Click a block to view session details
U.S. Cyber Command's (USCYBERCOM) responsibilities include providing mission assurance for the Department of Defense by directing the operation and defense of the Department Information systems (what we call the DoDIN); deterring or defeating strategic threats to national interests and infrastructure; and helping the combatant commanders achieve their missions in and through cyberspace. Put plainly, USCYBERCOM's job is to defend the nation in cyberspace, working with government partners, like the Department of Homeland Security and the Federal Bureau of Investigation, and through them with the cybersecurity industry and private sector in a whole-of-nation effort. What is the threat? For context, think about where our nation has been over the past 5-10 years, we've seen adversaries that have been able to come into our networks, steal our intellectual property, conduct attacks in cyber space. And there had been minimal response. So, what has changed over the past year is the idea that, as a nation, we have to have a more proactive, forward-leaning approach to defense-of-our nation in cyber space. In the face of these threats, the Department of Defense has adjusted its strategic vision to one of defending forward through the persistent engagement methodology with a persistence force (no longer being reactive only). With this idea of persistent engagement, the government must fulfill two key roles continuously. First, it must better partner and enable public, private, and allied efforts to build resiliency, to close vulnerabilities, and to defend networks, data and critical infrastructure. Second, it must act to identify and counter threats as they develop, not solely in response after the fact. USCYBERCOM's (and the NSA's) work on information sharing with our DHS and FBI partners leading up to the mid-term elections that took place late Summer and Fall, safely and securely, is a perfect example.
Jim Christy, Special Agent (Ret)
Retired Special Agent Jim Christy will discuss first-hand cyber crime investigations and digital forensic watershed cases to include homicide (cutup diskette), espionage, cyber intrusions (Hanover Hacker Case), child pornography, and his participation in his current cold case investigation of D.B. Cooper, the only unsolved skyjacking in American history (1971).
He will discuss the power of digital forensics today and the real-world challenges, including a discussion of the need for education and training. The evolving discipline of cyber crime investigations and the critical role cyber crime investigators and digital forensics examiners play in all crimes today.
The recent explosion of data and cloud centric solutions is causing a shift in the way that many government agencies are having to operate. Legacy technology, procedures and mindsets are no longer able to keep up with the large amounts of workloads that are generated on a daily basis. The way we monitor, detect and respond to that data has to change.
In this interactive discussion, George Gerchow, CSO at Sumo Logic, will discuss how the NRC can address the issues of the ever-changing landscape including:
· How "Big Data" and cloud computing has changed and what it means for your environment and daily productivity
· The new skills that agencies will need for success in the cloud that directly correlate with the NRC's mission of protecting public health, safety and the environment
· A training roadmap to help IT professionals acquire new skills
· An understanding of how this landscape can produce new threats that have a major impact on cyber security
· Automated ways of incident detection and response as well as the tools needed to be able to properly monitor facilities located in hybrid environments
Federal Business Council, Inc.
All rights reserved.