Both US and International governments have been shifting their focus to the research and development of technology to protect critical cyber assets. At the recent AFCEA Homeland Security Conference, cyber security was one of the main topics covered by keynote speakers and exhibitors. We’ve compiled some of the latest endeavors taking place on behalf of governments and large companies in their R&D pursuit of cyber security excellence.
Domestic R&D From Washington D.C.
The Pentagon’s Quadrennial Defense ReviewThe QDR has stressed the need to protect science, technology, research and development, specifically cyber capabilities. The three focus areas are protecting the homeland, building security globally, and project power and win decisively. The Cyber Mission Force implementing these agendas will focus on “new and expanded cyber capabilities and forces to enhance our ability to conduct cyberspace operations and support military operations.” The force will be fully operational by 2016. The investments include high performance engine technology, state-of-the-art tools and infrastructure, protecting engineering and technological know-how for next generation ground combat vehicle design, and protecting the missile industrial base. “Nearly any future conflict will occur on a much faster pace and on a more technically challenging battlefield.” - Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff US Budget Request Focuses on a High Tech Future US Military focused less on prolonged ground wars and more on fighting on a high-tech, contested battlefield. The Pentagon is protecting R&D money in its fiscal 2015 budget submission, and it will push for greater risk-taking and big bets. The Navy Department had a 9 percent increase of their RDT&E budget request, representing an increase of $1.3 billion. FY 2015 President's Budget Request Summary For NASA The FY 2015 budget makes efficient use of NASA's assets and also includes reinvigorated efforts to protect these assets, particularly from cyber threats. Subcommittee on Oversight and Subcommittee on Research and Technology Joint Hearing The Oversight Subcommittee and the Research and Technology Subcommittee held a joint hearing to examine the current state of technology and standards to protect Americans from international cybercriminals. Witnesses discussed the evolution of cyber-attacks against U.S. computer networks and infrastructure from rogue hackers to sophisticated international crime syndicates and foreign nations such as Russia and China. “The cyber threat will pose the greatest threat to our country." - FBI Director Robert Mueller
International R&D From Belgium Swift Chief Executive Calls for a Standardized Global Framework Swift chief executive Gottfried Leibbrandt has called on EU policymakers work towards the creation of a standardized global framework for international cyber-security. The interbank network, which connects over 10,000 institutions globally, was founded on security and confidentiality principles."Every day we wake up and go to sleep thinking about, and protecting against that threat. It is hard work and never done. When we don't sleep, it is because of cyber risks." European politicians are shifting their focus on drafting the EU's future cyber-security strategy. Leibbrandt prescribes a minimum of internationally agreed personnel vetting standards, supplier certification standards, readiness level standards and penetration testing standards and best practice definitions. He would also like the EU to do more to foster a vibrant ecosystem of participants and guides in cyber-security, backed by a R&D framework and advanced skill sets. From Singapore Israel Aerospace Industries Opens a Cyber R&D Center Israel Aerospace Industries is launching a new research and development center in Singapore which will focus on finding new technologies to provide early warnings of looming cyber-attacks. The center is the first that an Israeli defense corporation has opened in the Far East, with 80 to 90 percent of its workforce from the local area, including scientists, engineers and professional computer analysts. “This center will deal with cyber challenges, focusing on providing warnings ahead of impending attacks,” - Esti Peshin, head of the Cyber Programs section at IAI’s subsidiary Elta. The center will emphasize three areas: active defenses, such as catching cyber attackers in real time, monitoring them, and redirecting their attacks; finding the geographical location of virtual attackers; and anomaly detection, or recognizing deviations from routine behavior that could indicate impending attacks. From the United Kingdom Cyber Emergency Response Team Launch At the end of March, the UK government will launch the UK Computer Emergency Response Team, a £650 milion cybersecurity strategy. It will guard against criminal attacks on critical government systems and their associated operational functions. Just last year the UK’s energy infrastructure was at risk of being shut down by hackers. Notable CERT personnel include Director Chris Gibson (formerly of the Forum of Incident Response and Security Teams), Director of Operations Neil Cassidy (former cyber defense lead at Qinetiq), and Deputy Director Andrew Whittaker (a former Foreign Office crisis management expert). CERT-UK will provide a central point to coordinate responses to secure the country’s cyber space & is launching amidst increased awareness surrounding attacks on critical infrastructure. Request a free trial of the BeyondInsight IT Risk Management Platform for U.S. federal agencies. For more information, please contact: BeyondTrust Federal Solutions Group Tel: 301.337.8112 email@example.com
Scott Lang, Sr. Director, Product Marketing at BeyondTrust
Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.