Cybersecurity Training
|
|
- Cassandra McCarthy
- 8 years ago
- Views:
Transcription
1 Cybersecurity Training Cook County Department of Homeland Security and Emergency Management (DHSEM), in partnership with Texas A&M Engineering Extension Service (TEEX), is pleased to announce the below listed training opportunities. Delivered locally at no cost to participants, the following cybersecurity courses will be offered: Essentials of Community Cybersecurity (AWR136), The EOC's Role in Community Cybersecurity (MGT384) and Community Cybersecurity Exercise Planning (MGT385). No country, industry, community or individual is immune to cyber risks. As a founding member of the National Cybersecurity Preparedness Consortium, TEEX offers a wide range of online and face-to-face cybersecurity training opportunities. For those new to cybersecurity, non-technical introductory courses create basic awareness and explore cybersecurity in a community context by building basic terminology and identifying fundamental cyber threats, vulnerabilities and countermeasures. Classroom-based training provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent and/or stop operations and emergency responses in a community. Scheduled Course Deliveries Essentials of Community Cybersecurity (AWR136) 3 November, 5 November, 1 December or 3 December, 2015 The EOC's Role in Community Cybersecurity (MGT384) 3-4 November or 5-6 November, 2015 Community Cybersecurity Exercise Planning (MGT385) 1-2 December or 3-4 December, 2015 Detailed course information and registration links are found in the pages following. Cook County DHSEM Training Points of Contact: Jeffery Schulman, Training and Exercise Coordinator, jeffery.schulman@cookcountyil.gov Robert Dunne, Training and Exercise Coordinator, robert.dunne@cookcountyil.gov
2 Essentials of Community Cybersecurity AWR Hours 3 November, 5 November, 1 December or 3 December, 2015 The Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to cybersecurity vulnerabilities, risks, threats, and countermeasures. It explains vulnerabilities of computer systems and networks and how these vulnerabilities can affect communities, organizations, and daily workplace operations. The course introduces actions communities can take in establishing a cybersecurity program. The course provides participants with an awareness of issues. It gives an overview of threats and vulnerabilities, without going into too many details, to highlight the potential impact a cyber attack could have. Participants discuss some of the fundamental activities needed to develop a cybersecurity program, without addressing the technical details of how to secure critical infrastructures. The course introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low cost or no cost approaches to securing a community against cybersecurity threats and attacks. The course sets the stage for further efforts in which a community can build a cybersecurity program. Course Objectives At the conclusion of the course, participants will be able to: Recognize why community cybersecurity is important. Recognize the characteristics of a community cybersecurity program. There are no prerequisites for the course. No prior background in cybersecurity or information technology is required. Why cybersecurity is important Unstructured threats Structured threats Highly structured threats The Community Cybersecurity Maturity Model (CCSMM) Things a community can do to initiate a cybersecurity program Where to go for help The target audience is personnel involved with critical infrastructure, emergency operations, and incident response in public or private organizations, including state, county, and municipal officials; members of industry affiliations and chambers of commerce.
3 The EOC's Role in Community Cybersecurity MGT Hours 3 4 November or 5 6 November, 2015 The EOC's Role in Community Cybersecurity provides an awareness of how cyber events can impact communities. Throughout the course participants will learn the roles and responsibilities needed to detect, prevent and respond to a cybersecurity incident. With examples participants will understand how the EOC and community would plan for and manage information needed for a cyber event. The attendees will also see how cyber can be used to affect, disrupt and/or complicate emergency responses. AWR 136 Essentials of Community Cybersecurity How cyber can impact the business operations of a community Characteristics of how cyber incidents and physical incidents relate Demonstration of information sharing being used to create a "big picture" Explore a cyber event that may active a community response Identify roles, responsibilities, and resources that may be used to address a cyber event People taking this course should be involved with any Emergency Operations Center; State, City, County, University, Hospital or private sector. Anyone involved in all EOC activities curing a community emergency, disaster or other event are encouraged to attend.
4 Community Cybersecurity Exercise Planning MGT Hours 1 2 December or 3 4 December This course is designed to introduce cyber to exercise planners to help them recognize the nature and reach of cyber, so they can better help their communities prevent, detect, respond to, and recover from cyber incidents. Participants will recognize how cyber can be incorporated into exercises in a meaningful way. Participants will be introduced to cyber topics and how cyber can impact the business operations of an organization and community. Lecture and activities will explore objectives, players, cyber injects and challenges to incorporating cyber into exercises. Participants will be exposed to many possible injects and scenarios that can be used in an exercise. Participants will begin development of a community cybersecurity tabletop exercise. The Community Cybersecurity Maturity Model will be used to examine the contribution of exercises to a community s overall cybersecurity posture. This course teaches planning personnel how to include cyber components in their regular planning process. Participants will be given the opportunity to plan cyber components for future community cybersecurity exercises. AWR 136 Essentials of Community Cybersecurity should be completed before attending this course. Participants should have an understanding of the Homeland Security Exercise and Evaluation Program (HSEEP) and have familiarity with community and organizational exercises. The concepts and ideas delivered in IS 120.a An Introduction to Exercises from the Federal Emergency Management Agency may prove to be beneficial in preparation for this course. An Introduction to Cyber Examining Characteristics of Cyber Using the Community Cybersecurity Maturity Model (CCSMM) to Develop Exercise Objectives Exercise Categories Incorporating Cyber Into Exercises Cyber Storylines and Scenarios Planning Community Cybersecurity Exercises This course is designed for personnel with responsibility for planning and conducting exercises in their organization or the community, who need help, assistance, or training on how to address cyber issues in their exercises.
5 For additional information and to register: Essentials of Community Cybersecurity AWR136 Date & Time: 3 November, 2015 (8:00 am 12:00 pm) Registration: Date & Time: 5 November, 2015 (8:00 am 12:00 pm) Registration: Date & Time: 1 December, 2015 (8:00 am 12:00 pm) Registration: Date & Time: 3 December, 2015 (8:00 am 12:00 pm) Registration: The EOC's Role in Community Cybersecurity MGT384 Dates & Time: 3 November, 2015 (1:00 pm 5:00 pm) and 4 November, 2015 (8:00 am 5:00 pm) Registration: Dates & Time: 5 November, 2015 (1:00 pm 5:00 pm) and 6 November, 2015 (8:00 am 5:00 pm) Registration: Community Cybersecurity Exercise Planning MGT385 Dates & Time: 1 December, 2015 (1:00 pm 5:00 pm) and 2 December, 2015 (8:00 am 5:00 pm) Registration: Dates & Time: 3 December, 2015 (1:00 pm 5:00 pm) and 4 December, 2015 (8:00 am 5:00 pm) Registration:
Training Opportunities
FEMA Independent Study Courses IS-288.A: The Role of Voluntary Organizations in Emergency Management To complete the above course please visit the FEMA Independent Study Website at: http://training.fema.gov/is
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationNovember is National Critical Infrastructure Security & Resilience Month
November is National Critical Infrastructure Security & Resilience Month In celebration of this very important awareness and the developing Critical Infrastructure and Key Resources (CIKR) Program for
More informationAll Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness
All Eyes: A Security Breach Exercise Disaster Recovery/Security and Business Continuity Readiness Commonwealth of Pennsylvania Molly Dougherty, Director Continuity of Government and Records Information
More informationJuly 2015-August 2016
STATE OF MARYLANDONSE OPERATIONS PLAN (SROP)Maryland Preparedness Planning Certificate Program (MPPCP) July 2015-August 2016 A Center for Preparedness Excellence 1 A CENTER FOR PREPAREDNESS EXCELLENCE
More informationunified command course (MGT-314)
enhanced ALL-HAZARDS incident management/ unified command course (MGT-314) I was sent to St. Bernard Parish, Louisiana, as the incident commander for 16 days following Hurricane Katrina. The training I
More informationMaryland Fire and Rescue Institute University of Maryland College Park
Homeland Security Exercise and Evaluation Program HSEEP By: Richard Armstrong, BS, CFPS, Fire Officer IV Regional Coordinator MFRI, North East Regional Office Maryland Fire and Rescue Institute University
More informationTCOM 562 Network Security Fundamentals
TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class
More informationActive Threat Scenario (ATS) RFP 1. INTRODUCTION
1. INTRODUCTION The Cook County Department of Homeland Security and Emergency Management (DHSEM) plays a lead role in the homeland security and emergency management mission within the Chicago Urban Area;
More informationTexas Department of Public Safety Texas Division of Emergency Management. Preparedness Standards for Emergency Management in Texas TDEM-100
Texas Department of Public Safety Texas Division of Emergency Management Preparedness Standards for Emergency Management in Texas June 2000 FOR ADDITIONAL INFORMATION Requests for additional copies of
More informationNational Domestic Preparedness Consortium. Preparing the Nation through Training
National Domestic Preparedness Consortium Preparing the Nation through Training NDPC Mission Statement To enhance the preparedness of territories, state, local, and tribal emergency responders/first receivers
More informationPortal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives
Portal Storm: A Cyber/Business Continuity Exercise Cyber Security Initiatives Commonwealth of Pennsylvania Office of Administration Tony Encinias, Chief Information Officer Project Initiated: January 2013
More informationST. JOHNS COUNTY COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APRIL 2012. Appendix E. Training Program
ST. JOHNS COUNTY COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APRIL 2012 Appendix E Training Program Appendix E Training - 1 I. PURPOSE St. Johns County Training Appendix To outline a training program that
More informationMaryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015
Maryland Preparedness Planning Certificate Program Pilot 2014 2015 Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015 A Center for Preparedness Excellence A Center for
More informationNew Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities
New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities NMDHSEM, State Administrative Agency (SAA) PO Box, 27111, Santa
More informationBusiness Continuity Exercise Program (BCEP) Information Packet
BUSINESS CONTINUITY PLANNING Business Continuity Exercise Program (BCEP) Information Packet This exercise program was developed by the Texas Engineering Extension Service (TEEX) A Member of the Texas A&M
More informationPHILADELPHIA GAS WORKS Business Continuity Plan and Consulting RFP # 28576 Questions & Answers Emailed April 21, 2014
Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 QUESTIONS Under Task 1: It appears there are two tabletop exercises to be provided? Is there an estimate of how many personnel will take part in each exercise? Will PGW provide
More informationSupplemental Tool: NPPD Resources to Support Vulnerability Assessments
Supplemental Tool: NPPD Resources to Support Vulnerability Assessments NPPD Resources to Support Vulnerability Assessments Assessing vulnerabilities of critical infrastructure is an important step in developing
More information2015 Emergency Management Course Schedule
2015 Emergency Management Course Schedule NOTE: ALL COURSES WILL NOW BE OFFERED AT THE CENTER FOR LEARNING AND INNOVATION 1979 MARCUS AVE. LAKE SUCCESS, NY 11042 EXCEPT WHERE NOTED HazMat for Healthcare
More informationv. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
More informationTampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE
Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE This page intentionally left blank Tampa Bay Catastrophic Plan Hurricane Phoenix A Storm Recovery Tabletop Exercise August 5, 2010 EXERCISE
More informationThis presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.
1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic
More informationCRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1
CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security
More informationPROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
More informationThe University of Southern Mississippi National Center for Spectator Sports Safety and Security. Sport Event Security Aware Designation
The University of Southern Mississippi National Center for Spectator Sports Safety and Security Sport Event Security Aware Designation Frequently Asked Questions September 2015 What is Sport Event Security
More informationBusiness Continuity / Disaster Recovery Context
Capability Business Continuity / Disaster Recovery Context What is Business Continuity? The Business Continuity Program Life Cycle Copyright: Virtual Corporation, 1994 2006 Modified U.S. DoD Graphic Normal
More informationSESSION SUMMARIES BLOCK A SESSIONS. Center for Domestic Preparedness (CDP)
SESSION SUMMARIES Below are summaries of the sessions that the NDPC partners will be presenting at the 2014 NSAA Training Symposium. Within a week of the CDP receiving your application you will be sent
More informationDisaster Design: How to Develop and Conduct an Effective Tabletop Exercise
Community College Risk Management Consortium July 23 24, 2015 Disaster Design: How to Develop and Conduct an Effective Tabletop Exercise JEFF COPELAND JULY 2015 Disaster by Design How to develop and conduct
More informationEmergency Management Organization
Organization To save lives, preserve property, and protect the environment during emergencies and disasters through coordinated prevention, protection, preparation, response and recovery actions. Director
More informationFor Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015. For Official Use Only
For Official Use Only Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015 For Official Use Only SPRINGFIELD-GREENE COUNTY Point of Contact Erin Pope
More informationState Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
More informationChemical Sector Training Resources Guide. 010 July 2011
Chemical Sector Training Resources Guide 010 July 2011 Homeland Security DRAFT June 2010 Table of Contents Introduction... 1 Organizations Federal Emergency Management Agency.. 1 National Protection and
More informationCybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com jrobles@coqui.net 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
More information2012 Business Continuity Conference Friday, November 9, 2012
South Central PA Regional Business Preparedness Campaign 2012 Conference Friday, November 9, 2012 The South Central PA Task Force will hold a Regional Conference on Friday, November 9, 2012, at the C.
More informationWhich cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
More informationOffice of Emergency Management
Emergency Management Mission The Office of Emergency Management (OEM) coordinates and collaborates with its partners to reduce the impact of emergencies and disasters, through a comprehensive emergency
More informationEmergency Management Program
Emergency Management Program The Emergency Management and Civil Protection Act, R.S.O. 1990,c.E.9 and its associated regulations and standards, requires all Ontario Municipalities to implement a mandatory
More informationSecurity+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
More informationInformation Technologies for Homeland Security Program Assessment Plan 5/3/2011
Last Revised 5/3/2011 Catalog Description The Computer Information Systems (CIS) Associate Degree program is designed to provide a solid foundation in the fundamental skills that are generally required
More informationCybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
More informationESF 02 - Communications Annex, 2015
ESF 02 - Communications Annex, 2015 Table of contents I. Introduction... 3 A. Purpose... 3 B. Scope of Operations... 3 C. Specific Authorities and References... 4 II. Situation and Assumptions... 4 A.
More informationConference Sponsorship Opportunities
Conference Sponsorship Opportunities The #1 Business Continuity Publication in the World Every issue, Disaster Recovery Journal (DRJ) delivers how-to, in depth knowledge into business continuity planning
More informationUsing the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
More informationOverview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
More informationThe DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA
The DS Information Assurance and Cybersecurity Role-Based Training Program Diplomatic Security Training Center (DSTC) Dunn Loring, VA IAB Mission The Information Assurance Branch s (IAB s) mission is to
More informationMONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF14-Long Term Community Recovery
MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN ESF14-Long Term Community Recovery Planning Team Support Agency Coffeyville Public Works Independence Public Works Montgomery County Public Works 1/15/2009
More informationFFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationCan your Organization survive a natural disaster?
Can your Organization survive a natural disaster? Objectives Provide an overview of Business Continuity and Resumption Educate an emergency manager on the processes privates businesses most perform preparing
More informationNotice of Funding Opportunity (NOFO):
Federal Program: State Homeland Security Program (SHSP): SHSP supports the implementation of risk driven, capabilities-based State Homeland Security Strategies to address capability targets set in State
More informationOverview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements
Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Jim Weldin Delaware League of Local Governments 1 Homeland Security Grant Funding
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary
More informationISM527 - Cyber Security Management
ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number
More informationHealthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
More informationTop Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7
Top Five Things You Need to Know About Cybersecurity Larry Mattox, VC3 Session #7 Cyber breaches are more sophisticated and can happen to any size organization. Victims of Cyber-espionage CNN, Washington
More informationDealer Member Cyber-security
Administrative Notice General Please distribute internally to: Legal and Compliance Senior Management Contact: Wendy Rudd Senior Vice President, Member Regulation and Strategic Initiatives 416 646-7216
More informationContinuity Plan Testing Flowchart
Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services Continuity Plan Testing Flowchart 1 Ongoing Multi-Year Testing Full Scale Exercises
More informationUsing Exercises to Measure Preparedness August 6th 2015 11:00 AM Paul D. Biddinger, MD FACEP Elena Savoia, MD MPH
Using Exercises to Measure Preparedness August 6th 2015 11:00 AM Paul D. Biddinger, MD FACEP Elena Savoia, MD MPH 4 Acknowledgements We gratefully acknowledge funding support from the U.S. Centers for
More informationBay Area Regional Catastrophic Planning Team Urban Shield 2013 Functional and Full Scale Exercise
Bay Area Regional Catastrophic Planning Team Urban Shield 2013 Functional and Full Scale Exercise Read-Ahead Package For April 25, 2013 Regional Catastrophic Plans BAY AREA UASI FUNCTIONAL EXERCISE OVERVIEW
More informationIt also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster.
Emergency Support Function #2 Communications ESF Coordinator: Information Technology Department Support Agencies: Tucson Fire Department Parks and Recreation Department Tucson Police Department Tucson
More informationCommunity Cyber Security. Center for Infrastructure Assurance and Security
Community Cyber Security Overview CIAS program Nevada implementation Get involved Physical and Cyber Threats Intersect The most destructive scenarios involve cyber actors launching several attacks on our
More informationCyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
More informationU.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO
U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW November 12, 2012 NASEO ISER Response: from site focused to system focused Emergency Preparedness, Response, and Restoration Analysis and
More informationTexas Exercise Frequently Asked Questions 2013
What documents or resources are available for EMPG exercise requirements? Each fiscal year s Local EMPG Guide and associated Information Bulletins are available at http://www.txdps.state.tx.us/dem/councilscommittees/empg/index.htm
More informationFlooding Emergency Response Exercise
Flooding Emergency Response Exercise James Woodward, Senior Exercise Planner California Emergency Management Agency 3650 Schriever Ave. Mather, CA 95655 Cell: (916) 439-3546 Email: james.woodward@calema.ca.gov
More informationJune 2015 Communications Full-Scale Exercise
June 2015 Communications Full-Scale Exercise Exercise Plan June 22-26, 2015 The Exercise Plan gives elected and appointed officials, observers, media personnel, and players from participating organizations
More informationTestimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
More informationCybersecurity: The Legal, Legislative and Regulatory Outlook
Cybersecurity: The Legal, Legislative and Regulatory Outlook Jamie Barnett Rear Admiral USN (Retired) Co-Chair, Telecommunications Partner in Cybersecurity Practice Cybersecurity Impact and Costs Direct
More informationEC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
More informationNational Emergency Response
National Emergency Response and Rescue Training Center DHS/FEMA-Funded Courses Preparing the Nation Through Training 1 Our Role In National Preparedness The National Emergency Response and Rescue Training
More informationCyber and Data Risk What Keeps You Up at Night?
Legal Counsel to the Financial Services Industry Cyber and Data Risk What Keeps You Up at Night? December 10, 2014 Introduction & Overview Today s Discussion: Evolving nature of data and privacy risks
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationRegina Phelps, CEM, RN, BSN, MPA Conference Offerings
Regina Phelps, CEM, RN, BSN, MPA Conference Offerings PLENARY SESSION TOPICS... 2 The Greatest Threat in Our Lifetime? What are You Doing to Get Ready!?!... 2 It s hard to plan if you don t know what you
More informationEmergency Management Organization
Organization To save lives, preserve property, and protect the environment during emergencies and disasters through coordinated prevention, protection, preparation, response and recovery actions. Director
More informationBuilding an effective Tabletop Exercise. Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services
Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Con$nuity Plan Tes$ng Flowchart 3/26/2013 #2 Ongoing Mul$ Year Tes$ng
More informationReport on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
More informationSalem Community College Course Syllabus. Section I. Course Title: Principles of Emergency Management. Course Code: EME101.
Salem Community College Course Syllabus Section I Course Title: Principles of Emergency Management Course Code: EME101 Lecture Hours: 3 Lab Hours: 0 Credits: 3 Course Description: This is a three credit
More informationHow To Prepare For A Disaster
Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Continuity Plan Testing Flowchart 3/26/2013 #2 1 Ongoing Multi-Year
More informationMSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
More informationSeptember 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for
Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The
More informationApplication for Membership
Application for Membership This Application for Industry Membership is subject to approval by EnergySec. By executing the Membership Application and Membership Agreement and submitting payment for membership
More informationSummer Public Health Preparedness Webinar Series Presents: Emergency Management and Public Health Preparedness
Summer Public Health Preparedness Webinar Series Presents: Emergency Management and Public Health Preparedness Alignment of Public Health, Healthcare, and Emergency Management Preparedness Todd Talbert,
More informationCritical Infrastructure and Pandemic Preparedness
BLUE CASCADES IV: Critical Infrastructure and Pandemic Preparedness ACTION PLAN Participants in the BLUE CASCADES IV tabletop exercise held January 26, 2007 in Seattle, WA, reconvened on June 5 at the
More informationSTATE HOMELAND SECURITY GRANT PROGRAM
FY2015 State Homeland Security Investment Justifications STATE HOMELAND SECURITY GRANT PROGRAM OREGON OFFICE OF EMERGENCY MANAGEMENT www.oregon.gov/omd/oem Mailing address: P.O. Box 14370 Salem, OR 97309-5062
More informationProtecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
More informationNORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM
NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM October 15 th, 2013 Table of Contents Program Overview and Administration:...4 Certification process:...4 Responsibilities:...4 North Carolina
More informationCybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards
More informationInformation Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
More informationHow To Learn The Incident Command System
Incident Command System Training Guide Course description ICS - 100 Introduction to ICS is intended for personnel assigned to an incident or event who have a minimum requirement for understanding ICS.
More informationData Analytics & Information Security
Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda
More informationJefferson County Homeland Security & Emergency Management www.jeffersoncountywv.org/homeland-security.html
October, 2014 Jefferson County Homeland Security & Emergency Management www.jeffersoncountywv.org/homeland-security.html October, 2014 Jefferson County Commissioners: Walt Pellish, President Jane Tabb,
More informationDePaul University College of Commerce School of Accountancy and Management Information Systems
Instructors: DePaul University College of Commerce School of Accountancy and Management Information Systems MIS 798: Spring Semester - IT Service Management Strategy and Design Syllabus 04/01/2013 Michael
More informationBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose
More informationCyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
More informationCYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
More informationHow To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
More information2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow
2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer
More informationLessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
More information318 DECREE. of the State Office for Nuclear Safety of 13 June 2202,
318 DECREE of the State Office for Nuclear Safety of 13 June 2202, On details for emergency preparedness assurance at nuclear installations and workplaces with ionizing radiation sources and on requirements
More information