NASCIO 2014 State IT Recognition Awards
|
|
|
- Gervase Grant
- 10 years ago
- Views:
Transcription
1 NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos Ramos, Director California Department of Technology Michele Robinson State Chief Information Security Officer
2 Section 2: Executive Summary Cyber attacks have the ability to disrupt our power, water, communication and other critical systems. Citizen s sensitive private information entrusted to the government could fall into the wrong hands. Protecting this information and California s large and diverse critical infrastructure is crucial.. With 38 million residents, California is the most populous state in the nation and the third largest by geographical area. The state s economy is ranked ninth in the world. California is home to the Silicon Valley and a robust IT infrastructure that makes the state a prime target for cyber attacks. Much of the critical infrastructure in California is owned and operated by private industry or local governments. While California has many efforts to prevent and mitigate cyber attacks, these efforts are decentralized and the various jurisdictions operate in silos. It is crucial to take a collaborative approach to safeguard both information and infrastructure. On May 13, 2013, government officials and private-sector leaders met to discuss a comprehensive cybersecurity plan for California. This was the beginning of the California Cybersecurity Task Force, the first state-led collaboration of its kind. The primary mission of this task force is to act as an advisory body to the State of California Senior Administration Officials in all matters related to Cybersecurity. Designed to address issues raised in the Presidential Executive Order on Improving Critical Infrastructure Cybersecurity, the California Cybersecurity Task Force has brought together many entities that would have otherwise not been engaged. The California Cybersecurity Task Force is made up of over 120 members from state, local, federal and tribal government, research and education, utility, financial, and private industry. This is a holistic approach to engage a broader range of stakeholders and developing awareness of policies and procedures for the assessment, enforcement, response and emergency management coordination in the event of a major cyber-emergency. The task force does not replace or supersede the Department of Technology s policy making authority or established policy making processes. It looks more broadly to engage those outside state government to adopt state policy as their own and or assist with policy implementation. The Cybersecurity Task Force is already hard at work through its various subcommittees to improve the state s cybersecurity posture. For example, the Cyber Emergency Preparedness subcommittee is facilitating a Cyber Exercise with public and private partners to examine cyber incident response and information sharing capabilities within the Northern California region. The High-Tech and Digital Evidence Subcommittee is establishing a state digital evidence forensic laboratory and training center that will work in support of both local, regional and federal digital evidence forensic laboratories and serve rural counties.
3 Section 3: Business Problem and Solution Problem Top experts agree that Cyber-attacks are a real and ever-growing threat to our national and economic security. Presidential Executive Order on Improving Critical Infrastructure Cybersecurity was issued on February 12, 2013 directing increased collaboration and information sharing for improved cybersecurity for critical infrastructure. The Order specifically directed the National Institute of Standards and Technology to work with private industry to develop a National Cybersecurity Framework and a Voluntary Critical Infrastructure Cybersecurity Program. California, the most populous state in the U.S. with over 38 million residents, is considered the third largest state by geographic area. If California were a country, it would be the ninth largest economy in the world, through its important contributions in aerospace, education, manufacturing, and high-tech industry. California is home to the Silicon Valley and a robust IT infrastructure making it a prime target for cyber attacks. The attacks against government systems are greatly increasing. While the state has many efforts to prevent and mitigate these attacks, government IT is extremely decentralized and various jurisdictions operate in silos. Further, the state lacks a comprehensive, concerted public-private statewide strategy to assess and respond to these kinds of threats. Various government entities have different roles in the cybersecurity arena from policy, assessment and enforcement to response and emergency management coordination in the event of a major cyber-emergency. Solution On May 13, 2013, California launched the California Cybersecurity Task Force in response to the Presidential Executive Order. Led jointly by the State CIO/Director of the California Department of Technology and the Director of the California Office of Emergency Services, this Task Force is the first of its kind in the nation. The Task Force serves as an advisory body to State of California Senior Administration Officials and the Governor in matters related to Cybersecurity. The strategic role of the task force is to act in an advisory capacity, briefing public policy makers in the following areas: Identify areas where stakeholders can improve statewide collaboration and information sharing to identify potential threats; Assist in the development of threat preventions, remediation, response and recovery strategies;
4 Review areas where coordination will enhance security, emergency response, communications, contingency planning and other areas of mutual responsibility across the State of California; and Develop and review a statewide cybersecurity strategy and provide support for strategy implementation. Other functions of the Task Force include: Research cybersecurity initiatives, policies and trends; Implement California Cybersecurity recommendations; Conduct public outreach and increase awareness of cybersecurity as a priority. Section 4: Significance of the Project The California Cybersecurity Task Force is the first state-led collaboration of its kind in the US. Given California s size and complexity, member willingness to come together on a volunteer basis to collaborate has been extraordinary. In just one year, members have been able to form high-performing subcommittees and working groups and make significant progress in the identification of California s cybersecurity needs. Some have already moved to implementing enhancements they can accomplish with existing resources and through public-private partnerships, which were derived from participation in the Task Force. Each member and new member interaction brings with it identification of additional resources, capabilities or ideas for advancing the achievement of goals and objectives, and ultimately California s cybersecurity posture. Approach/Communication Plan The Task Force is the first state-led collaboration of its kind. The Task Force engages a full range of stakeholders in a whole community approach to address the issue. With over 120 members, the task force is made up of stakeholders from many different sectors. These include government, research and education, utility, financial, and private industry. While 65% of the task force comprises primarily of government members (state, local and federal governments, the military and the port authority), the other 35% represents private industry, research and education, and utilities. The California Cybersecurity Task Force has formed seven subcommittees based on specific issues and vital areas of opportunity. The subcommittees address the following areas of importance: Legislation and Funding Cyber Emergency Preparedness Risk Mitigation Information Sharing Cybersecurity Workforce Development
5 High Tech and Digital Evidence Economic Development Each subcommittee has developed short-term and longer-term goals, is working on items which can be completed with existing resources and will be making recommendations about the prioritization and resource allocation for achieving longerterm goals. The full membership of the Task Force meets quarterly or as necessary at the call of the Executive Governance leadership. The Subcommittee co-chairs meet monthly. The subcommittees and their working groups meet as often as necessary to carry out their assigned objectives. Strategic/NACIO Priority Alignment The California Cybersecurity Task Force aligns with California s State IT Strategic Plan- Goal 4: Secure and Manage Information as an Asset. The Task Force will allow the state to realize the Objectives under this plan: 4.1 Protect sensitive date through robust security and privacy programs; 4.2 Ensure the state s technology and public safety communication infrastructures have robust and reliable disaster recovery capabilities to support the continuity of government services. Further, this initiative aligns with and promotes NASCIO s number one priority among all State Chief Information Officers, that of security. Section 5: Benefits of the Project The Task Force will deliver a California Cyber Security Strategy and achieve tangible objectives in support of the strategy. The following are several specific examples of the benefits achieved to date: Collaboration- The Task Force has brought together many different entities that have not engaged with each other before, each with a vested interest in improving California s overall cybersecurity posture. The coming together has garnered greater appreciation about the significance of the cybersecurity threat from the sharing of each perspective. In turn, this has led to the establishment of increased public-private partnerships, cross-sector collaboration, information sharing, and more productive dialogue about how the state s scarce cybersecurity resources and capabilities can be best utilized across the state to maximize cybersecurity for all. Training Exercises- The Cyber Emergency Preparedness subcommittee is facilitating a Cyber Exercise with public and private partners to examine cyber
6 incident response and information sharing capabilities within the Northern California region. It is anticipated the event will yield valuable information that will assist the development of a Cyber Playbook designed to assist the participants and other organizations in responding to a major cyber incident. This exercise will also inform future regional and Statewide Cyber Exercises to come. Information Sharing- The Information Sharing subcommittee has identified all the various information sharing protocols and channels and is examining the most effective method for streamlining and improving operational efficiency and effectiveness. Workforce Development- The Workforce Development groups are focused on the following four overarching objectives: 1. Develop a consistent definition and criteria for cyber security expertise to serve the State of California. 2. Discover, align, refine and capture the cybersecurity educational pathway inclusive of traditional curricula, extracurricular, competitions and professional development activities at all levels of education. 3. Leverage private sector, non-profit and educational resources within the State of California to inform the development of relevant state and federal policies and identify incentives to provide design inputs as well as to support the development and implementation of the California State Cyber Security Strategy. 4. Identify and support opportunities for California to leverage and employ our veteran population in the field of cybersecurity. To date they have completed a review of the Department of Homeland Security s NICE Workforce Development Framework and two California state agencies are in the process of piloting its use. They have engaged and are working with numerous educational institutions on student and faculty development to increase cybersecurity education, and sponsorships for afterschool programs and competitions. They have also engaged with the Department of Military and Wounded Warriors Program moving them closer toward achievement of Objective 4. Shared Resources- The High-Tech and Digital Evidence Subcommittee is establishing a state digital evidence forensic laboratory and training center that will work in support of both local, regional and federal digital evidence forensic laboratories and serve rural counties. Through Task Force members collaborative efforts, facility related barriers have been overcome, space has been acquired and is being built out. They are now days out from occupancy.
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives
Portal Storm: A Cyber/Business Continuity Exercise Cyber Security Initiatives Commonwealth of Pennsylvania Office of Administration Tony Encinias, Chief Information Officer Project Initiated: January 2013
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
State Homeland Security Strategy (2012)
Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
BUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
Infrastructure Protection Gateway
Infrastructure Protection Gateway Our Nation s critical infrastructure is essential to sustaining our security, the economy, and the American way of life. The Department of Homeland Security (DHS), National
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
The Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Arizona Department of Homeland Security
Arizona Department of Homeland Security Arizona Integrated Planning System (AZIPS) Five-Year Strategic Plan 2013-2018 SEPTEMBER 2012 MISSION STATEMENT The mission of the Arizona Department of Homeland
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Water Security in New Jersey: Partnership and Services
GOV. CHRIS CHRISTIE LT. GOV. KIM GUADAGNO DIR. CHRIS RODRIGUEZ NJOHSP OFFICE OF HOMELAND SECURITY AND PREPAREDNESS Preparedness Act Water Security in New Jersey: Partnership and Services Created by the
September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for
Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness
All Eyes: A Security Breach Exercise Disaster Recovery/Security and Business Continuity Readiness Commonwealth of Pennsylvania Molly Dougherty, Director Continuity of Government and Records Information
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
NEBRASKA STATE HOMELAND SECURITY STRATEGY
NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
California Information Technology Strategic Plan
California Information Technology Strategic Plan 2013 Update Edmund G. Brown Jr. Governor Carlos Ramos Secretary of Technology Focusing on Outcomes Table of Contents Message from the Secretary of California
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""
National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Impact of Financial Aid on Student College Access & Success:
Impact of Financial Aid on Student College Access & Success: The San Antonio Experience Noé C. Ortiz P a r t n e r s f o r E d u c a t i o n a l E n g a g e m e n t Eyra A. Perez P a r t n e r s f o r
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
How To Protect Your State From Cybercrime
State of New Hampshire Cybersecurity Strategy and Actions Commissioner Goulet Director Plummer Commissioner Toumpas Assumptions The term statewide is meant to convey that scope is not limited to the executive
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
CALIFORNIA GIS COUNCIL CHARTER
CALIFORNIA GIS COUNCIL CHARTER ADOPTED JANUARY 7, 2015 SECTION 1: FINDING AND DECLARATIONS WHEREAS: A. Geographic Information Systems (GIS) are a critical tool for improving the quality, accuracy and responsiveness
CHAPTER 1: BUSINESS CONTINUITY MANAGEMENT STRATEGY AND POLICY
Zurich Management Services Limited Registered in England: No 2741053 Registered Office The Zurich Centre, 3000 Parkway Whiteley, Fareham Hampshire, PO15 7JZ CHAPTER 1: BUSINESS CONTINUITY MANAGEMENT STRATEGY
The Association of Bay Area Health Officials: Advancing Public Health through Regional Networks
The Association of Bay Area Health Officials: Advancing Public Health through Regional Networks Adam W Crawley, MPH 1, Wayne T.A. Enanoria, MPH, PhD 1 1 School of Public Health, University of California,
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
ESF 02 - Communications Annex, 2015
ESF 02 - Communications Annex, 2015 Table of contents I. Introduction... 3 A. Purpose... 3 B. Scope of Operations... 3 C. Specific Authorities and References... 4 II. Situation and Assumptions... 4 A.
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
National Infrastructure Protection Plan Partnering to enhance protection and resiliency
National Infrastructure Protection Plan Partnering to enhance protection and resiliency 2009 Preface Risk in the 21st century results from a complex mix of manmade and naturally occurring threats and
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Table of Contents ESF-12-1 034-00-13
Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 2 Purpose... 3 Situations and Assumptions... 4 Direction and
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
STATE OF MARYLAND Strategy for Homeland Security
STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Enterprise IT Portfolio Governance and Management Model
STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Subject: National Preparedness
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-8 Subject: National Preparedness Purpose (1) This directive establishes
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
STATE HOMELAND SECURITY GRANT PROGRAM
FY2015 State Homeland Security Investment Justifications STATE HOMELAND SECURITY GRANT PROGRAM OREGON OFFICE OF EMERGENCY MANAGEMENT www.oregon.gov/omd/oem Mailing address: P.O. Box 14370 Salem, OR 97309-5062
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
Regulatory Compliance Management for Energy and Utilities
Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director
Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology.......... June 2010 Ron Huston Director Message from the State Enterprise Portfolio Project
