Cyberspace: A Fragile Ecosystem

Cyberspace:
A Fragile Ecosystem
Robert F. Lentz
Deputy Assistant Secretary of Defense
Cyber, Identity and Information Assurance
Unclassified//FOUO
1
UNCLASSIFIED
Dependence on Cyberspace
UNCLASSIFIED
Unclassified//FOUO
2
Looking Ahead . . . Looking Back
Waves of IT Industry Growth in the Information Age
10000
Grosch’s
Law
Moore’s
Law
Metcalf’s
Law
Number
of
Users
(Millions)
Network ‐
Centric
1000
Law
of
Transforma4on
Content ‐
Centric
PC‐Centric
100
Systems ‐
Centric
10
1
1970
1980
1990
2000
2010
Source:
David
Moschella,
“Waves
of
Power”,
1997
Unclassified//FOUO
2020
2030
Looking Ahead . . . Looking Back
(alternate story)
Unclassified//FOUO
4
Paradigm Shift
Unclassified//FOUO
UNCLASSIFIED
Are you a Starfish or a Spider?
 Starfish
 Peered
 Adaptive
 Resilient
 Spider
 Hierarchical
 Resists Change
 Fragile
UNCLASSIFIED
Unclassified//FOUO
6
Cyber Risk Management
Cyber
Time & Environment
Information
Content & Services
Identity
Individuals, Organizations,
Equipment
Unclassified//FOUO
UNCLASSIFIED
Vignette: The Recapture of Fallujah
UNCLASSIFIED
Unclassified//FOUO
8
UNCLASSIFIED
Vignette: World War II Cryptography
UNCLASSIFIED
Unclassified//FOUO
9
Shift in Strategic Focus
FROM
TO
• Protect Information
• Ensure Operational Success
• Static Pre-Placed Defenses
• Dynamic Network and
Information Operations
• Proprietary Point Solutions
• Policy-Based Enterprise
• People Intensive
• Integrated Services
• Fragile Information
Technology
• Resilient Cyber Ecosystem
Unclassified//FOUO
Toward a Resilient Cyber Ecosystem
Secure Information Access
E
E
Resilient
D
D
C
C
B
B
A
A
Speed of Action
A
A
Reactive &
Manual
Security
administrators follow
rules and do their
best to “put out fires”
B
B
C
C
Tools-Based
Interoperable
Tools and
technologies are
applied piecemeal
to assist people in
reacting faster
Loosely integrated
tools exchange data to
assist people with
cyber situational
awareness
D
D
E
E
Policy-Based
Resilient
The enterprise
instantiates
security policy,
illuminates events and
helps the operators
find, fix, and target for
response
Enterprise optimizes
service to user by to
dynamically isolating
and containing effects –
including in supply
chain and underlying
infrastructure
11
Unclassified//FOUO
Trends, Challenges, and Opportunities
• Strengthen Network Underpinnings
• Assure Software & Systems
• Managing Attack Surfaces
• Reducing Anonymity
• Improving Cyber Awareness
• Automating Security Content
• Mission Based Architectures
Unclassified//FOUO
It’s not just about technology . . .
National Centers of Academic Excellence
in Information Assurance Education
106 Colleges & Universities
in 38 States & DC
The US Cyber Challenge – discover, train and
recruit the best talent in the country
Unclassified//FOUO
UNCLASSIFIED
Culture Change for Cyberspace . . .
UNCLASSIFIED
Unclassified//FOUO
14