual property is being downloaded at an
alarming rate
• Cyberspace is now a warfare domain
• Attacks increasing at an exponential rate
• Fundamental network and system vulnerabilities
cannot be fixed quickly
• Entire industries exist to “Band Aid” over
engineering and operational
Cyber Security is a National Security Crisis! 4
Commission Cyber Security for the 44th
Presidency:
Key Recommendations
• Create a comprehensive national security
strategy for cyberspace
• Lead from the White House
• Reinvent public-private partnerships
• Regulate cyberspace
• Modernize authorities
• Leverage government procurement (Supply
Chain Risk Management)
• Build on recent progress with CNCI
(comprehensive national cyber-security
initiative) 5
Use Government IT Procurement
• Cyber security needs to be reflected in our
contractual requirements
• Many “locked down” configuration defined
• Use government-industry partnership to
accelerate implementation of secure
configurations
• Get started now, improve configuration
guidelines over time and leverage SCAP!
6
Build on FDCC Successes and Lessons Learned
Longer-Term: IT Reliably Enabling Economy
• Change the dialogue: Reliable, resilient IT is
fundamental to future National Security and
Economic Growth
• New business model for software industry
• Redesign the Internet
• Get the “man out of the loop”—use automated
tools (e.g., SCAP)
• Develop professional cyberspace workforce
• Foster new IT services models
Need to Fundamentally “Change the Game” to Make Progress7
Security Content Automation Protocol (SCAP)
• What is it: A set of open standards that allows
for the monitoring, positive control, and reporting
of security posture of every device in a network.
• How is it implemented: Commercial products
implement SCAP protocols to exchange and
enforce configuration, security policy, and
vulnerability information.
• Where is it going: Extensions in development to
address software design weaknesses, attack
patterns, and malware attributes.
8
SCAP Enables Automated Tools To Implement And Enforce Secure Operations
Consensus Audit Guide (CAG)
• What is it: 20 key actions (called security
“controls”) that organizations must take if they
hope to block or mitigate top known attacks.
• How is it implemented: (Mostly) automated
means used to implement and continuously
enforce/monitor controls.
Consensus Audit Guidelines permits organizations to prioritize
security implementation and continuously enforce controls
9
Summary of Ideas for this Technology Working Group
• How do we make measurable progress in
improving security?
• How do we assess the effectiveness of
security tools?
• How do we change the software industry to
produce reliable and secure products?
It is time to get off the treadmill and start making
measurable progress in securing our systems! 10
Closing Thoughts
• Government and Industry need to treat cyber security as
an urgent priority
• Near-term actions important but need to fundamentally
change the game to get ahead of threat
• IT community needs to reorient the dialogue on cyber
security—the objective is reliable and resilient
information
• Cyber Security in DoD is more mature—but still woefully
inadequate
11Cyber Security is Fundamentally a Leadership Issue!
Contact Information
jgilligan@gilligangroupinc.com
www.gilligangroupinc.com
John M. Gilligan
12

More Related Content

PPT
Understanding Technology Stakeholders: Their Progress and Challenges
PPTX
Cyber Security: Past and Future
PPTX
Cyber Security: Past and Future
PPTX
Cyber Security: Threats and Needed Actions
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
PDF
Next-Generation SIEM: Delivered from the Cloud
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
PPTX
Building a Hacker Resistant Network
Understanding Technology Stakeholders: Their Progress and Challenges
Cyber Security: Past and Future
Cyber Security: Past and Future
Cyber Security: Threats and Needed Actions
Cybersecurity: Challenges, Initiatives, and Best Practices
Next-Generation SIEM: Delivered from the Cloud
Security challenges in d2d communication by ajithkumar vyasarao
Building a Hacker Resistant Network

What's hot (19)

PDF
Cybersecurity Summit AHR20 Protect Cimetrics
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PPT
Intro to Security
PPTX
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
PPTX
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
PPT
Commercial And Government Cyberwarfare
PPTX
The privacy and security implications of AI, big data and predictive analytics
PPTX
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
PPTX
NTXISSACSC2 - The Evolving DMZ by John Fehan
PDF
Cybersecurity Summit 2020 Slide Deck
PPT
Chapter 1 Presentation
PDF
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
PPTX
Technology: Built for Attack : Dr. Emma Garrison-Alexander
PDF
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
PPTX
What's New In CompTIA Security+ - Course Technology Computing Conference
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
PPT
Chapter 9 PowerPoint
Cybersecurity Summit AHR20 Protect Cimetrics
Information Assurance And Security - Chapter 1 - Lesson 3
Intro to Security
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
Commercial And Government Cyberwarfare
The privacy and security implications of AI, big data and predictive analytics
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
NTXISSACSC2 - The Evolving DMZ by John Fehan
Cybersecurity Summit 2020 Slide Deck
Chapter 1 Presentation
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Technology: Built for Attack : Dr. Emma Garrison-Alexander
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
What's New In CompTIA Security+ - Course Technology Computing Conference
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Chapter 9 PowerPoint
Ad

Similar to Understanding Technology Stakeholders (20)

PPTX
Cyber Security: Threats and Needed Actions
PDF
Embedded Systems Security
PPTX
Lecture 3 Country Specific Strategy.pptx
PPTX
Federal Cybersecurity: The latest challenges, initiatives and best practices
PDF
Soc analyst course content
PDF
Soc analyst course content v3
PPTX
Keynote Information Security days Luxembourg 2015
PPT
CyberCrime in the Cloud and How to defend Yourself
PPT
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
PPTX
Leveraging Federal Procurement to Improve Cyber Security
PPT
Lecture 4 presentation of cyber security
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Cyber Crimes: The next five years.
PPTX
2016 to 2021
KEY
Application Security Done Right
PPTX
CRI Cyber Board Briefing
PDF
ICION 2016 - Cyber Security Governance
PDF
Vulnerability Management: A Comprehensive Overview
PPTX
More practical insights on the 20 critical controls
PPTX
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Cyber Security: Threats and Needed Actions
Embedded Systems Security
Lecture 3 Country Specific Strategy.pptx
Federal Cybersecurity: The latest challenges, initiatives and best practices
Soc analyst course content
Soc analyst course content v3
Keynote Information Security days Luxembourg 2015
CyberCrime in the Cloud and How to defend Yourself
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Federal Procurement to Improve Cyber Security
Lecture 4 presentation of cyber security
Today's Cyber Challenges: Methodology to Secure Your Business
Cyber Crimes: The next five years.
2016 to 2021
Application Security Done Right
CRI Cyber Board Briefing
ICION 2016 - Cyber Security Governance
Vulnerability Management: A Comprehensive Overview
More practical insights on the 20 critical controls
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Ad

More from John Gilligan (6)

PPTX
Automating Enterprise IT Management
PPTX
Solving the CIO’s Cybersecurity Dilemma
PPT
Ensuring Effective Security The CIOs Dilemma 11 17 08
PPT
Cyber Security - the 21st Century Domain
PPT
Consensus Audit Guidelines 2008
PPT
Security In The Supply Chain
Automating Enterprise IT Management
Solving the CIO’s Cybersecurity Dilemma
Ensuring Effective Security The CIOs Dilemma 11 17 08
Cyber Security - the 21st Century Domain
Consensus Audit Guidelines 2008
Security In The Supply Chain

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
A Presentation on Touch Screen Technology
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Hybrid model detection and classification of lung cancer
A Presentation on Touch Screen Technology
A comparative study of natural language inference in Swahili using monolingua...
Tartificialntelligence_presentation.pptx
1. Introduction to Computer Programming.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Web App vs Mobile App What Should You Build First.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation theory and applications.pdf
Zenith AI: Advanced Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
WOOl fibre morphology and structure.pdf for textiles
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Group 1 Presentation -Planning and Decision Making .pptx
A novel scalable deep ensemble learning framework for big data classification...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Understanding Technology Stakeholders

  • 1. Understanding Technology Stakeholders: Their Progress and Challenges John M. Gilligan www.gilligangroupinc.com Software Assurance Forum November 4, 2009
  • 2. Topics • Historical Perspectives • Cyber Security Threats--A National Crisis • Cyber Security Commission Recommendations • Near Term Opportunities • Longer-Term Game Changing Initiatives • Closing Thoughts 2
  • 3. Historical Perspectives • Internet, software industry, (personal) computers —rooted in creativity not engineering • Security in the Cold War Era – Security “Gurus”—Keepers of the Kingdom • The World Wide Web changes the security landscape-- forever • Post Cold War: The Age of Information Sharing 3Legacy of the past is now our “Achilles Heel”
  • 4. Cyber Security Threats Today— A New “Ball Game” • Our way of life depends on a reliable cyberspace • Intellectual property is being downloaded at an alarming rate • Cyberspace is now a warfare domain • Attacks increasing at an exponential rate • Fundamental network and system vulnerabilities cannot be fixed quickly • Entire industries exist to “Band Aid” over engineering and operational Cyber Security is a National Security Crisis! 4
  • 5. Commission Cyber Security for the 44th Presidency: Key Recommendations • Create a comprehensive national security strategy for cyberspace • Lead from the White House • Reinvent public-private partnerships • Regulate cyberspace • Modernize authorities • Leverage government procurement (Supply Chain Risk Management) • Build on recent progress with CNCI (comprehensive national cyber-security initiative) 5
  • 6. Use Government IT Procurement • Cyber security needs to be reflected in our contractual requirements • Many “locked down” configuration defined • Use government-industry partnership to accelerate implementation of secure configurations • Get started now, improve configuration guidelines over time and leverage SCAP! 6 Build on FDCC Successes and Lessons Learned
  • 7. Longer-Term: IT Reliably Enabling Economy • Change the dialogue: Reliable, resilient IT is fundamental to future National Security and Economic Growth • New business model for software industry • Redesign the Internet • Get the “man out of the loop”—use automated tools (e.g., SCAP) • Develop professional cyberspace workforce • Foster new IT services models Need to Fundamentally “Change the Game” to Make Progress7
  • 8. Security Content Automation Protocol (SCAP) • What is it: A set of open standards that allows for the monitoring, positive control, and reporting of security posture of every device in a network. • How is it implemented: Commercial products implement SCAP protocols to exchange and enforce configuration, security policy, and vulnerability information. • Where is it going: Extensions in development to address software design weaknesses, attack patterns, and malware attributes. 8 SCAP Enables Automated Tools To Implement And Enforce Secure Operations
  • 9. Consensus Audit Guide (CAG) • What is it: 20 key actions (called security “controls”) that organizations must take if they hope to block or mitigate top known attacks. • How is it implemented: (Mostly) automated means used to implement and continuously enforce/monitor controls. Consensus Audit Guidelines permits organizations to prioritize security implementation and continuously enforce controls 9
  • 10. Summary of Ideas for this Technology Working Group • How do we make measurable progress in improving security? • How do we assess the effectiveness of security tools? • How do we change the software industry to produce reliable and secure products? It is time to get off the treadmill and start making measurable progress in securing our systems! 10
  • 11. Closing Thoughts • Government and Industry need to treat cyber security as an urgent priority • Near-term actions important but need to fundamentally change the game to get ahead of threat • IT community needs to reorient the dialogue on cyber security—the objective is reliable and resilient information • Cyber Security in DoD is more mature—but still woefully inadequate 11Cyber Security is Fundamentally a Leadership Issue!