1 / 12

Cyber leadership security beyond the limits

Cyber leadership security beyond the limits. A leadership conundrum Dr. E. Wayne Rose June 5, 2019. Introduction ARCHITECTURE? security facts What is going on Why is it going on role your leadership plays. Introduction. BS. MS. MS. Ph.D. Information Technology Leadership. Government

lazzaro
Télécharger la présentation

Cyber leadership security beyond the limits

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber leadership security beyond the limits A leadership conundrum Dr. E. Wayne Rose June 5, 2019

  2. IntroductionARCHITECTURE?security factsWhat is going onWhy is it going onrole your leadership plays

  3. Introduction BS MS MS Ph.D. Information Technology Leadership Government Information Leadership Computer Networking Organizational Leadership National Defense University-Chief Financial Office Naval Postgraduate School-Practical Comptrollership Financial Management (PCFM) Certification Chief Financial Officer-CFO National Defense University Government Information Leadership Certification NSA / Committee on National Security Systems (CNSS) National Training Standards for Information Systems Security Professionals NSTISSI 4011 & CNSSI 4012 Chief Information Security Officer Chief Information Officer- CIO Executive Competencies- UMUC Federal Competencies, CIO University Chief Information Security Officer- CISO Government Strategic Leader- GSL

  4. cyber leadership- SECURITY architecture • ARCHITECTURE • SECURITY ARCHITECTURE • CYBER-LEADERSHIP

  5. Security facts CYBERTHREAT REAL-TIME MAP United States # 5 MOST-ATTACKED COUNTRY

  6. What is going on ? What is going on ? Why is there an issue with cybersecurity that requires leadership? • Attacks via the Internet are perpetrated against • Americans • American Businesses • American Economy (People, Banks, our Institutions) We have often thought of this as a technical challenge; although it is to some extent, at this level, we are only focusing on resolution of a symptom These attacks, for the most part, are carried out by actors in China, Iran, Russia, North Korea, etc.

  7. Why is this happening? • While at National Defense University, we were taught “war has left the building; it has changed its clothes and is no longer here” • It is the new war, and as such, about dominance! • Leadership requires looking and operating above the frenzy/symptom • It requires developing and leading a strategy to target the identified crisis

  8. role your leadership plays International security and stability require rethinking strategies, realigning force structures, and adopting new models to leverage resources in response to emerging threats (Americas security role, 2009). Traditional strategies based on counterforce, deterrence, and retaliation against an identified adversary are no longer enough to protect against spontaneous, ambiguous, and unknown threats (Americas security role, 2009). Topic 01 Topic 02

  9. role your leadership plays Network insecurity will remain problematic in the future. As computers become more secure, hacker tools will improve (Americas security role, 2009). State sponsored hackers placed malicious code on computers when users downloaded materials from suspect web sites or opened email attachments from seemingly reliable parties. Once ingested in a targeted computer, the code opens data files from the inside, sending terabytes of information to the hackers. Victims worldwide include military bases, defense contractors, and private businesses (Americas security role, 2009). Topic 03 Topic 04

  10. Team MUSE Competencies in strategic leadership, IT strategy and planning, government strategic leadership, organizational change, and technology leadership. LINDA CURETON An experienced technologist and Agile evangelist specializing in delivering value-driven results in cost-effective, time-sensitive environments. He provides over twenty years of experience in IT, financial and program management, strategic planning, and Lean Six Sigma processes. ERIC WATSON Competencies in organizational leadership and structures through coaching, consulting, training and facilitation; organizational change and development of management systems to ensure targets and objectives are secured; educational transformation and turnaround specialist. Lisa Cureton Competencies in strategic leadership, IT strategy and planning, information security, government strategic leadership, organizational culture analysis, and financial leadership expertise to ensure business objectives are met. e. Wayne Rose, PH.D.

  11. Thank you Wayne.rose@muse-technologies.com http://www.muse-technologiesso.com/

  12. QUESTIONS ?

More Related