1 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical Infrastructure Protection Board The White House
2 Foundation The nation s Strategy to Secure Cyberspace must be consistent with the core values of its open and democratic society. Americans expect government and industry to respect their privacy and protect it from abuse. This respect for privacy is a source of our strength as a nation.
3 OVERVIEW Lessons Learned from September 11 The National Strategy to Secure Cyberspace Privacy and Security The Health Care Sector
4 Overview Cybersecurity is essential to --- Our national security; Our nation s economic well-being; Law enforcement/public safety; and Privacy. Our overall strategic goal is to empower all Americans to secure their portions of cyberspace.
5 Learning Lessons from History Hindsight is not always 20/20 We do not learn the same lesson Our memories are short
6 Lessons Learned We have enemies. Our enemies are smart. We must never underestimate them.
7 Lessons Learned We must be prepared for the likelihood that our enemies will use our technologies against us. Our enemies will find the seams, the holes, the weaknesses in our society and they will exploit them to harm us.
8 Lessons Learned Our economic system is fragile and far more interdependent than we realize.
9 Lessons Learned We need to work together to face the future. We need a public-private private partnership the likes of which this nation has never seen.
10 Lessons Learned We must stop reasoning by analogy -- thinking that we have seen the worst case that if it has not happened before it will not happen in the future.
11 Dangers A Spectrum Low end: teenage joyriders Up the spectrum: individuals engaged in ID theft, fraud, extortion, and industrial espionage Nations engaged in espionage against U.S. companies and U.S. government Far end: nations building information warfare units
12 The Case for Action Information technology revolution has changed the way -- business is transacted, government functions, and national defense is conducted. Those three functions now depend on an interdependent network of information technology infrastructures
13 The Case for Action Protection of our information systems is essential to our critical infrastructures: telecommunications, energy, financial services, manufacturing, water, transportation, health care, and emergency services
14 The Case for Action The Internet is at the core of the information infrastructure Internet was designed to easily share unclassified research among friends and colleagues; security not a concern Has grown increasingly insecure Around the globe people can access a network that is ultimately connected to networks that run critical functions in U.S.
15 The Case for Action A Spectrum of Danger Low end: : teenage joyriders Up the spectrum: : individuals engaged in ID theft, fraud, extortion, and industrial espionage Nations engaged in espionage against U.S. companies and U.S. government Far end: : nations building information warfare units
16 The Case for Action Cyber attacks occur regularly and can have serious consequences, disrupting critical operations, causing loss of revenue and intellectual property It is the policy of the United States to protect against disruptions of information systems for critical infrastructures Ensure disruptions are infrequent, minimal duration, manageable, cause least damage
17 A New Paradigm Stop focusing on specific threats Focus on vulnerabilities
18 THE PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD Scope is directed by Executive Order 13231: The protection of information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems.
20 Relationships The President National Security Council For International Issues PCIPB Office of Homeland Security For Domestic Issues Infrastructure Interdependencies Committee. R&D Committee. Incident Response Committee
21 PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD What are the committees and who chairs them? Private Sector/State & Local Outreach Commerce Executive Branch Info Systems Security OMB National Security Systems DOD Incident Response Coordination FBI/DOD Research & Development OSTP Infrastructure Interdependencies OE/DOT
22 PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD Board committees - continued Finance and Banking Treasury Education NSA/DOA International Affairs State Physical Security of Information Systems DOJ/DOD National Security Emergency Preparedness Communications DOD
23 What are the guiding principles of the Board? PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD Encourage market forces to improve security, rather than using a regulatory approach Share information among and between companies, departments and agencies, and state/local govts.
24 PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD Guiding principles - continued Create public/private partnership solutions to IT security Clean up the Federal Government s own IT security problems as a model Foster public/ corporate awareness of importance of IT security
25 THE PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD What is the Board doing? The Board has been tasked by the President to create a National Strategy to Secure Cyberspace 18th --comments on September 18 draft due Nov. --a policy and programmatic road map for government and industry --a modular strategy, on-line, adaptable to new threats and new technology
26 The National Strategy to Secure Cyberspace Comment due November 18
27 Strategy as Process Government 53 Questions Posted on multiple web sites Published in media Town Halls in 4 cities Numerous interviews, speeches, media events Non-Government Infrastructure sector plans 100 s of pages of answers to questions Higher Education Strategy input For sector strategies:
28 National Strategy to Secure Cyberspace Introduction Case for Action Policy and Principles Highlights Level 1: Home Users and Small Business Level 2: Large Enterprises
29 National Strategy to Secure Cyberspace Level 3: Sectors Federal State and Local Higher Education Private Industry Level 4: National Priorities Level 5: Global
30 Cyber R&D Priorities Short Term (1-3 3 yrs) Enterprise wide automated security policy enforcement - Improvements in software patch management - Development and testing of protocols needed to secure the mechanisms of the Internet - Development and testing of security mechanisms for Supervisory Control and Data Acquisition (SCADA) Systems
31 Cyber R&D Priorities ShortTerm (1-3 3 yrs) - Development of secure operating Systems Expand the Institute for Information Infrastructure Protection s R&D agenda gap analysis program - Develop security enhancements for Ad hoc networks and grid computing
32 Cyber R&D Priorities Medium Term (3-5 yrs) - Secure routers and switches and protocols - Development of new protocols for Internet and wireless that maintain security at higher speeds and scales - Investigation of the security implications of intelligent agent software in networks
33 Cyber R&D Priorities Long Term (5-10 yrs) - Fundamental shifts in technology and the development of novel or unforeseen applications, e.g., nano technology, quantum computing - Provide a sound theoretical, scientific, and technological basis for assured construction of safe, secure systems
34 Cyber R&D Priorities Long Term (5-10 yrs) - Ultrasecure communications over optical backbone networks - Orders of magnitude increases in the speed of algorithms such as for searching unsorted databases
35 Level 1 Home Users/ Small Business The strategic goal is to empower the home user and small business person to protect their cyberspace and prevent it from being used to attack others. Key Themes You have a role in cyberspace security You can help yourself (Links to get help) Promoting more secure Internet access
36 Level 2 Large Enterprise The strategic goal is to encourage and empower large enterprises to establish secure systems. Key Key themes: Raising the level of responsibility, Creating corporate security councils for cyber security, where appropriate, Implementing ACTIONS and best practices, Addressing the challenges of the borderless network.
37 Level 3 Critical Sectors Level 3 addresses specific sectors critical to cybersecurity, including: Federal Government, State/ Local Governments, Higher Education, and Private sector
38 Strategy as Process Sectors Preparing Strategies Electricity North American Electrical Reliability Council Oil & Gas National Petroleum Council Water American Water Works Association Transportation (Rail) Association of American Railroads Banking & Finance Financial Services Round Table, BITS, Information & Communications Information Technology Association of America, Telecommunications Industry Association, United States Telecommunications Association Cellular Telecommunications and Internet Association, Chemicals (Self-organized) Education (self-organized)
39 Level 4 National Priorities Securing shared systems - Securing the mechanisms of the Internet - Digital Control Systems - Research and development - Highly secure and trustworthy computing - Securing emerging systems - Vulnerability remediation
40 Level 4 National Priorities Fostering a reinforcing economic and social framework - Awareness - Training and education - Certification - Information sharing - Cybercrime - Market forces - Privacy and civil liberties
41 Level 4 National Priorities Developing national plans and policy - Warning and analysis - Continuity of operations, reconstitution and recovery - National security - Interdependency and Physical security
42 Level 5 - Global The strategic goal is to ensure the integrity of global information networks. Key Key themes: Promote national and international watch and warning Council of Europe Cybercrime Convention North American Cyber Safe Zone Cyber Points of Contact Promote global culture of security
43 THE PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD What are some of the Board s Priorities? 1.Awareness: The National Cyber Security Alliance and its StaySafeonLine campaign 2.Education: The CyberCorps Scholarship for Service program 3.Info Sharing: The Cyber Warning & Info Network (CWIN) between Govt and Industry; limited FOIA exemption
44 THE PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD Board s Priorities - Continued 4. Research: The CyberSecurity Research Consortium and a national research agenda 5. Protecting Internet Infrastructure: projects to secure Domain Name Servers and Border Gateway Protocols, blunt Distributed Denial of Service attacks 6. Physical Security of Key Nodes
45 THE PRESIDENT S CRITICAL INFRASTRUCTURE PROTECTION BOARD Board s Priorities - Continued 7. Standard & Best Practices: including relating to Federal procurement 8. Digital Control Systems: securing utilities and manufacturing control systems 9. Securing Future Systems: beginning with new Wireless web enabled devices
46 Privacy and Security The National Strategy must be consistent with the core values of our open and democratic society - - protecting privacy is fundamental.
47 Privacy and Security Explosion in information technology and the interconnectedness of information systems with the Internet raises legitimate concerns and challenges. We must ensure the integrity, reliability, availability, and confidentiality of data in cyberspace.
48 Privacy and Security Privacy and security have common themes: stopping access, use, and disclosure of information. Good security should promote privacy protection by creating a record of access to information.
49 Common Themes Identity and authority are critical Identity theft Financial records/access Health records/access Need multiple verification - basic passwords are not sufficient
50 Privacy and Security Requires technology to facilitate fair information practices Notice and awareness Choice and consent Access (by subject) Information quality and integrity Update and correction Enforcement and recourse
51 Privacy Technology The Privacy Framework ISTPA - International Security, Trust, and Privacy Alliance An open, policy-configurable configurable model of privacy services and capabilities ISTPA will work with Carnegie Mellon to enhance Framework and develop a Digital Privacy Handbook
52 The Privacy Framework Audit Certification of credentials Control - only permissible access to data Enforcement - redress when violation Interaction - manages data/preferences Negotiation Validation - checks accuracy of pers.. info. Access - subject can correct/update info. Usage - process monitor
53 Strategy - Draft Govt. commitment to enforcement Consult with privacy advocates Expand GISRA audits to include privacy Encourage industry protect privacy Federal government lead by example Educate end-users about privacy; encourage informed choices
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS email@example.com Purpose Provide an overview on integrating
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
Information Assurance and Critical Infrastructure Protection A Federal Perspective Information Assurance Presented by the Government Electronics and Information Technology Association 2001 Executive Summary
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 Bruce.Heiman@klgates.com (202) 661-3935 Why share information? Prevention
Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE CYBER SECURITY AND INFORMATION ASSURANCE RESEARCH AND DEVELOPMENT SENIOR STEERING GROUP OF THE FEDERAL NETWORKING AND INFROMATION TECHNOLOGY
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel firstname.lastname@example.org September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz email@example.com IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Mark Luker and Rodney Petersen Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
U:\0REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR0-AMNT.xml DIVISION N CYBERSECURITY ACT OF 0 SEC.. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 0.
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights
3 rd Japan & US Computer Crime & Security Survey Katsuya Uchida Associate Professor Institute of Information Security firstname.lastname@example.org Graduate School of Information Security Intentionally blank Respondents
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com email@example.com 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments