Title: CYBER DEFENSE
1CYBER DEFENSE
2Cyber security
Our technological advantage is a key . But our
defense and military networks are under constant
attack. .... Indeed, in today's world, acts of
terror could come not only from a few extremists
but from a few key strokes on the computer -- a
weapon of mass disruption. ... it's now clear
that this cyber threat is one of the most serious
economic and national security challenges we face
as a nation.
- President Barack Obama,
- May 29, 2009
3Public Value national security
PUBLIC VALUE IN NATIONAL SECURITY CYBERSECURITY
ULTIMATE BUSINESS GOAL
EXECUTIVE KPI(Direction) CORE FINANCIAL
KPI(Direction)
TRUST
INFORMATION ASSURANCE
EFFICIENCY ---------------
OUTCOMES ---------
- Citizens Trust
- Privacy
- Civil Liberties
- Protection / Security
- Govt Transparency
- Strengthen Security and Resilience at Home
- Secure Cyberspace
- Critical Infrastructure Protection
- Services delivered quickly
- Agencies operate within budgets
- Leverage Technology
- Incidents / Attacks Prevented
- Infrastructure Protection
- Access to Services
- Coordinate with Emergency Mgt., Public Safety /
Justice Agencies
Capital Investment Management
Budget, Labor, Operating Cost Management
BUSINESSINITIATIVES(Strategy/Priority Language)
Develop Intelligence Capabilities
Reduce Network Intrusions/ Internet Crime
Improve Incident Response
Increase IT Efficiency and Effectiveness
OPERATING KPIs--------------------------------PR
OCESS/FUNCTION
Reduce Network Attacks / Internet Crime
Rates Risk Assessments / Awareness _______________
Forensics / Law Enforcement
Improve Incident Response ______________ Detecti
on, Response, Recovery
Reduce IT Operating Costs ______________ Budget,
Capital, HR, Procurement, Training
Prevent Critical System Intrusions __________ Cybe
r Security Intelligence
HP SOLUTION Cybersecurity
Business Continuity / Recovery
Identity / Access Management
Network / Datacenter Security
Security Operations
Risk Management / Compliance
Application / Data Security
4The Threat
- Military, Intelligence, Homeland Security
- Federal, state, local and tribal governments
- Businesses Consumers
- Nation states
- Ideological Movements
- Organized Criminal Elements
- Fame Seekers
- Industry Competitors
- Insiders
- Merely Curious
- Economic security
- National security
- Competitive Advantage
- Public safety
- Personal Information, intellectual property,
privacy - Critical infrastructure (e.g. power grids,
transportation)
5HP Security Services
Cyber Dominance
Mission Integration
Situational Awareness
Cyber Control to Achieve Mission
Cyber/Network Analytics Prediction
Informed Decision Making
6Comprehensive Cyber Security services portfolio
- Proven integrated building blocks
Application Security Services for testing applications (including vulnerability assessment and penetration testing) and for building security and privacy controls into applications
Data Content Security Services for data encryption, key management, data loss prevention, secure e-mail, and web content filtering
End Point Security Services including anti-virus, anti-spyware, mobile device security, and host intrusion detection prevention
Network Security Services for protecting the network, including firewalls, wireless security, remote access, network access control, etc.
Data Center Security Security services for servers, storage, virtualization, and cloud computing
Risk Management Compliance Services to train clients in security policies and procedures, to measure and manage risk, to define appropriate security controls and governance, and to achieve and sustain compliance
Security Operations Services for managing security events including log management, security incident response, reporting and root cause analysis
Business Continuity Recovery Services for ensuring the continuity of IT-based business processes
Identity Access Management Services for establishing authentication and authorization of user access to business assets
Research Development Working with clients to develop next generation approaches to cyber security.
Research Development
7HP Security Services Portfolio
- End Point Threat Mgmt (AV, AS, HIDS, Personal
F/W) - End Point Application Device Control
- Host Intrusion Detection Prevention Services
- Mobile Device Security
- Application Penetration Testing
- Application and Code Testing/Scanning
- Web Application Security Assessments
- Web Application Penetration Testing
- Web Application Firewalls
- SOA Security
- SAP Security
- Middleware Mainframe Security
- Midrange/Server Security
- Network Intrusion Detection Prevention Services
- Adaptive Network Architecture
- Managed Firewall
- VPN, UTM
- Network Access Control
- Wireless Security
- Managed Proxy / Cache / Filtering
- Web Content Filtering
- Email Security
- Disk/File Encryption
- Database Security
- Data Loss Prevention
- Enterprise Rights Management
- PKI
- Key Management
- Server Threat Management
- Storage Security
- Virtualization Security
- Cloud Computing Security
- Fusion Center
8HP Security Services Portfolio
- IT Governance, Risk Compliance (GRC)
- eDiscovery Archiving
- Customer Specific Training and Awareness
- Operational Risk and Exceptions to Policy
- Account Delivery Continuity
- ISO 27001 Certification
- Information Risk Advisory Service
- PCI Compliance Scanning
- PCI Managed Compliance
- C A NIST SP 800-37
- C A DIACAP
- SCADA/Process Control System Security Assessment
- NERC CIP Design, Audit and Implementation
- IVV Test and Evaluation
- Compliance Assessments
- Threat Risk Assessments
- MCSS Capabilities
- PKI Management
- Token Management
- Managed Remote Access
- Directory Services
- Meta Virtual Directory
- Active Directory
- User administration
- IDAM - Current State Assessment
- IDAM - Architecture Blueprint
- IDAM Design Implement
- Web SSO
- Federation
- Provisioning
- E-SSO
- Risk Based Authentication
- PAM Management
9HP Security Services Portfolio
- Research, Development, Test Evaluation services
- DARPA, IARPA and Military Department research
agency opportunity - DOE National Labs support
- NMCI Research Analysis capabilities and support
- Large comprehensive cyber security pursuits
- Enterprise Security Information Event
Management - Log Management
- Compliance Management
- Security Dashboard
- System Hardening Services
- Security Incident Response
- Forensics
- Threat Monitoring Alerting
- Live Network Service
- Vulnerability Scanning
- Vulnerability Detection Management Services
- Security Configuration Management
- Global Security Operations Centers (GSOC)
- Mainframe Platform/OS Security
- Midrange/Server Platform/OS Security
10Vulnerability Assessment Services
- Network Assessments (Internet Intranet)
- Network Vulnerability Scanning (State of Art
Tools) - Network Penetration Testing
- System and Host Vulnerability Testing (White Box
Black Box) - Wireless Network Surveys and Penetration Testing
- Application Assessments (COTS and Custom)
- Application Development Life Cycle Security Gap
Analysis - Application Development/Design Training
- Application Code Analysis (From C to Cobol)
- Application Cyber Red Team
- Application Automated Vulnerability Scanning (Web
Database) - Application Regression Testing
- Independent Validation and Verification (IVV)
11HP Comprehensive Applications Threat Analysis
- Fast Facts
- 40,000 vulnerabilities in National
Vulnerabilities Database - Estimate 800,000 vulnerabilities not yet
exploited - Vulnerabilities patched late cost some 30X more
that those patched early - 70 of all successful attacks have exploited
application vulnerabilities (Gartner, Microsoft) - Typical security audits find 20 issues,
uncovering dozens or hundreds of vulnerabilities - One action which avoids a single data breach pays
for itself 100 fold
- Services Solutions
- Security Requirements Gap Analysis
- Architectural Threat Analysis
Building security in, not merely testing it
12HP Assured IdentityTM Plus Services
End-to-end Security Solutions
Run
Business Readiness Workshop
Detailed Design Architecture
Implementation
Strategy Roadmap
Assured Identity ManagementTM
Assessment Service
Fed SecureTM
Services Offered
Audit Compliance Validation
Gate SecureTM
Assured Identity TM
Strategic Technology Partnerships
Industry Frameworks
13HP Assured IdentityTM Plus
- Assured Identity
- Credential Enrollment
- Credential Issuance
- FIPS 201 Compliance
- PIV.XX Support
- Gate Secure
- Physical Security
- Automated PACS provisioning system
- New, single use, common credentials across
multiple agencies
- Fed Secure
- Federation in a Box
- Cross Credentialing
- Federation Broker
- Access Management Services
- Assured Identity Management
- Life Cycle Management
- User Provisioning
- Workflow
- Delegated Admin
- Self-Service
Consulting Services
Managed Security Services
14Cross Industry Experience
- Deep HP Security experience in all industries
- Industry focused security consultants
We serve/manage critical cyber infrastructures
across all US Critical Infrastructure/Key
Resource sectors
15HP Personnel Dedicated to Cyber Security
- Over 2,500 cyber security professionals worldwide
- Includes specialists for advisory and consulting
engagements - Certified security staff with CISSP, CISM, CAP,
CIS, CSSLP or GSEC
16Global Reach and Support
US Dept. of Defense US Government Comptroller of
the Currency Defense Logistics Agency US Dept. of
Agriculture US Dept of Justice US Dept. of
Education US Dept. of Energy US Dept. of Health
Human Services US Dept. of Homeland
Security US Dept. of Housing Urban
Development NHIC/ Medicare US Dept. of
Treasury Dept. of the Army Dept. of the Navy Dept
. Of Veterans Affairs DFAS DISA US Postal Food
Drug Administration Social Security
Administration US Dept. of State
Alberta Sustainable Resource Div. BC Ministry of
Labour BC Ministry of Provincial Revenue
Citizen Services Edmonton Delivery PWGSC
Pension Modernization Government of Manitoba
Sweden Post
Ministry of the Flemish Govt.
INAIL IPZS Minesterio di Grazia e Guist Ministro
Pubblica Intruzione
State of California City of Anaheim State of
Michigan State of Ohio Commonwealth of
Pennsylvania
European Space Agency
Federal Reserve World Bank
IDA of Singapore
Consulting ATP
UK Ministry of Defence UK Dept. For Work
Pensions UK Justice Offender Management
Tax Administration Service of Mexico (SAT)
Israel Ministry of Justice
South Australian Government
17QA