Cybersecurity Training

Size: px
Start display at page:

Download "Cybersecurity Training"

Transcription

1 Cybersecurity Training Cook County Department of Homeland Security and Emergency Management (DHSEM), in partnership with Texas A&M Engineering Extension Service (TEEX), is pleased to announce the below listed training opportunities. Delivered locally at no cost to participants, the following cybersecurity courses will be offered: Essentials of Community Cybersecurity (AWR136), The EOC's Role in Community Cybersecurity (MGT384) and Community Cybersecurity Exercise Planning (MGT385). No country, industry, community or individual is immune to cyber risks. As a founding member of the National Cybersecurity Preparedness Consortium, TEEX offers a wide range of online and face-to-face cybersecurity training opportunities. For those new to cybersecurity, non-technical introductory courses create basic awareness and explore cybersecurity in a community context by building basic terminology and identifying fundamental cyber threats, vulnerabilities and countermeasures. Classroom-based training provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent and/or stop operations and emergency responses in a community. Scheduled Course Deliveries Essentials of Community Cybersecurity (AWR136) 3 November, 5 November, 1 December or 3 December, 2015 The EOC's Role in Community Cybersecurity (MGT384) 3-4 November or 5-6 November, 2015 Community Cybersecurity Exercise Planning (MGT385) 1-2 December or 3-4 December, 2015 Detailed course information and registration links are found in the pages following. Cook County DHSEM Training Points of Contact: Jeffery Schulman, Training and Exercise Coordinator, jeffery.schulman@cookcountyil.gov Robert Dunne, Training and Exercise Coordinator, robert.dunne@cookcountyil.gov

2 Essentials of Community Cybersecurity AWR Hours 3 November, 5 November, 1 December or 3 December, 2015 The Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to cybersecurity vulnerabilities, risks, threats, and countermeasures. It explains vulnerabilities of computer systems and networks and how these vulnerabilities can affect communities, organizations, and daily workplace operations. The course introduces actions communities can take in establishing a cybersecurity program. The course provides participants with an awareness of issues. It gives an overview of threats and vulnerabilities, without going into too many details, to highlight the potential impact a cyber attack could have. Participants discuss some of the fundamental activities needed to develop a cybersecurity program, without addressing the technical details of how to secure critical infrastructures. The course introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low cost or no cost approaches to securing a community against cybersecurity threats and attacks. The course sets the stage for further efforts in which a community can build a cybersecurity program. Course Objectives At the conclusion of the course, participants will be able to: Recognize why community cybersecurity is important. Recognize the characteristics of a community cybersecurity program. There are no prerequisites for the course. No prior background in cybersecurity or information technology is required. Why cybersecurity is important Unstructured threats Structured threats Highly structured threats The Community Cybersecurity Maturity Model (CCSMM) Things a community can do to initiate a cybersecurity program Where to go for help The target audience is personnel involved with critical infrastructure, emergency operations, and incident response in public or private organizations, including state, county, and municipal officials; members of industry affiliations and chambers of commerce.

3 The EOC's Role in Community Cybersecurity MGT Hours 3 4 November or 5 6 November, 2015 The EOC's Role in Community Cybersecurity provides an awareness of how cyber events can impact communities. Throughout the course participants will learn the roles and responsibilities needed to detect, prevent and respond to a cybersecurity incident. With examples participants will understand how the EOC and community would plan for and manage information needed for a cyber event. The attendees will also see how cyber can be used to affect, disrupt and/or complicate emergency responses. AWR 136 Essentials of Community Cybersecurity How cyber can impact the business operations of a community Characteristics of how cyber incidents and physical incidents relate Demonstration of information sharing being used to create a "big picture" Explore a cyber event that may active a community response Identify roles, responsibilities, and resources that may be used to address a cyber event People taking this course should be involved with any Emergency Operations Center; State, City, County, University, Hospital or private sector. Anyone involved in all EOC activities curing a community emergency, disaster or other event are encouraged to attend.

4 Community Cybersecurity Exercise Planning MGT Hours 1 2 December or 3 4 December This course is designed to introduce cyber to exercise planners to help them recognize the nature and reach of cyber, so they can better help their communities prevent, detect, respond to, and recover from cyber incidents. Participants will recognize how cyber can be incorporated into exercises in a meaningful way. Participants will be introduced to cyber topics and how cyber can impact the business operations of an organization and community. Lecture and activities will explore objectives, players, cyber injects and challenges to incorporating cyber into exercises. Participants will be exposed to many possible injects and scenarios that can be used in an exercise. Participants will begin development of a community cybersecurity tabletop exercise. The Community Cybersecurity Maturity Model will be used to examine the contribution of exercises to a community s overall cybersecurity posture. This course teaches planning personnel how to include cyber components in their regular planning process. Participants will be given the opportunity to plan cyber components for future community cybersecurity exercises. AWR 136 Essentials of Community Cybersecurity should be completed before attending this course. Participants should have an understanding of the Homeland Security Exercise and Evaluation Program (HSEEP) and have familiarity with community and organizational exercises. The concepts and ideas delivered in IS 120.a An Introduction to Exercises from the Federal Emergency Management Agency may prove to be beneficial in preparation for this course. An Introduction to Cyber Examining Characteristics of Cyber Using the Community Cybersecurity Maturity Model (CCSMM) to Develop Exercise Objectives Exercise Categories Incorporating Cyber Into Exercises Cyber Storylines and Scenarios Planning Community Cybersecurity Exercises This course is designed for personnel with responsibility for planning and conducting exercises in their organization or the community, who need help, assistance, or training on how to address cyber issues in their exercises.

5 For additional information and to register: Essentials of Community Cybersecurity AWR136 Date & Time: 3 November, 2015 (8:00 am 12:00 pm) Registration: Date & Time: 5 November, 2015 (8:00 am 12:00 pm) Registration: Date & Time: 1 December, 2015 (8:00 am 12:00 pm) Registration: Date & Time: 3 December, 2015 (8:00 am 12:00 pm) Registration: The EOC's Role in Community Cybersecurity MGT384 Dates & Time: 3 November, 2015 (1:00 pm 5:00 pm) and 4 November, 2015 (8:00 am 5:00 pm) Registration: Dates & Time: 5 November, 2015 (1:00 pm 5:00 pm) and 6 November, 2015 (8:00 am 5:00 pm) Registration: Community Cybersecurity Exercise Planning MGT385 Dates & Time: 1 December, 2015 (1:00 pm 5:00 pm) and 2 December, 2015 (8:00 am 5:00 pm) Registration: Dates & Time: 3 December, 2015 (1:00 pm 5:00 pm) and 4 December, 2015 (8:00 am 5:00 pm) Registration:

Training Opportunities

Training Opportunities FEMA Independent Study Courses IS-288.A: The Role of Voluntary Organizations in Emergency Management To complete the above course please visit the FEMA Independent Study Website at: http://training.fema.gov/is

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

November is National Critical Infrastructure Security & Resilience Month

November is National Critical Infrastructure Security & Resilience Month November is National Critical Infrastructure Security & Resilience Month In celebration of this very important awareness and the developing Critical Infrastructure and Key Resources (CIKR) Program for

More information

All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness

All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness All Eyes: A Security Breach Exercise Disaster Recovery/Security and Business Continuity Readiness Commonwealth of Pennsylvania Molly Dougherty, Director Continuity of Government and Records Information

More information

July 2015-August 2016

July 2015-August 2016 STATE OF MARYLANDONSE OPERATIONS PLAN (SROP)Maryland Preparedness Planning Certificate Program (MPPCP) July 2015-August 2016 A Center for Preparedness Excellence 1 A CENTER FOR PREPAREDNESS EXCELLENCE

More information

unified command course (MGT-314)

unified command course (MGT-314) enhanced ALL-HAZARDS incident management/ unified command course (MGT-314) I was sent to St. Bernard Parish, Louisiana, as the incident commander for 16 days following Hurricane Katrina. The training I

More information

Maryland Fire and Rescue Institute University of Maryland College Park

Maryland Fire and Rescue Institute University of Maryland College Park Homeland Security Exercise and Evaluation Program HSEEP By: Richard Armstrong, BS, CFPS, Fire Officer IV Regional Coordinator MFRI, North East Regional Office Maryland Fire and Rescue Institute University

More information

TCOM 562 Network Security Fundamentals

TCOM 562 Network Security Fundamentals TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class

More information

Active Threat Scenario (ATS) RFP 1. INTRODUCTION

Active Threat Scenario (ATS) RFP 1. INTRODUCTION 1. INTRODUCTION The Cook County Department of Homeland Security and Emergency Management (DHSEM) plays a lead role in the homeland security and emergency management mission within the Chicago Urban Area;

More information

Texas Department of Public Safety Texas Division of Emergency Management. Preparedness Standards for Emergency Management in Texas TDEM-100

Texas Department of Public Safety Texas Division of Emergency Management. Preparedness Standards for Emergency Management in Texas TDEM-100 Texas Department of Public Safety Texas Division of Emergency Management Preparedness Standards for Emergency Management in Texas June 2000 FOR ADDITIONAL INFORMATION Requests for additional copies of

More information

National Domestic Preparedness Consortium. Preparing the Nation through Training

National Domestic Preparedness Consortium. Preparing the Nation through Training National Domestic Preparedness Consortium Preparing the Nation through Training NDPC Mission Statement To enhance the preparedness of territories, state, local, and tribal emergency responders/first receivers

More information

Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives

Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives Portal Storm: A Cyber/Business Continuity Exercise Cyber Security Initiatives Commonwealth of Pennsylvania Office of Administration Tony Encinias, Chief Information Officer Project Initiated: January 2013

More information

ST. JOHNS COUNTY COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APRIL 2012. Appendix E. Training Program

ST. JOHNS COUNTY COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APRIL 2012. Appendix E. Training Program ST. JOHNS COUNTY COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APRIL 2012 Appendix E Training Program Appendix E Training - 1 I. PURPOSE St. Johns County Training Appendix To outline a training program that

More information

Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015

Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015 Maryland Preparedness Planning Certificate Program Pilot 2014 2015 Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015 A Center for Preparedness Excellence A Center for

More information

New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities

New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities NMDHSEM, State Administrative Agency (SAA) PO Box, 27111, Santa

More information

Business Continuity Exercise Program (BCEP) Information Packet

Business Continuity Exercise Program (BCEP) Information Packet BUSINESS CONTINUITY PLANNING Business Continuity Exercise Program (BCEP) Information Packet This exercise program was developed by the Texas Engineering Extension Service (TEEX) A Member of the Texas A&M

More information

PHILADELPHIA GAS WORKS Business Continuity Plan and Consulting RFP # 28576 Questions & Answers Emailed April 21, 2014

PHILADELPHIA GAS WORKS Business Continuity Plan and Consulting RFP # 28576 Questions & Answers Emailed April 21, 2014 Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 QUESTIONS Under Task 1: It appears there are two tabletop exercises to be provided? Is there an estimate of how many personnel will take part in each exercise? Will PGW provide

More information

Supplemental Tool: NPPD Resources to Support Vulnerability Assessments

Supplemental Tool: NPPD Resources to Support Vulnerability Assessments Supplemental Tool: NPPD Resources to Support Vulnerability Assessments NPPD Resources to Support Vulnerability Assessments Assessing vulnerabilities of critical infrastructure is an important step in developing

More information

2015 Emergency Management Course Schedule

2015 Emergency Management Course Schedule 2015 Emergency Management Course Schedule NOTE: ALL COURSES WILL NOW BE OFFERED AT THE CENTER FOR LEARNING AND INNOVATION 1979 MARCUS AVE. LAKE SUCCESS, NY 11042 EXCEPT WHERE NOTED HazMat for Healthcare

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE

Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE This page intentionally left blank Tampa Bay Catastrophic Plan Hurricane Phoenix A Storm Recovery Tabletop Exercise August 5, 2010 EXERCISE

More information

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. 1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic

More information

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1 CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security

More information

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving

More information

The University of Southern Mississippi National Center for Spectator Sports Safety and Security. Sport Event Security Aware Designation

The University of Southern Mississippi National Center for Spectator Sports Safety and Security. Sport Event Security Aware Designation The University of Southern Mississippi National Center for Spectator Sports Safety and Security Sport Event Security Aware Designation Frequently Asked Questions September 2015 What is Sport Event Security

More information

Business Continuity / Disaster Recovery Context

Business Continuity / Disaster Recovery Context Capability Business Continuity / Disaster Recovery Context What is Business Continuity? The Business Continuity Program Life Cycle Copyright: Virtual Corporation, 1994 2006 Modified U.S. DoD Graphic Normal

More information

SESSION SUMMARIES BLOCK A SESSIONS. Center for Domestic Preparedness (CDP)

SESSION SUMMARIES BLOCK A SESSIONS. Center for Domestic Preparedness (CDP) SESSION SUMMARIES Below are summaries of the sessions that the NDPC partners will be presenting at the 2014 NSAA Training Symposium. Within a week of the CDP receiving your application you will be sent

More information

Disaster Design: How to Develop and Conduct an Effective Tabletop Exercise

Disaster Design: How to Develop and Conduct an Effective Tabletop Exercise Community College Risk Management Consortium July 23 24, 2015 Disaster Design: How to Develop and Conduct an Effective Tabletop Exercise JEFF COPELAND JULY 2015 Disaster by Design How to develop and conduct

More information

Emergency Management Organization

Emergency Management Organization Organization To save lives, preserve property, and protect the environment during emergencies and disasters through coordinated prevention, protection, preparation, response and recovery actions. Director

More information

For Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015. For Official Use Only

For Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015. For Official Use Only For Official Use Only Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015 For Official Use Only SPRINGFIELD-GREENE COUNTY Point of Contact Erin Pope

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

Chemical Sector Training Resources Guide. 010 July 2011

Chemical Sector Training Resources Guide. 010 July 2011 Chemical Sector Training Resources Guide 010 July 2011 Homeland Security DRAFT June 2010 Table of Contents Introduction... 1 Organizations Federal Emergency Management Agency.. 1 National Protection and

More information

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com jrobles@coqui.net 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event

More information

2012 Business Continuity Conference Friday, November 9, 2012

2012 Business Continuity Conference Friday, November 9, 2012 South Central PA Regional Business Preparedness Campaign 2012 Conference Friday, November 9, 2012 The South Central PA Task Force will hold a Regional Conference on Friday, November 9, 2012, at the C.

More information

Which cybersecurity standard is most relevant for a water utility?

Which cybersecurity standard is most relevant for a water utility? Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:

More information

Office of Emergency Management

Office of Emergency Management Emergency Management Mission The Office of Emergency Management (OEM) coordinates and collaborates with its partners to reduce the impact of emergencies and disasters, through a comprehensive emergency

More information

Emergency Management Program

Emergency Management Program Emergency Management Program The Emergency Management and Civil Protection Act, R.S.O. 1990,c.E.9 and its associated regulations and standards, requires all Ontario Municipalities to implement a mandatory

More information

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Security+ P a g e 1 of 5. 5-Day Instructor Led Course P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic

More information

Information Technologies for Homeland Security Program Assessment Plan 5/3/2011

Information Technologies for Homeland Security Program Assessment Plan 5/3/2011 Last Revised 5/3/2011 Catalog Description The Computer Information Systems (CIS) Associate Degree program is designed to provide a solid foundation in the fundamental skills that are generally required

More information

Cybersecurity Awareness for Executives

Cybersecurity Awareness for Executives SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity

More information

ESF 02 - Communications Annex, 2015

ESF 02 - Communications Annex, 2015 ESF 02 - Communications Annex, 2015 Table of contents I. Introduction... 3 A. Purpose... 3 B. Scope of Operations... 3 C. Specific Authorities and References... 4 II. Situation and Assumptions... 4 A.

More information

Conference Sponsorship Opportunities

Conference Sponsorship Opportunities Conference Sponsorship Opportunities The #1 Business Continuity Publication in the World Every issue, Disaster Recovery Journal (DRJ) delivers how-to, in depth knowledge into business continuity planning

More information

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6 to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized

More information

Overview TECHIS60851. Manage information security business resilience activities

Overview TECHIS60851. Manage information security business resilience activities Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,

More information

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA The DS Information Assurance and Cybersecurity Role-Based Training Program Diplomatic Security Training Center (DSTC) Dunn Loring, VA IAB Mission The Information Assurance Branch s (IAB s) mission is to

More information

MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF14-Long Term Community Recovery

MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF14-Long Term Community Recovery MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN ESF14-Long Term Community Recovery Planning Team Support Agency Coffeyville Public Works Independence Public Works Montgomery County Public Works 1/15/2009

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Can your Organization survive a natural disaster?

Can your Organization survive a natural disaster? Can your Organization survive a natural disaster? Objectives Provide an overview of Business Continuity and Resumption Educate an emergency manager on the processes privates businesses most perform preparing

More information

Notice of Funding Opportunity (NOFO):

Notice of Funding Opportunity (NOFO): Federal Program: State Homeland Security Program (SHSP): SHSP supports the implementation of risk driven, capabilities-based State Homeland Security Strategies to address capability targets set in State

More information

Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements

Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Jim Weldin Delaware League of Local Governments 1 Homeland Security Grant Funding

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool

ICBA Summary of FFIEC Cybersecurity Assessment Tool ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary

More information

ISM527 - Cyber Security Management

ISM527 - Cyber Security Management ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number

More information

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,

More information

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7 Top Five Things You Need to Know About Cybersecurity Larry Mattox, VC3 Session #7 Cyber breaches are more sophisticated and can happen to any size organization. Victims of Cyber-espionage CNN, Washington

More information

Dealer Member Cyber-security

Dealer Member Cyber-security Administrative Notice General Please distribute internally to: Legal and Compliance Senior Management Contact: Wendy Rudd Senior Vice President, Member Regulation and Strategic Initiatives 416 646-7216

More information

Continuity Plan Testing Flowchart

Continuity Plan Testing Flowchart Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services Continuity Plan Testing Flowchart 1 Ongoing Multi-Year Testing Full Scale Exercises

More information

Using Exercises to Measure Preparedness August 6th 2015 11:00 AM Paul D. Biddinger, MD FACEP Elena Savoia, MD MPH

Using Exercises to Measure Preparedness August 6th 2015 11:00 AM Paul D. Biddinger, MD FACEP Elena Savoia, MD MPH Using Exercises to Measure Preparedness August 6th 2015 11:00 AM Paul D. Biddinger, MD FACEP Elena Savoia, MD MPH 4 Acknowledgements We gratefully acknowledge funding support from the U.S. Centers for

More information

Bay Area Regional Catastrophic Planning Team Urban Shield 2013 Functional and Full Scale Exercise

Bay Area Regional Catastrophic Planning Team Urban Shield 2013 Functional and Full Scale Exercise Bay Area Regional Catastrophic Planning Team Urban Shield 2013 Functional and Full Scale Exercise Read-Ahead Package For April 25, 2013 Regional Catastrophic Plans BAY AREA UASI FUNCTIONAL EXERCISE OVERVIEW

More information

It also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster.

It also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster. Emergency Support Function #2 Communications ESF Coordinator: Information Technology Department Support Agencies: Tucson Fire Department Parks and Recreation Department Tucson Police Department Tucson

More information

Community Cyber Security. Center for Infrastructure Assurance and Security

Community Cyber Security. Center for Infrastructure Assurance and Security Community Cyber Security Overview CIAS program Nevada implementation Get involved Physical and Cyber Threats Intersect The most destructive scenarios involve cyber actors launching several attacks on our

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO

U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW November 12, 2012 NASEO ISER Response: from site focused to system focused Emergency Preparedness, Response, and Restoration Analysis and

More information

Texas Exercise Frequently Asked Questions 2013

Texas Exercise Frequently Asked Questions 2013 What documents or resources are available for EMPG exercise requirements? Each fiscal year s Local EMPG Guide and associated Information Bulletins are available at http://www.txdps.state.tx.us/dem/councilscommittees/empg/index.htm

More information

Flooding Emergency Response Exercise

Flooding Emergency Response Exercise Flooding Emergency Response Exercise James Woodward, Senior Exercise Planner California Emergency Management Agency 3650 Schriever Ave. Mather, CA 95655 Cell: (916) 439-3546 Email: james.woodward@calema.ca.gov

More information

June 2015 Communications Full-Scale Exercise

June 2015 Communications Full-Scale Exercise June 2015 Communications Full-Scale Exercise Exercise Plan June 22-26, 2015 The Exercise Plan gives elected and appointed officials, observers, media personnel, and players from participating organizations

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

Cybersecurity: The Legal, Legislative and Regulatory Outlook

Cybersecurity: The Legal, Legislative and Regulatory Outlook Cybersecurity: The Legal, Legislative and Regulatory Outlook Jamie Barnett Rear Admiral USN (Retired) Co-Chair, Telecommunications Partner in Cybersecurity Practice Cybersecurity Impact and Costs Direct

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

National Emergency Response

National Emergency Response National Emergency Response and Rescue Training Center DHS/FEMA-Funded Courses Preparing the Nation Through Training 1 Our Role In National Preparedness The National Emergency Response and Rescue Training

More information

Cyber and Data Risk What Keeps You Up at Night?

Cyber and Data Risk What Keeps You Up at Night? Legal Counsel to the Financial Services Industry Cyber and Data Risk What Keeps You Up at Night? December 10, 2014 Introduction & Overview Today s Discussion: Evolving nature of data and privacy risks

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

Regina Phelps, CEM, RN, BSN, MPA Conference Offerings

Regina Phelps, CEM, RN, BSN, MPA Conference Offerings Regina Phelps, CEM, RN, BSN, MPA Conference Offerings PLENARY SESSION TOPICS... 2 The Greatest Threat in Our Lifetime? What are You Doing to Get Ready!?!... 2 It s hard to plan if you don t know what you

More information

Emergency Management Organization

Emergency Management Organization Organization To save lives, preserve property, and protect the environment during emergencies and disasters through coordinated prevention, protection, preparation, response and recovery actions. Director

More information

Building an effective Tabletop Exercise. Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services

Building an effective Tabletop Exercise. Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Con$nuity Plan Tes$ng Flowchart 3/26/2013 #2 Ongoing Mul$ Year Tes$ng

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

Salem Community College Course Syllabus. Section I. Course Title: Principles of Emergency Management. Course Code: EME101.

Salem Community College Course Syllabus. Section I. Course Title: Principles of Emergency Management. Course Code: EME101. Salem Community College Course Syllabus Section I Course Title: Principles of Emergency Management Course Code: EME101 Lecture Hours: 3 Lab Hours: 0 Credits: 3 Course Description: This is a three credit

More information

How To Prepare For A Disaster

How To Prepare For A Disaster Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Continuity Plan Testing Flowchart 3/26/2013 #2 1 Ongoing Multi-Year

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The

More information

Application for Membership

Application for Membership Application for Membership This Application for Industry Membership is subject to approval by EnergySec. By executing the Membership Application and Membership Agreement and submitting payment for membership

More information

Summer Public Health Preparedness Webinar Series Presents: Emergency Management and Public Health Preparedness

Summer Public Health Preparedness Webinar Series Presents: Emergency Management and Public Health Preparedness Summer Public Health Preparedness Webinar Series Presents: Emergency Management and Public Health Preparedness Alignment of Public Health, Healthcare, and Emergency Management Preparedness Todd Talbert,

More information

Critical Infrastructure and Pandemic Preparedness

Critical Infrastructure and Pandemic Preparedness BLUE CASCADES IV: Critical Infrastructure and Pandemic Preparedness ACTION PLAN Participants in the BLUE CASCADES IV tabletop exercise held January 26, 2007 in Seattle, WA, reconvened on June 5 at the

More information

STATE HOMELAND SECURITY GRANT PROGRAM

STATE HOMELAND SECURITY GRANT PROGRAM FY2015 State Homeland Security Investment Justifications STATE HOMELAND SECURITY GRANT PROGRAM OREGON OFFICE OF EMERGENCY MANAGEMENT www.oregon.gov/omd/oem Mailing address: P.O. Box 14370 Salem, OR 97309-5062

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM

NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM October 15 th, 2013 Table of Contents Program Overview and Administration:...4 Certification process:...4 Responsibilities:...4 North Carolina

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

How To Learn The Incident Command System

How To Learn The Incident Command System Incident Command System Training Guide Course description ICS - 100 Introduction to ICS is intended for personnel assigned to an incident or event who have a minimum requirement for understanding ICS.

More information

Data Analytics & Information Security

Data Analytics & Information Security Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda

More information

Jefferson County Homeland Security & Emergency Management www.jeffersoncountywv.org/homeland-security.html

Jefferson County Homeland Security & Emergency Management www.jeffersoncountywv.org/homeland-security.html October, 2014 Jefferson County Homeland Security & Emergency Management www.jeffersoncountywv.org/homeland-security.html October, 2014 Jefferson County Commissioners: Walt Pellish, President Jane Tabb,

More information

DePaul University College of Commerce School of Accountancy and Management Information Systems

DePaul University College of Commerce School of Accountancy and Management Information Systems Instructors: DePaul University College of Commerce School of Accountancy and Management Information Systems MIS 798: Spring Semester - IT Service Management Strategy and Design Syllabus 04/01/2013 Michael

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose

More information

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow 2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

318 DECREE. of the State Office for Nuclear Safety of 13 June 2202,

318 DECREE. of the State Office for Nuclear Safety of 13 June 2202, 318 DECREE of the State Office for Nuclear Safety of 13 June 2202, On details for emergency preparedness assurance at nuclear installations and workplaces with ionizing radiation sources and on requirements

More information