Cybersecurity & Public Utility Commissions
|
|
|
- Phebe Sparks
- 10 years ago
- Views:
Transcription
1 Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission
2 NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer for State Regulators 2.0, Feb pdf Background Prioritizing systems and networks over components Ensuring that human factors are considered Deploying defense-in-depth Promoting system resilience Sample questions for regulators to ask utilities Workshops completed for 35 PUCs Special briefings, sharing best practices at NARUC meetings Resilience workshops & Resilience in Regulated Utilities paper Nov 2013,
3 State PUC Issues, Challenges Oversee utilities reliable operations and distribution Interest in third party audits, penetration testing Don t want information or plans that can t be protected (liability, confidentiality, FOIA) Emerging area: evaluating cyber-related expenses in rate cases Internet of Things is making the once air gapped ICS an easier target Often have limited technical knowledge, expertise Water/Energy nexus one of many vulnerabilities Need public/private partnership that can meet current needs, flexible to meet evolving threats, bridge federal/state efforts
4 State PUCs Overview Have adopted new rules and regulations Undergone education and training Had meetings and briefings with companies Opened dockets Consider cybersecurity in context of Advanced Metering Initiatives (AMI) - smart grid and smart meter Several states require cyber plans, e.g., AR, NY, PA Some require 3 rd party audits, e.g., NY, TX Many dockets on access to customer data (e.g., AMI), both privacy and cybersecurity concerns
5 State PUC Actions WA asks for voluntary CI Security Report, including physical and cyber, with specifics on electric utility s CI security team, training and occurrences IN held meetings with utilities, going on-site, hiring specialist DC, IN have been able to exempt certain info from FOIA PA goes on site to review practices, cyber plans; plans to do exercises on interoperability of CI CA has staff expertise, privacy initiatives and asks utilities how CI protected TX involved in response to threats
6 State, Regional Efforts FL small mgt audit group reviewing physical security of 4 IOUs and what they re doing vis-à-vis CIP 5 (report in Nov) OH met with major energy & water utilities and partner security agencies (state & federal) CT report to Governor urges third party audits IL requires submission of security plans Middle Atlantic Cybersecurity Collaborative NJ, DC, PA, MD, DE, OH, NY Goal: set forth best practices for state commission to effectively exercise their regulatory responsibilities over cyber security asked NRRI to gather state info, report soon
7 State PUCs Cybersecurity considerations by PUCs thus far have been limited but continue to expand Approximately 15 commissions have adopted cybersecurity rules or opened cybersecurity dockets The focus on cybersecurity: system protection, reliability and/or resiliency Understand that Cyber security is intrinsic to reliability Compliance does not mean security
8 Questions for PUCs NARUC suggests questions in 5 areas: planning, standards, procurement practices, personnel and policies, and systems and operations Can your commission keep security information confidential? Do your reliability standards include cybersecurity considerations? Can you join incident response exercises by your utilities or Emergency Services Agency? Is there education that will enable staff to make prudency evaluations and recommendations re expenditures? Is there training/education available to enable staff to evaluate the effectiveness of utility cybersecurity plans?
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure
NGA PAPER State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure Executive Summary Protecting the nation s energy system and infrastructure from cyber threats is of vital importance
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Cyber Security Working Group
Cyber Security Working Group National Institute of Standards and Technology U.S. Department of Commerce 1 Energy Independence and Security Act In the Energy Independence and Security Act (EISA) of 2007,
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,
The Aviation Information Sharing and Analysis Center (A-ISAC)
The Aviation Information Sharing and Analysis Center (A-ISAC) Faye Francy Aviation ISAC March 2015 The Threat A National Security Issue Rapidly escalating cyber threats Executive action Executive Order
Table 12: Availability Of Workers Compensation Insurance Through Homeowner s Insurance By Jurisdiction
AL No 2 Yes No See footnote 2. AK No Yes No N/A AZ Yes Yes Yes No specific coverage or rate information available. AR No Yes No N/A CA Yes No No Section 11590 of the CA State Insurance Code mandates the
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
Regional Electricity Forecasting
Regional Electricity Forecasting presented to Michigan Forum on Economic Regulatory Policy January 29, 2010 presented by Doug Gotham State Utility Forecasting Group State Utility Forecasting Group Began
Update of Financial Incentives for Promoting New and Renewable Energy in the U.S. Cary Bloyd EGNRET-38 Wellington, New Zealand June 18-19, 2012
Update of Financial Incentives for Promoting New and Renewable Energy in the U.S. Cary Bloyd EGNRET-38 Wellington, New Zealand June 18-19, 2012 The U.S. has a wide range of financial mechanisms that support
Billing Code: 3510-EA
Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
Tax Practice and Procedure and SBSE Update
Tax Seminar Baruch College December 3, 2012 Tax Practice and Procedure and SBSE Update Bryan Inoue - Area Director, North Atlantic SBSE, Examination Bryan C. Skarlatos, Kostelanetz & Fink, LLP [email protected]
PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Application of SOUTHERN CALIFORNIA GAS COMPANY (U 0 G) for Review of its Safety Model Assessment Proceeding Pursuant to Decision 1-1-0.
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
National Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
LIMITED LIABILITY COMPANY ORGANIZATION CHART
LIMITED LIABILITY COMPANY ORGANIZATION CHART The following Chart has been designed to allow you in a summary format, determine the minimum requirements to form a limited liability company in all 50 states
70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?
SESSION ID: GRC-W04 70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready? Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Senior Security Engineer G2, Inc.
SGIG Cyber Security Program Review Process
SGIG Cyber Security Program Review Process A. DAVID MCKINNON, PH.D. Cyber Security Group, National Security Directorate TCIPG Industry Workshop 2014 November 14, 2014 PNNL-SA-106570 1 SGIG Cyber Security
RATE FILING METHODS FOR PROPERTY/CASUALTY INSURANCE, WORKERS COMPENSATION, TITLE 11/05
11/05 Explanation: In a state with, a filing may be deemed to have been approved after a certain number of days. If such a provision exists, the number of days is noted in parentheses. File and use states
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
FOREIGN LIMITED LIABILITY COMPANY REGISTRATION CHART
FOREIGN LIMITED LIABILITY COMPANY REGISTRATION CHART When a Limited Liability Company desires to transact business in a jurisdiction other than its state of formation it must comply with the statutes of
NAAUSA Security Survey
NAAUSA Security Survey 1. How would you rate the importance of each of the following AUSA security improvements. Very important Somewhat important Not too important Not at all important Secure parking
Motor Carrier Forms Bodily Injury and Property Damage Liability
ALPHABETICAL INDEX Forms are listed alphabetically by form title. Important Note: The forms shown herein for each state may not be a complete listing of all the motor carrier bodily injury and property
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
10 Reasons Why Vertex SMB is A Better Way to Handle Your Sales and Use Tax Automation 11:00 11:30. Scott Coleman. Channel Sales Manager
11:00 11:30 10 Reasons Why Vertex SMB is A Better Way to Handle Your Sales and Use Tax Automation Scott Coleman Channel Sales Manager Agenda Landscape of the Market Today 10 Reasons Why Vertex SMB is a
U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending
U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending by State and Program Report as of 3/7/2011 5:40:51 PM HUD's Weekly Recovery Act Progress Report: AK Grants
Hiring and Compensation
Hiring and Compensation What Litigation Support and Other Legal Professionals Need to Know ACEDS Webinar August 6, 2014 Sponsored by: 2014 Robert Half Legal. An Equal Opportunity Employer M/F/D/V. ACEDS
Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:
Andrew M. Cuomo Governor Anthony J. Albanese Acting Superintendent FROM: TO: Anthony J. Albanese, Acting Superintendent of Financial Services Financial and Banking Information Infrastructure Committee
NHIS State Health insurance data
State Estimates of Health Insurance Coverage Data from the National Health Interview Survey Eve Powell-Griner SHADAC State Survey Workshop Washington, DC, January 13, 2009 U.S. DEPARTMENT OF HEALTH AND
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
TITLE POLICY ENDORSEMENTS BY STATE
TITLE POLICY ENDORSEMENTS BY STATE State Endorsement ID Endorsement Description AK ARM ALTA 6 Adjustable (Variable) Rate AK BALLOON FNMA Balloon Endorsement AK CONDO ALTA 4 Condominium AK COPY FEE Copies
State Annual Report Due Dates for Business Entities page 1 of 10
State Annual Report Due Dates for Business Entities page 1 of 10 If you form a formal business entity with the state, you may be required to file periodic reports on the status of your entity to preserve
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
LexisNexis Law Firm Billable Hours Survey Report
LexisNexis Law Firm Billable Hours Survey Report Executive Summary Despite the critical impact on a firm s bottom line, it remains challenging for some attorneys and legal staff to efficiently capture
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.
Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 8 April 2015 [email protected] Agenda Mission of NIST Cybersecurity at NIST Cybersecurity Framework
Surety Bond Requirements for Mortgage Brokers and Mortgage Bankers As of July 15, 2011
Surety Bond Requirements for Mortgage Brokers and Mortgage Bankers As of July 15, 2011 State Mortgage Broker Bond Cancellation Mortgage Banker Bond Cancellation Notes & Citations AK $75,000 minimum for
Aged Delinquent Loan Sale Federal Housing Administration. Loan Sale (ADPLS) Sales Results Summary
Aged Delinquent Loan Sale Aged Delinquent Portfolio Loan Sale (ADPLS) Sales Results Summary Bid Date: May 18, 2016 Seller: U.S. Department of Housing and Urban Development Transaction Specialist: Verdi
How To Regulate Cybersecurity In The United States
A Summary of State Regulators Responsibilities Regarding Cybersecurity Issues Daniel Phelan Research Associate National Regulatory Research Institute Report No. 14-12 December 2014 2014 National Regulatory
State Solar Policy: Overview & Trends
State Solar Policy: Overview & Trends Rusty Haynes N.C. Solar Center N.C. State University NCSL Solar Energy Institute Washington, D.C. October 19, 2007 Presentation Outline I. Financial Incentives to
1. Does your state automatically adopt each new edition of the NESC?
Survey Information United States Regulatory Commissions Adoption of the IEEE National Electrical Safety Code (NESC) The IEEE has conducted a survey of the regulatory bodies in the United States regarding
How To Rate Plan On A Credit Card With A Credit Union
Rate History Contact: 1 (800) 331-1538 Form * ** Date Date Name 1 NH94 I D 9/14/1998 N/A N/A N/A 35.00% 20.00% 1/25/2006 3/27/2006 8/20/2006 2 LTC94P I F 9/14/1998 N/A N/A N/A 35.00% 20.00% 1/25/2006 3/27/2006
Health Workforce Data Collection: Findings from a Survey of States
Health Workforce Data Collection: Findings from a Survey of States Jean Moore, DrPH David Armstrong, PhD Health Workforce Technical Assistance Center School of Public Health University at Albany, SUNY
Federation of State Boards of Physical Therapy Jurisdiction Licensure Reference Guide Topic: Continuing Competence
This document reports CEU requirements for renewal. It describes: Number of required for renewal Who approves continuing education Required courses for renewal Which jurisdictions require active practice
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
NCHRP 20-68A US Domestic Scan Program. Scan 13-02 Advances In Civil Integrated Management (CIM)
NCHRP 20-68A US Domestic Scan Program Scan 13-02 Advances In Civil Integrated Management (CIM) Scan Team Visits 2014 Presenter: Fangyu (Denise) Guo PhD student from Iowa State University CIM is the collection,
National Student Clearinghouse. CACG Meeting
National Student Clearinghouse Presentation for CACG Meeting February 2010 Dr. Jeff Tanner, Vice President The Clearinghouse A non-profit organization founded in 1993 in affiliation with several educational
ehealth Price Index Trends and Costs in the Short-Term Health Insurance Market, 2013 and 2014
ehealth Price Index Trends and Costs in the Short-Term Health Insurance Market, 2013 and 2014 June 2015 1 INTRODUCTION In this report, ehealth provides an analysis of consumer shopping trends and premium
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Vocational Rehabilitation
Vocational Rehabilitation Senate Education Appropriations Committee October 7, 2015 Emily Sikes, Chief Legislative Analyst, OPPAGA oppaga THE FLORIDA LEGISLATURE S OFFICE OF PROGRAM POLICY ANALYSIS & GOVERNMENT
State and Local Sales Tax Revenue Losses from E-Commerce: Estimates as of July 2004
State and Local Sales Tax Revenue Losses from E-Commerce: Estimates as of July 2004 by Dr. Donald Bruce, Research Assistant Professor [email protected] and Dr. William F. Fox, Professor and Director [email protected]
Federation of State Boards of Physical Therapy Jurisdiction Licensure Reference Guide Topic: Continuing Competence
This document reports CEU (continuing education units) and CCU (continuing competence units) requirements for renewal. It describes: Number of CEUs/CCUs required for renewal Who approves continuing education
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
The ACO Model/Capabilities Framework and Collaborative. Wes Champion Senior Vice President Premier Healthcare Alliance
The ACO Model/Capabilities Framework and Collaborative Wes Champion Senior Vice President Premier Healthcare Alliance Roadmaps to Serve as a Bridge from FFS to ACO Current FFS System What are the underpinning
Federation of State Boards of Physical Therapy Jurisdiction Licensure Reference Guide Topic: PTA Supervision Requirements
These tables provide information on what type of supervision is required for PTAs in various practice settings. Definitions Onsite Supervision General Supervision Indirect Supervision The supervisor is
OEB Smart Grid Advisory Committee
Meeting Summary OEB Smart Grid Advisory Committee Meeting Date: October 1, 2013 Time: 9:30 am 4:00 pm Location: OEB Offices, 2300 Yonge Street The Meeting Summary provides a high level review of the presentations
Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis
Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management
Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
