120 likes | 242 Views
Sea Air Space Information Dominance Rear Admiral Bob Day CG-6/CG CIO CG Cyber Commander April 9th, 2014. What Does The CG Outlook Vision Say?. Outlook 2023: technology will drive most change increased complexity of events will demand adaptable, integrated, and mobile solutions Vision:
E N D
Sea Air SpaceInformation Dominance Rear Admiral Bob DayCG-6/CG CIOCG Cyber CommanderApril 9th, 2014
What Does The CG Outlook Vision Say? • Outlook 2023: • technology will drive most change • increased complexity of events will demand adaptable, integrated, and mobile solutions • Vision: • integrate information, intelligence, and operations • tailor human resource systems • develop technical infrastructure and mature its Cyberspace presence • manage information systems and data as capital assets • manage knowledge to enhance mission accomplishment
What Are We Funding? • Unsustainable without injection of new funding. • Only 5% towards C4IT Replacements (Tech Refresh, life-cycle mgmt, end-of-life) • Forecast no funding for Replacements beginning FY16.
CG Cyber Mission Areas __________________________________________________
Importance of Cyber Security to Maritime Domain __________________________________________________ • 95% of all U.S. foreign trade through 361 ports • $800 billion/year in freight • $2 billion/day trade with Canada • 7,000 oceangoing vessels made 55,560 port calls annually • (Source MARAD & RITA)
Hackers Used to Facilitate Drug Smuggling By breaking into the offices of a harbor company, the criminals could install key-loggers to take control of computers MODUS OPERANDI Computers of container terminal were hacked so the containers that contained drugs could be monitored 1044 kilos cocaine/1099 kilos heroin By means of false papers and a hacked pin code, the drivers were able to pick up the container at a location and time of their choosing
Provide Decision Advantage __________________________________________________ • Leverage intelligence community (IC) and law enforcement (LE) authorities to understand adversaries intentions and capabilities in cyberspace • Capitalize on cyber and SIGINT capabilities • Exploit the cyber networks (communications, computers) of our adversaries • Drive tactical cyber intelligence to the front-line operator
Questions? __________________________________________________ ACT Achieving Cybersecurity Together “It’s our Shared Responsibility”.