1 / 19

November 28 th , 8:30-9:30am GRB Room 310C Technology Convergence Panel: Cybersecurity

November 28 th , 8:30-9:30am GRB Room 310C Technology Convergence Panel: Cybersecurity Sponsored by:. Technology Convergence Panel CyberSecurity. Don Pedersen Director, Technology Development Airbus Defense and Space ( https://www.airbusdshouston.com ) Holly Rollins

hmurphy
Download Presentation

November 28 th , 8:30-9:30am GRB Room 310C Technology Convergence Panel: Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. November 28th, 8:30-9:30am GRB Room 310C Technology Convergence Panel: Cybersecurity Sponsored by:

  2. Technology Convergence PanelCyberSecurity • Don Pedersen • Director, Technology Development • Airbus Defense and Space ( https://www.airbusdshouston.com ) • Holly Rollins • Principal Director, Booz Allen Hamilton ( https://www.bah.com ) • Experience: • Lance Smith  • CEO, Cyphre Security Solutions • RigNet ( http://www.rig.net )

  3. Technology Convergence PanelCyberSecurity “CyberSecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.” TechTarget, 2016

  4. Technology Convergence PanelCyberSecurity • In our world of Cloud infrastructures and services, Mobile devices and apps with internet connectivity and with AI (machine learning), CyberSecurity has grown into a critical knowledge base and skill for IT professionals. • With the growing use of contract labor actively managing user accounts and access to business resources is a necessary practice for a good security posture. • Ensure ex-employees accounts are disabled everywhere. • The growing use of IOT devices in our infrastructures drives IT resources to constantly monitor for internet connections and data transfer when these devices “phone home” for updates. • Even some COTS (Commercial Off The Shelf) managed 4-8 port network switches attempt to make connections if you don’t block them from the inside. • Training of IT personnel will lead to an IT staff that thinks Cyber Defensive.

  5. SESSION LEARNING OBJECTIVES • Threat Awareness and Exposure • What are we exposing and what threats are out there? • Internal and External Testing • Protecting from the inside and guarding from the outside • Cyber Security Products and Services • Leveraging Free and Enterprise-level Services and Products • Security and Your Products • Protecting client data within your own products • ITAR and Export Controlled Data • Good documentation and disciplined data transfer training

  6. SESSION LEARNING OBJECTIVES • Threat Awareness and Exposure • What are we exposing and what threats are out there? • Internal and External Testing • Protecting from the inside and guarding from the outside • Cyber Security Products and Services • Leveraging Free and Enterprise-level Services and Products • ITAR and Export Controlled Data • Good documentation and disciplined data transfer training

  7. Threat Awareness and Exposure • Keep your software products and defenses up-to-date. • Apply patches to systems that can be updated • Isolate systems that can’t be patched with a network switch + firewall • IT personnel should limit the exposure of externally accessible IPs and ports in your infrastructure to protect from outside attacks.

  8. Threat Awareness and Exposure • Carefully inspect and test all introduced software apps in a sandboxedenvironment before deploying enterprise-wide. • Some simple desktop tools that people love to use connect to foreign countries and send out data. • Stay up-to-date with the latest threats and take preventative measures.

  9. SESSION LEARNING OBJECTIVES • Threat Awareness and Exposure • What are we exposing and what threats are out there? • Internal and External Testing • Protecting from the inside and guarding from the outside • Cyber Security Products and Services • Leveraging Free and Enterprise-level Services and Products • ITAR and Export Controlled Data • Good documentation and disciplined data transfer training

  10. Internal and External Testing • Regularly review routing and iptables rules internally. • Utilize a sandbox environment for testing apps and monitor their behavior before deploying. • Take advantage of local university resources for a cost-effective way to test your network from an independent perspective. • Helps the university students by building practical experience and tests your defense with an independent view of your network responses.

  11. Internal and External Testing • Enterprise-level products should be used whenever possible for proactive internal scanning and monitoring of resources and connections • Enterprise-level products should have the latest

  12. SESSION LEARNING OBJECTIVES • Threat Awareness and Exposure • What are we exposing and what threats are out there? • Internal and External Testing • Protecting from the inside and guarding from the outside • Cyber Security Products and Services • Leveraging Free and Enterprise-level Services and Products • ITAR and Export Controlled Data • Good documentation and disciplined data transfer training

  13. Cyber Security Products and Services • Enterprise products are supported and have measures in place to deal with the latest threats. • Spending $ on Enterprise-level products and support is worth the expense. • Evaluate Enterprise products carefully and make the best choice for your company and security needs. • Supplement your exposure testing with government provided DHS NCATS services. • Free services for those that register. • National Cybersecurity Assessments and Technical Services (NCATS) https://www.us-cert.gov/resources/ncats

  14. Cyber Security Products and Services • Network and IT infrastructure hardware • Upgrade your hardware network-related products to ensure that each of your products is supported and updates are possible. • Keep an eye on the latest trends and monitor for possible inclusion into your framework. • There are a lot of great new emerging services related to secure transmission, encryption techniques, authentication and so on. • Use these services if it solves a problem and adds value to your security posture. • Evaluate these services and make sure that they fit your needs and complements your infrastructure.

  15. SESSION LEARNING OBJECTIVES • Threat Awareness and Exposure • What are we exposing and what threats are out there? • Internal and External Testing • Protecting from the inside and guarding from the outside • Cyber Security Products and Services • Leveraging Free and Enterprise-level Services and Products • ITAR and Export Controlled Data • Good documentation and disciplined data transfer training

  16. ITAR and Export Controlled Data • Today most businesses interface with the global marketplace. • When your business is involved in DoD contracts or interfacing and exchanging certain types of data or discussing design with foreign entities: • Your workforce needs to be trained to recognize export-controlled technologies and technical data, and be equipped with the know-how and tools to comply with ITAR, EAR and DoD requirements, as well as industry best practices, for safeguarding sensitive information and combating cyber threats

  17. ITAR and Export Controlled Data • Secure your data, log all access to sensitive data, control access to physical locations of stored data and drawings. • Log all e-mail exchanges and physically store all exchanges in file cabinets. • Export control violations and fines can be very costly. • Ensure your CyberSecurity plan involves measures to deal with ITAR and Export Controlled data.

  18. QUESTIONS?THANK YOU

More Related