Logo IIIS


International Institute of
Informatics and Systemics
  • ABOUT IIIS
    • About IIIS Summary
    • Current Main Purpose and Activities
    • Organizing Phases
    • Members
    • Peer Reviewing
    • Ethics and Meta-Ethics in Peer Reviewing
    • Conferences' Acceptance Policy
    • A Learning Event in Peer Reviewing
      • Case Study and Action Learning
      • Facts and Reasons
    • IIIS Reviewers
    • IIIS Founding President
    • Initial Objectives
    • Fostering Inter-Disciplinary Communications
    • Inter-Disciplinary Fellows
    • Related Publications
    • TIDC
      • Advisory Editorial Board
      • IIIS/TIDC Publication Agreement
      • Inter-Disciplinary Rigor
    • Home
  • PUBLICATIONS
    • Journal of Systemics, Cybernetics and Informatics
    • Revista de Sistémica, Cibernética e Informática
    • Conference Proceedings
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
  • PAST CONFERENCES
    • Recent Conferences
    • Proceedings Co-Editors
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
      • 2012
      • 2011
      • 2010
      • 2009
      • 2008
      • 2007
      • 2006
      • 2005
      • 2004
      • 2003
      • 2002
      • 2001
      • 2000
    • Invited Sessions Organizers
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
      • 2012
      • 2011
      • 2010
      • 2009
      • 2008
      • 2007
      • 2006
      • 2005
      • 2004
      • 2003
      • 2002
      • 2001
      • 2000
    • Best Papers
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
      • 2012
      • 2011
      • 2010
      • 2009
      • 2008
      • 2007
      • 2006
      • 2005
      • 2004
      • 2003
      • 2002
      • 2001
      • 2000
    • Sessions Co-Chairs
      • 2020
      • 2019
      • 2018
      • 2017
      • 2016
      • 2015
      • 2014
      • 2013
      • 2012
      • 2011
      • 2010
      • 2009
      • 2008
      • 2007
      • 2006
      • 2005
      • 2004
      • 2003
      • 2002
      • 2001
      • 2000
    • Last Conferences' Photos
      • 2020 Awards Ceremmony
      • 2019 Awards Ceremmony
      • 2018 Awards Ceremmony
      • 2017 Awards Ceremmony
      • 2016 Awards Ceremmony
      • 2015 Awards Ceremmony
      • 2014 Awards Ceremmony
      • 2013 Awards Ceremmony
      • 2012 Awards Ceremmony
      • 2011 Awards Ceremmony
    • Last Conferences' Videos
      • 2019 Keynote Addresses
      • 2018 Keynote Addresses
      • 2017 Keynote Addresses
      • 2016 Keynote Addresses
      • 2015 Keynote Addresses
      • 2014 Keynote Addresses
      • KIIDC 2014
      • 2013 Keynote Addresses
      • 2012 Keynote Addresses
    • Memorial Awards
      • Professor William G. Lesso Memorial Award
      • Professor Ranulph Glanville Memorial Award
  • NEXT CONFERENCES
    • Spring 2025
    • Summer 2025
  • CALL for PARTICIPATION
    • CFP - Spring 2025 Conference
    • CFP - Summer 2025 Conference
  • TESTIMONIALS

General Joint Sessions and Workshops of IMCIC 2016 and its Collocated Events

March 8-11, 2016 ~ Orlando, Florida, USA

Cybernetics and Cybersecurity: bringing Order to Chaos
Scott D. Foote, National Security Engineering Center,The Lead for MITRE's "Cyber Operations Center", MITRE Corporation, USA

Video
Video
Bio
Bio
Abstract
Abstract

Scott Foote is a Cyber Security Engineer in MITRE's National Security Engineering Center (NSEC) FFRDC. At MITRE, Scott is applying his extensive knowledge of software engineering, business/operations management, enterprise-scale information systems, information security, and open source threat intelligence to researching and developing solutions for today's enterprise-scale Cybersecurity challenges. Scott's involvement with Cybersecurity began in the mid 1980's at Digital Equipment Corporation (DEC), and has spanned both the commercial and public sectors ever since, in a number of commercial companies including Oracle, OpenVision/Veritas, and a series of startups focused on the Information Security market. Scott is currently the lead for MITRE's "Cyber Operations Center" (CyOC) Capstone Initiative, the lead for the company's "Cyber Situation Awareness" Initiative, chief engineer on a number of customer-focused Cyber Operations efforts, and contributor to several MITRE R&D projects addressing specific Cyber Operations needs, solutions, and deployments.

Problem: The impact and visibility of cybersecurity breaches continues to rise. Fortune.com estimates that more than 140 countries have some level of cyber weapon development program. Mandiant (now FireEye) estimates that successful attackers are staying resident for >200 days on average, and that these attacks and breaches may already be costing the global economy $Trillions (2014 Mandiant Report). Today’s attackers are professionals, targeting the enterprise’s growing vulnerability. Vulnerability inherent in the expanding complexity, accessibility and dependencies that the enterprise has on information and supporting technology. In response, the Cybersecurity solution marketplace continues to grow, yet remains highly fragmented with 100s of companies providing point solutions in a wide range of categories: network security; intrusion detection/prevention; unified threat management; endpoint security; mobile and IoT security; “cloud” security; application security; data-at-rest and message security; threat intelligence and analytics; security operations & incident response; risk & compliance; etc. This is essentially a cyber “arms race”; and there is no “silver bullet”. CISOs and cybersecurity professionals are faced with a daunting challenge of unprecedented complexity and scale – effectively reducing the Risk to their business.

Engineering Approach: This session will discuss the application of contemporary Systems Engineering discipline to bring some Order to this Chaos – specifically Needs Analysis and Solution Concept Evolution. Conventional Needs Analysis in this domain suffers from the significant complexity of today’s enterprise, its unprecedented dependencies on highly-vulnerable information technology (cyberspace), and urgent demands for immediate solutions that mitigate the risk. “Decomposition” is discussed as a technique for iteratively reducing Abstract Needs into Concrete Requirements. Then, “Re-composition” (iterative System Design, Development, Deployment and continuous integration) is presented as a technique for rapidly evolving effective Solution Concepts.

Solution Concept: Finally, the session will briefly introduce a new system concept for “Cyber Situation Awareness”, informing enterprise-scale Cybersecurity – a federation of people, processes, and enabling technologies – that fuses multi-dimensional intelligence (of information systems and networks, the mission/business dependencies on them, and the emerging cyber threat targeting them) into a complex knowledgebase that provides "signal filtering" for more effective cybersecurity and risk management decisions supporting the "Complex System" that is the enterprise.




Postal Address:
13750 West Colonial Dr, Suite 350 - 408
Winter Garden, Florida 34787
U.S.A.
contact-us
Contact Us