Overblog
Suivre ce blog
Editer l'article Administration Créer mon blog
23 septembre 2013 1 23 /09 /septembre /2013 18:50
Cyber Endeavor seminar gathers security experts for four-day event

September 23, 2013 U.S Navy Mass Communication Specialist Jim Bane, Combined Endeavor Public Affairs

 

U.S. ARMY GARRISON, GRAFENWOEHR, Germany - Today, nearly every world event or crisis has a cyber-aspect to it, and the decisions made in cyberspace affect our physical or conventional activities and capabilities.

 

Cyber Endeavor, a regional seminar, addressed these issues and more from Sept. 17-20 during Exercise Combined Endeavor 2013 as an independent event focusing exclusively on cyber security.

 

In its fifth year, Cyber Endeavor is not an exercise, but one of four regional seminars held in separate countries. Combined Endeavor participants can attend the speaker sessions but “the overall purpose of the program is to build partnership capacity with the partner nations,” said Trina Zwicker of U.S. European Command’s J-6 Cyber Outreach Division.

 

Speakers for the event included representatives from Microsoft, Hewlett Packard, Cisco, the National Defense University, Verizon and many others. For the presenters, Cyber Endeavor was an opportunity to speak to military cyber experts from more than 30 countries.

 

Sam Ceccola, Hewlett Packard Department of Defense Technologist, presented insider threat analytics, platform concepts and cloud computing.

 

“Today we spend a lot of time protecting from outsider threats and we need to spend an equal amount of time protecting from insider threats,” Ceccola said.

 

Verizon’s Michael Young, a senior account manager for enterprise solutions in Europe, Middle East, and Africa supporting U.S. Federal sales, discussed his company’s publication called the “Data Breech Investigations Report.” According to Young, the report is “an analysis of data breeches that happened over the past year, how they happened, how the attackers got in and what was compromised.”

 

“Verizon believes that EUCOM and its partners can use this model to create a similar report,” Young said. This report could be used to demonstrate what the cyber landscape looks like and what the threat environment looks like as well.”

 

The cyber business of Microsoft was presented by David Aucsmith, senior director, Microsoft Institute for Advanced Technology in Governments. Aucsmith is responsible for technical relationships with agencies of the U.S. and other governments, as well as special projects.

 

“Our product is not only used by our government, but by the governments of our adversaries,” Aucsmith said. “Microsoft is the most attacked place on Earth. We have been attacked by every country on the planet and once from McMurdo Station in Antarctica. That guy is in jail now.”

 

There are three types of attacks, according to Aucsmith: warfare, where the object is to deny, degrade and destroy your target; espionage, where unauthorized access is the objective; and criminal, where fraud and/or theft are the goal of the attackers.

 

“If you’re a victim of one of these attacks, you don’t know which one is hitting you. If the attack is warfare in cyberspace, the attack is sustained, it’s continuous unlike conventional warfare,” said Aucsmith.

 

Aucsmith believes that as long as there is an adversary a static device can’t remain secure. “We need to produce systems that can change and modify in the presence of those adversaries activities.”

 

Closing remarks were given by U.S. Army Brig. Gen. Bruce T. Crawford, director, EUCOM J-6 C4/Cyber.

 

“Not doing the basics of cyber security is like building a house on a weak foundation,” Crawford said “The most likely threat vectors are the most routine things out there; the threat vectors are not overly sophisticated.”

 

“My view is that we have to fix the fundamentals and the thinking about cyber security to bring it to the forefront, a security violation can be just as dangerous as losing a weapons system,” said Crawford.

Partager cet article

commentaires

Présentation

  • : RP Defense
  • RP Defense
  • : Web review defence industry - Revue du web industrie de défense - company information - news in France, Europe and elsewhere ...
  • Contact

Recherche

Articles Récents

  • Externalisation de la Défense et de la Sécurité en France ? - 15 Décembre
    Le Comité directeur de l'ANAJ-IHEDN a le plaisir de vous inviter à la conférence : Vers une externalisation de la Défense et de la Sécurité en France ? Guillaume FARDE Maître de conférences à Sciences Po Paris, auteur de Externaliser la sécurité et la...
  • Chronique culturelle - 24 Nov.
    24 novembre 1977 : premier vol du Super Etendard de série 24.11.2016 source JFP 24 novembre 885 : début du siège de Paris par les Vikings. Très actifs durant le IXè siècle, les Vikings ont pris l’habitude de remonter les fleuves du Nord de la France pour...
  • Sortie en librairie le 21 novembre du livre LÉGIONNAIRE
    source MAREUIL EDITIONS Pour la première fois, un ancien officier de la Légion et un Légionnaire donnent la parole à 64 de leurs camarades. Pendant 2 ans, Victor Ferreira a rencontré près d’une centaine de Légionnaires à travers le monde en leur posant...
  • Brazilian Navy H225M Naval Combat Configuration
    17 nov. 2016 Airbus Helicopters Helibras and Airbus Helicopters have opened a new chapter in the history of the H225M multirole utility helicopter with the official presentation of the first aircraft in naval combat configuration. More info Helibras and...
  • Chronique culturelle - 17 Nov.
    La Bataille du Pont d'Arcole - Horace Vernet 17.11.2016 source JFP 17 novembre 1794 : début de la bataille de la Sierra Negra (Espagne) « opposant les troupes des généraux de Pérignon et Dugommier à celles du général espagnol de Carvajal. Cette victoire...
  • Le CEAM présente le CEILDT - Centre d’Expertise et d’Instruction des Liaisons de Données Tactiques
    15 nov. 2016 CEAM Petit clip de présentation sur le Centre d’Expertise et d’Instruction des Liaisons de Données Tactiques (CEILDT). Petit clip de présentation sur le Centre d'Expertise et d'Instruction des Liaisons de Données Tactiques (CEILDT).
  • Audition de M. Marwan Lahoud, président du groupement des industries françaises aéronautiques et spatiales
    photo Aseemblée Nationale 9 novembre 2016 Commission de la défense nationale et des forces armées - Compte rendu n° 15 Présidence de Mme Patricia Adam, présidente — Audition, ouverte à la presse, de M. Marwan Lahoud, président du groupement des industries...
  • Chronique culturelle - 15 Nov.
    Jean Gabin, chef de char du Régiment Blindé de Fusiliers Marins 15.11.2016 source JFP 15 novembre 1315 : bataille de Morgarten (Suisse actuelle). Convoités à la fois par la Bavière et l'Autriche, les Cantons suisses (Uri, Schwytz et Unterwald) donnent...
  • Chammal : les artilleurs appuient les forces irakiennes
    10 nov. 2016 Ministère de la Défense Opération Chammal : les artilleurs de la Task Force Wagram appuient les forces irakiennes et participent à la sécurisation des zones conquises aux alentours de Mossoul. Opération Chammal : les artilleurs de la Task...
  • Chronique culturelle - 10 Nov.
    La bataille de Tolbiac, toile marouflée, Panthéon de Paris, France - Joseph Blanc (1846-1904) 10.11.2016 source JFP 10 novembre 496 : bataille de Tolbiac (Zulpich - Allemagne actuelle). Le roi Clovis écrase les Alamans près de l'actuelle ville de Cologne...

Categories