Assuring Telecom (Infrastructure and Services) An Operations Perspective

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Assuring Telecom (Infrastructure and Services) An Operations Perspective"

Transcription

1 Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective

2 IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and Programs Promote ICT Sector Development

3 Assure Telecom Infrastructure and Services Operational Perspective To assure telecom availability and integrity for public safety: Partner with private industry and other departments to exchange information and expert advice and to develop mechanisms to assure telecom networks Partner bilaterally with PSEPC, and with our US and UK counterparts to provide the telecom industry with pre-releases of Alerts and Advisories affecting telecommunications Exchange information and expert advice with US and UK Network Security Information Exchanges and Telecom watches

4 Assuring Telecom Infrastructure and Services Operational Perspective Partner with Industry: Canadian Telecom Cyber Protection Working Group (CTCP) Canadian Telecommunications Emergency Preparedness Association (CTEPA) Develop and maintain new services: Priority Access for Dialing (PAD) Wireless Priority Service (WPS) High Probability of Completion (HPC) Public Alerting and Warning

5 Canadian Cyber Protection Working Group (CTCP) Joint industry/government Working Group Mission is to cooperate and collaborate on technical and operational safeguards that enhance the cyber security of networks through active defense utilizing Prevention, Detection, Response and Recovery Emphasis on information and network systems Current Industry members are IT Security Managers from 7 Telcos (Aliant, Bell, MTS-Allstream, Telus, Sask Tel, Sprint) Government members are Industry Canada and PSEPC Industry Canada provides the chair and secretariat

6 CTCP objectives Collaborate through best practices, exercises, and industry-to-industry exchange Understand current level of protection against cyber threats to telecom CI Enhance the overall cyber protection through outreach to other sectors, carriers, ISPs and government Exchange information on attacks, vulnerabilities, exploits, R&D, government intelligence. Liaise with the Canadian Telecommunications Emergency Preparedness Association (CTEPA) on areas of mutual concern and interest

7 CTCP method of operation Terms of Reference Membership criteria Baseline for Sharing Meeting format: weekly what s-hot teleconferences (1/2 hour) monthly one-hour teleconferences (1 hour) quarterly face-to-face meetings (2 day)

8 CTCP Status Accomplishments Built trust industry/government Shared timely and pertinent information Developed points of contacts and outreach procedures Undertook work on best practices for Incident Handling, etc. Completed baseline security survey Security clearance procedures for members Linkages with international partners in the CERT, telecom and government communities Next Steps Expand telecom membership wireline and wireless Develop linkages and collaborate with other stakeholders and sectors Develop major event incident handling best practices Develop incident response exercises Advance awareness, outreach, validation, response Additional best practices in new areas

9 Canadian Telecommunications Emergency Preparedness Association Former Stentor Alliance EP Committee Open to all facilities based wireline, wireless and satellite Canadian Common Carriers telecommunications companies Create a united commitment and vision for telecom emergency preparedness related to a National or Regional disaster Share and exchange information on common national emergency preparedness issues Ability to work in non-competitive harmony during a regional or national disaster Sharing of resources plus access to Federal and US resources Interfaces federally through Industry Canada

10 Priority Access for Dialing (PAD) List of telephone numbers deemed essential during emergencies List of numbers maintained by Industry Canada Lines are given priority dial tone access should the telephone system be temporarily degraded or overloaded Provided by Telco terminating the subscriber loop Assists with outbound call set-up Does not provide inbound or point-to-point priority

11 Wireless Priority Service (WPS) Enhancement to basic mobile service Allows equipped mobile instruments to queue for next available service channel Invoked by dialling *272 prior to the destination number Not intended for all emergency personnel Only authorized for key positions Five priority levels Doesn t preempt existing calls or guarantee completion Application submitted via Industry Canada Approved by jurisdiction authority, e.g., Provincial authority for employees under provincial, territorial and municipal jurisdiction

12 High Probability of Completion (HPC) HPC is a technology Industry Canada is investigating Would complement existing Priority Access for Dialling in times of emergency Intended for extremely stressed networks: When demand exceeds network capacity; and When essential emergency response communications are crucial PAD allows priority dial tone HPC would allow priority call set-up and queuing Remains active during restrictive network management controls No guarantee, but higher probability of completion

13 Public Alerting & Warning Coordinate a Canada-Wide Public Alerting / Warning System to warn the public of imminent dangers such as tornadoes, dangerous chemical spills and other man-made or natural disasters Established Federal Government Committee Provincial Champions Group Broadcasters Working Group Drafting a Guide to standardize message formats and protocols Conducting a number of field trials including : Radio and Television Broadcasting, Radio Data Service, Telephone based technologies and the Internet

14 Canada Ensuring a robust and reliable telecommunications infrastructure and a strong ICT sector Fulfilling our Telecommunications and Information Technology responsibilities for the National Security Policy

HOW IT WORKS: THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction

HOW IT WORKS: THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction HOW IT WORKS: THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction The Government Emergency Telecommunications Service (GETS) is an easy-to-use calling card program that provides authorized

More information

National Communications System. December 6, 2007

National Communications System. December 6, 2007 1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate

More information

It also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster.

It also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster. Emergency Support Function #2 Communications ESF Coordinator: Information Technology Department Support Agencies: Tucson Fire Department Parks and Recreation Department Tucson Police Department Tucson

More information

Network Security Policy: The U.S. Experience. The U.S. Experience. Patricia Cooper International Bureau U.S. Federal Communications Commission

Network Security Policy: The U.S. Experience. The U.S. Experience. Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:

More information

DHS, National Cyber Security Division Overview

DHS, National Cyber Security Division Overview DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined

More information

State Homeland Security Strategy (2012)

State Homeland Security Strategy (2012) Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,

More information

ESF 02 - Communications Annex, 2015

ESF 02 - Communications Annex, 2015 ESF 02 - Communications Annex, 2015 Table of contents I. Introduction... 3 A. Purpose... 3 B. Scope of Operations... 3 C. Specific Authorities and References... 4 II. Situation and Assumptions... 4 A.

More information

UCF Office of Emergency Management. 2013-2018 Strategic Plan

UCF Office of Emergency Management. 2013-2018 Strategic Plan UCF Office of Emergency Management 2013-2018 Strategic Plan Table of Contents I. Introduction... 2 Purpose... 2 Overview... 3 Mission... 5 Vision... 5 II. Mandates... 6 III. Accomplishments and Challenges...

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

TELUS Business Continuity Program past and future

TELUS Business Continuity Program past and future TELUS Business Continuity Program past and future Presentation to EPICC 6 th Annual Seminar Victoria, BC September 17, 2010 John Yamniuk, MBCP Member of the TELUS team TELUS BCM Purpose To provide an overview

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

NFPA 1600 THE NATIONAL PREPAREDNESS STANDARD. By Donald L. Schmidt

NFPA 1600 THE NATIONAL PREPAREDNESS STANDARD. By Donald L. Schmidt ARTICLE TITLE By Donald L. Schmidt NFPA 1600 THE NATIONAL PREPAREDNESS STANDARD NFPA 1600 GIVES businesses and other organizations a foundation document to protect their employees and customers in the

More information

2010-2011 STATEMENT OF MANDATE

2010-2011 STATEMENT OF MANDATE 2010-2011 STATEMENT OF MANDATE TABLE OF CONTENTS 1. Message from Minister and Deputy Head 3 2. Mandate 5 3. Vision 5 4. Mission 6 5. Performance Measures 7 6. Financial Context and Budget 17 2 1. Message

More information

Public Safety Messaging System: Telecommunications Emergency Alerting Capabilities

Public Safety Messaging System: Telecommunications Emergency Alerting Capabilities 99 Airport Road PO Box 669 Concord, NH 03302 USA Toll Free 888-CLASSCO Fax +1 435 228-2990 www.classco.com System: Telecommunications Emergency Alerting Capabilities Summary: This paper describes an emergency

More information

Federal Emergency Preparedness and Response System

Federal Emergency Preparedness and Response System Annex L Federal Emergency Preparedness and Response System Date of Latest Version: October 2006 Summary of Significant Changes: Reflects the establishment of the new department Public Safety and Emergency

More information

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 COMMENTS OF THE ALLIANCE FOR TELECOMMUNICATIONS INDUSTRY SOLUTIONS

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 COMMENTS OF THE ALLIANCE FOR TELECOMMUNICATIONS INDUSTRY SOLUTIONS Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991 ) CG Docket No. 02-278 ) ) COMMENTS

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

EMERGENCY MANAGEMENT PLAN (revised June 2012)

EMERGENCY MANAGEMENT PLAN (revised June 2012) EMERGENCY MANAGEMENT PLAN (revised June 2012) TABLE OF CONTENTS Introduction... 2 1. Objectives and Priorities 2. Review and Assessment Authority... 3 Supporting Documentation... 4 Key Terms and Roles...

More information

ANNEX 9. PUBLIC INFORMATION AND WARNING

ANNEX 9. PUBLIC INFORMATION AND WARNING ANNEX 9. PUBLIC INFORMATION AND WARNING Rapid dissemination of warning and emergency information about an imminent or occurring emergency is critical to protecting life, safety, and health during an emergency.

More information

National Cybersecurity & Communications Integration Center (NCCIC)

National Cybersecurity & Communications Integration Center (NCCIC) National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

More information

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department

More information

Telecom Decision CRTC 2006-50

Telecom Decision CRTC 2006-50 Telecom Decision CRTC 2006-50 Ottawa, 11 August 2006 Bell Canada Part VII application regarding Ethernet and digital subscriber line services in TELUS Communications Company's territory in Quebec Reference:

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Written Statement Of. Communicating with the Public During Emergencies: An Update of Federal Alert and Warning Efforts

Written Statement Of. Communicating with the Public During Emergencies: An Update of Federal Alert and Warning Efforts Written Statement Of James Arden Barnett, Jr., Rear Admiral (Ret.) Chief, Public Safety and Homeland Security Bureau Federal Communications Commission Communicating with the Public During Emergencies:

More information

FEDERAL EMERGENCY RESPONSE PLAN

FEDERAL EMERGENCY RESPONSE PLAN FEDERAL EMERGENCY RESPONSE PLAN JANUARY 2011 This plan has been developed by the Government of Canada in consultation with appropriate partners/stakeholders. In accordance with the Policy on Government

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

CSA Z1600 Emergency Management and Business Continuity Programs

CSA Z1600 Emergency Management and Business Continuity Programs CSA Z1600 Emergency Management and Business Continuity Programs Presented by: John Lindsay, Brandon University Department of Applied Disaster and Emergency Studies and Z1600 Technical Committee member

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

ANNEX C - EMERGENCY PUBLIC INFORMATION ESF #15

ANNEX C - EMERGENCY PUBLIC INFORMATION ESF #15 I. MNWALK REQUIREMENTS Item #: 1, 3, 16, 17, 18, 19, 20 ANNEX C - EMERGENCY PUBLIC INFORMATION ESF #15 II. PURPOSE Provide for the development, coordination and dissemination of emergency public information.

More information

INFRAGARD.ORG. Portland FBI. Unclassified 1

INFRAGARD.ORG. Portland FBI. Unclassified 1 INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Critical Manufacturing Sector Government Coordinating Council Charter

Critical Manufacturing Sector Government Coordinating Council Charter 1. Official Designation The official designation of this Council is the "Critical Manufacturing Sector Government Coordinating Council," hereinafter referred to as the "GCC" or the "Council." 2. Governance

More information

Table of Contents ESF-12-1 034-00-13

Table of Contents ESF-12-1 034-00-13 Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 2 Purpose... 3 Situations and Assumptions... 4 Direction and

More information

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures For discussion on 12 June 2000 Legislative Council Panel on Information Technology and Broadcasting Hacking and Virus Activities and Preventive Measures Purpose This paper briefs Members on the common

More information

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE A Functional Model for Critical Infrastructure Information Sharing and Analysis Maturing and Expanding Efforts ISAC Council White Paper January 31, 2004 1. PURPOSE/OBJECTIVES This paper is an effort to

More information

Public Safety and Homeland Security. National Broadband Plan Recommendations

Public Safety and Homeland Security. National Broadband Plan Recommendations Public Safety and Homeland Security National Broadband Plan Recommendations Nationwide Interoperable Public Safety Wireless Broadband Network Broadband Network Strategy Vision: For significantly less then

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the

Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the wholesale, retail and business markets. Carrier Services Access

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN

Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN I. INTRODUCTION A. PURPOSE - The University of Hawaii System Emergency Operations Plan (EOP) provides procedures for managing

More information

Threat and Hazard Identification and Risk Assessment

Threat and Hazard Identification and Risk Assessment Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of

More information

Emergency Management Plan 2 0 1 3-2 0 1 4

Emergency Management Plan 2 0 1 3-2 0 1 4 Emergency Management Plan 2 0 1 3-2 0 1 4 Bedford Campus Lowell Campus Emergency Management Plan 1 Table of Contents Emergency Management Planning................................2 Emergency Management

More information

Current Trends on Disaster Situations Telecom Regulators Perspective

Current Trends on Disaster Situations Telecom Regulators Perspective Current Trends on Disaster Situations Telecom Regulators Perspective J.A.S. Gunanandana. BSc.Eng C.Eng, MIESL Assistant Director (Interoperability) Member of the TRCSL DICOM Team Telecommunications Regulatory

More information

Cellular Networks Benefits and Shortfalls For Emergency Communications

Cellular Networks Benefits and Shortfalls For Emergency Communications Cellular Networks Benefits and Shortfalls For Emergency Communications Presented by: Richard Zinno, CBCP 2005 Sprint Nextel. All rights reserved. Agenda 1. Common Assumptions 2. Wireless network overview

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

Water Security Strategy for Systems Serving Populations Less than 100,000/15 MGD or Less

Water Security Strategy for Systems Serving Populations Less than 100,000/15 MGD or Less July 9, 2002 Water Security Strategy for Systems Serving Populations Less than 100,000/15 MGD or Less A. Background I.Introduction From its inception, the overall vision of the US Environmental Protection

More information

Telecom Notice of Consultation CRTC 2016-115

Telecom Notice of Consultation CRTC 2016-115 Telecom Notice of Consultation CRTC 2016-115 PDF version Ottawa, 29 March 2016 File number: 1011-NOC2016-0115 Call for comments Participation by wireless service providers in the National Public Alerting

More information

FICORA s strategy 2020

FICORA s strategy 2020 FICORA s strategy 2020 2 FICORA s strategy 2020 Content Introduction...4 Vision...5 Mission statement...5 Strategic goals, priorities and measures...6 Strategic goal 1: Provision of communications services

More information

Intrado Emergency Routing Service (ERS) Canada Service Guide Version 2014.12.02

Intrado Emergency Routing Service (ERS) Canada Service Guide Version 2014.12.02 Intrado Emergency Routing Service (ERS) Canada Service Guide Version 2014.12.02 2014 Intrado Inc., Longmont, Colorado, USA - All rights reserved. This documentation may not be altered, copied, distributed,

More information

National Public Alerting System (NPAS)

National Public Alerting System (NPAS) National Public Alerting System (NPAS) Status Report to the CRTC on the Participation of the Broadcast Industry January 16, 2009 REPORT CONTRIBUTORS Public Safety Canada Bell TV Canadian Association of

More information

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST Developed by the Toolkit Working Group for the Media Security and Reliability Council November 16, 2004 INDEX A. Introduction...1 1. Scope...1

More information

Critical Topics and Capabilities for Multiorganizational

Critical Topics and Capabilities for Multiorganizational Critical Topics and Capabilities for Multiorganizational Lessons Learned Susan McIntyre, Defence Research and Development Canada, Ottawa Canada Her Majesty the Queen in Right of Canada (Department of National

More information

Office of Emergency Communications Next Generation Network Priority Services

Office of Emergency Communications Next Generation Network Priority Services Office of Emergency Communications Next Generation Network Priority Services Heather Kowalski CPM Branch Chief Office of Emergency Communications Next Generation Network Priority Services Testing and Evaluation

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Terms of Reference revised November 2015

Terms of Reference revised November 2015 Summary Information Security North East () is a forum for council and public service information security managers from Northumberland, Tyne and Wear, Durham and the Tees Valley 1. is also the Warning,

More information

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers

More information

MUNICIPALITIES EMERGENCY MANAGEMENT PROGRAM EVALUATION

MUNICIPALITIES EMERGENCY MANAGEMENT PROGRAM EVALUATION MUNICIPALITIES EMERGENCY MANAGEMENT PROGRAM EVALUATION 1 PREAMBLE The Emergency Management Office s (EMO) mission is to ensure the safety and security of Nova Scotians and their property by providing for

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Administration & Finance

Administration & Finance Issuing Office: Vice Chancellor Policy Number: FY13-A&F-004-01 for Policy Name: UMass Boston Alert System Original Date Issued: April 24, 2013 Revision #: 1 Last Update: August 13, 2014 Purpose of Policy:

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

Regulatory Framework for Disaster Recovery Planning for the ICT Industry

Regulatory Framework for Disaster Recovery Planning for the ICT Industry Regulatory Framework for Disaster Recovery Planning for the ICT Industry Kingdom of Saudi Arabia Regulatory Framework for Disaster Recovery Planning for the ICT Industry Page 1 of 6 1. INTRODUCTION 1.1

More information

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

Risk and Information Security Committee Charter

Risk and Information Security Committee Charter Risk and Information Security Committee Charter Effective Date March 3, 2015 Document Summary Title: Risk and Information Security Committee Charter Policy Owner: Risk and Information Security Committee

More information

MSRC Best Practices. Communications Infrastructure Security, Access & Restoration Working Group

MSRC Best Practices. Communications Infrastructure Security, Access & Restoration Working Group MSRC Best Practices MEDIA SECURITY AND RELIABILITY COUNCIL Adopted Best Practices Recommendations Communications Infrastructure Security, Access & Restoration Working Group National Recommendations Prevention

More information

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing

More information

Federal Communications Commission Public Safety and Homeland Security Bureau

Federal Communications Commission Public Safety and Homeland Security Bureau Federal Communications Commission Public Safety and Homeland Security Bureau Spectrum Policy Seminar Department of Energy Washington, DC December 08, 2010 Jennifer A. Manner, Deputy Bureau Chief Public

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

2008-2009 2008-2009 TRENDS IN BUSINESS CONTINUITY AND CRISIS COMMUNICATIONS SURVEY

2008-2009 2008-2009 TRENDS IN BUSINESS CONTINUITY AND CRISIS COMMUNICATIONS SURVEY 2008-2009 The Second Annual Trends in Business Continuity and Crisis Communications Survey has been completed with over 700 participants from a wide range of industries and organizational sizes. The Disaster

More information

Continuity of Operations Plan Template

Continuity of Operations Plan Template Continuity of Operations Plan Template Office of Water (4608-T) EPA 817-B-14-007 November 2014 Please note: The golden key sticky notes located throughout the template provide additional information and

More information

SMALL BUSINESS. the basics. in telecommunications solutions

SMALL BUSINESS. the basics. in telecommunications solutions SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

Critical Infrastructure Tools and Resources. March 2015

Critical Infrastructure Tools and Resources. March 2015 Critical Infrastructure Tools and Resources March 2015 Overview Canada s national security and economic stability depend on the resilience of critical infrastructure (energy, finance, food, water, transportation,

More information

NAIT Guidelines. Implementation Date: February 15, 2011 Replaces: July 1, 2008. Table of Contents. Section Description Page

NAIT Guidelines. Implementation Date: February 15, 2011 Replaces: July 1, 2008. Table of Contents. Section Description Page Recommended by Emergency Preparedness Committee: January 26, 2011 Recommended by President s Council: February 11, 2011 Approved by Executive Committee: February 14, 2011 NAIT Guidelines CS1.1 Emergency

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions

More information

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers Establishing A Secure & Resilient Water Sector December 14-15, 2010 LWQTC Overview Key Drivers Legislation Presidential Directives AWWA & Sector Initiatives Standards & Guidance Mutual Aid & Assistance

More information

Why the Global Cyber Security Landscape Paints a Concerning Picture

Why the Global Cyber Security Landscape Paints a Concerning Picture SESSION ID: SPO-W07A Why the Global Cyber Security Landscape Paints a Concerning Picture Simon Goldsmith Director of Cyber Security (Commercial Sectors) BAE Systems @BAE_AI Today s Discussion PART 1 THE

More information

B E F O R E T H E E M E R G E N C Y

B E F O R E T H E E M E R G E N C Y B E F O R E T H E E M E R G E N C Y RESPONSIBILITY / LIABILITY for Homeland Security / Emergency Management Duty of Care - Counties and Cities ARE responsible for the safety of their citizens. Following

More information

Homeland Security for Schools: Threat Status Alert Worksheet

Homeland Security for Schools: Threat Status Alert Worksheet for Schools: Threat Status Alert Worksheet The Green Alert Status reflects a low risk of terrorist attacks. The primary goal of a safe school plan is to safeguard schools against crime, violence and disruption.

More information

Water Security Issues: The Federal Perspective. J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC

Water Security Issues: The Federal Perspective. J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC Water Security Issues: The Federal Perspective J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC Outline The Overall Concept for Water Security What s Important in

More information

Resilient e-communications Networks June 09. Good Practice Guide Network Security Information Exchanges

Resilient e-communications Networks June 09. Good Practice Guide Network Security Information Exchanges Resilient e-communications Networks June 09 Good Practice Guide Network Security Information Exchanges 2 3 Acknowledgements About ENISA This report was prepared by Symantec Inc. in co-operation with Landitd

More information

IceCube Cybersecurity Improvement Plan Recommendations to Enhance IceCube s Cybersecurity Program

IceCube Cybersecurity Improvement Plan Recommendations to Enhance IceCube s Cybersecurity Program Blue bar should align at far right with the far right text of the title IceCube Cybersecurity Improvement Plan Recommendations to Enhance IceCube s Cybersecurity Program January 2014 Version 1.0 For Public

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Trends and Tactics in Cyber- Terrorism

Trends and Tactics in Cyber- Terrorism Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends

More information

10.3.2 Objectives of the Public Relations Services in North America (USA and Canada).

10.3.2 Objectives of the Public Relations Services in North America (USA and Canada). THE COMPETITIVENESS AND ENTERPRISE DEVELOPMENT PROJECT (CEDP) TERMS OF REFERENCE FOR A PUBLIC RELATIONS FIRM TO REPRESENT UGANDA IN NORTH AMERICA (USA AND CANADA) 10.3.1 Project Background The Government

More information

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION Joan Fowler and Robert C. Seate III Data Systems Analysts, Inc. 10400 Eaton Place, Suite 400 Fairfax, VA

More information

GENERAL TARIFF CRTC 21461 TELUS Communications Company 5th Revised Page 201-1 Cancels 4rd Revised Page 201-1 Local Switched Access Services

GENERAL TARIFF CRTC 21461 TELUS Communications Company 5th Revised Page 201-1 Cancels 4rd Revised Page 201-1 Local Switched Access Services TELUS Communications Company 5th Revised Page 201-1 Cancels 4rd Revised Page 201-1 201 Wireless Service Provider Enhanced Provincial 9-1-1 Network Access Service 201.1 Service Description Wireless Service

More information

CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS

CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS A L L I A N C E F O R H U M A N S E R V I C E S www.alliance4hs.org CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS ALLIANCE FOR HUMAN SERVICES & MIAMI-DADE COUNTY OFFICE OF

More information

ISO & Business Continuity Management System Standards and Application for Incident Communication Plans

ISO & Business Continuity Management System Standards and Application for Incident Communication Plans ISO 22301 & 22313 Business Continuity Management System Standards and Application for Incident Communication Plans ISO 22301 & 22313: Business Continuity Management System Standards and Application for

More information

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Introduction of the GCCD. (Global Cybersecurity Center for Development) Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD

More information