Download - Lockheed Martin

Transcript
Page 1: Lockheed Martin

<Name, email, Phone, etc> 1<Presentation Title>

S

1

Lockheed Martin

Charles CroomVice President, Cyber Security Strategy

[email protected]

Page 2: Lockheed Martin

<Name, email, Phone, etc> 2<Presentation Title>

S

• Define I & W and Relate To Cyber

• Is Cyber Indications and Warning Unique?

• Is Cyber I & W Different For The Government Than The Private sector?

Discussion Questions

Page 3: Lockheed Martin

<Name, email, Phone, etc> 3<Presentation Title>

S

Determine whether activities by a potential adversary are cause for a heightened state of alert based on deviation from the norm.

Define I & W and Relate To Cyber

Page 4: Lockheed Martin

<Name, email, Phone, etc> 4<Presentation Title>

SAn “I” for Intelligence

Intrusion

ReconnaissanceWeaponizationDeliveryExploitInstallationC2Actions on Objectives

Kill Chain

Page 5: Lockheed Martin

<Name, email, Phone, etc> 5<Presentation Title>

S

• Define I & W and Relate To Cyber

• Is Cyber Indications and Warning Unique?

• Is Cyber I & W Different For The Government Than The Private sector?

Discussion Questions

Page 6: Lockheed Martin

<Name, email, Phone, etc> 6<Presentation Title>

S

• Cyber I & W “Doesn’t Exist” Today• More Complex Than Traditional I&W• Only As Good As Quality Of Actions To Go

With It• Speed Makes Problem Different But Not

Impossible• Kill Chain: An Approach That Provides

Defender More Than One Opportunity For Success

Conclusions About Cyber I&W

Page 7: Lockheed Martin

Charles CroomVice President, Cyber Security Strategy

[email protected]


Top Related