Download - Lockheed Martin
<Name, email, Phone, etc> 1<Presentation Title>
S
1
Lockheed Martin
Charles CroomVice President, Cyber Security Strategy
<Name, email, Phone, etc> 2<Presentation Title>
S
• Define I & W and Relate To Cyber
• Is Cyber Indications and Warning Unique?
• Is Cyber I & W Different For The Government Than The Private sector?
Discussion Questions
<Name, email, Phone, etc> 3<Presentation Title>
S
Determine whether activities by a potential adversary are cause for a heightened state of alert based on deviation from the norm.
Define I & W and Relate To Cyber
<Name, email, Phone, etc> 4<Presentation Title>
SAn “I” for Intelligence
Intrusion
ReconnaissanceWeaponizationDeliveryExploitInstallationC2Actions on Objectives
Kill Chain
<Name, email, Phone, etc> 5<Presentation Title>
S
• Define I & W and Relate To Cyber
• Is Cyber Indications and Warning Unique?
• Is Cyber I & W Different For The Government Than The Private sector?
Discussion Questions
<Name, email, Phone, etc> 6<Presentation Title>
S
• Cyber I & W “Doesn’t Exist” Today• More Complex Than Traditional I&W• Only As Good As Quality Of Actions To Go
With It• Speed Makes Problem Different But Not
Impossible• Kill Chain: An Approach That Provides
Defender More Than One Opportunity For Success
Conclusions About Cyber I&W
Charles CroomVice President, Cyber Security Strategy