CyberSecurity Conference East: “No Silver Bullets … and No Lone Rangers, Either” March 23, 2010 JB “Gib” Godwin III Vice President, Cybersecurity and Systems Integration Northrop Grumman Information Systems Defense Systems Division What I Want to Talk About Today 1. The Nature of the Cyberthreat 2. The Nature of the Response: Old and New Paradigms 3. What Northrop Grumman is Doing 2 “Return with Us to those Days of Yesteryear” 3 “Return with Us toOne-Shot those Days of Yesteryear” The Silver Bullet: Solution 4 The Way War Was 5 A Different Kind of Fight 6 No Silver Bullets Because … 7 … No Single Source 8 8 ... No Single Source China Accused of Cyber Attack on Google Times of London Twitter Hack Part Of Broader Iranian Strategy TechCrunch $26 Software Is Used to Breach Key Weapons in Iraq Wall Street Journal 8 North Korean Hackers May Have stolen US War Plans Guardian … No Sample Attack 10 … No Sample Attack 11 … No Sample Vulnerability 12 The Weakest Link? 13 … No Superior Force Bigger Faster Smarter 14 Bigger: The Largest Standing Army in History 15 Faster: Evolving More Quickly than Response 16 1.8 MIL 1.6 MIL 1.4 MIL 1.2 MIL 1 MIL .8 MIL .6 MIL .4 MIL .2 MIL 0 MIL Smarter: Automated and Adaptive 17 … and No “Lone Rangers” Either 18 A New Paradigm: Electro-Magnetic Spectrum Dominance 19 Old Paradigm: “Defend” 20 New Paradigm: “Dominate” 21 Old Paradigm: “Reactive” 22 New Paradigm: “Predictive” 23 Old Paradigm: “Fragmented” 01001001001010 0010100100101001001001001010 01001001001001010 01001010010100100101001001001001010 01001010010100100101001001001001010 100100101001001001001010 01001010010100100101001001001001010 10010100100101001001001001010 100100101001001001001010 1001001001001010 001001010 1010 ELECTRONIC WARFARE CYBER 24 KINETIC FORCES