NASCIO 2014 State IT Recognition Awards

Size: px
Start display at page:

Download "NASCIO 2014 State IT Recognition Awards"

Transcription

1 NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos Ramos, Director California Department of Technology Michele Robinson State Chief Information Security Officer

2 Section 2: Executive Summary Cyber attacks have the ability to disrupt our power, water, communication and other critical systems. Citizen s sensitive private information entrusted to the government could fall into the wrong hands. Protecting this information and California s large and diverse critical infrastructure is crucial.. With 38 million residents, California is the most populous state in the nation and the third largest by geographical area. The state s economy is ranked ninth in the world. California is home to the Silicon Valley and a robust IT infrastructure that makes the state a prime target for cyber attacks. Much of the critical infrastructure in California is owned and operated by private industry or local governments. While California has many efforts to prevent and mitigate cyber attacks, these efforts are decentralized and the various jurisdictions operate in silos. It is crucial to take a collaborative approach to safeguard both information and infrastructure. On May 13, 2013, government officials and private-sector leaders met to discuss a comprehensive cybersecurity plan for California. This was the beginning of the California Cybersecurity Task Force, the first state-led collaboration of its kind. The primary mission of this task force is to act as an advisory body to the State of California Senior Administration Officials in all matters related to Cybersecurity. Designed to address issues raised in the Presidential Executive Order on Improving Critical Infrastructure Cybersecurity, the California Cybersecurity Task Force has brought together many entities that would have otherwise not been engaged. The California Cybersecurity Task Force is made up of over 120 members from state, local, federal and tribal government, research and education, utility, financial, and private industry. This is a holistic approach to engage a broader range of stakeholders and developing awareness of policies and procedures for the assessment, enforcement, response and emergency management coordination in the event of a major cyber-emergency. The task force does not replace or supersede the Department of Technology s policy making authority or established policy making processes. It looks more broadly to engage those outside state government to adopt state policy as their own and or assist with policy implementation. The Cybersecurity Task Force is already hard at work through its various subcommittees to improve the state s cybersecurity posture. For example, the Cyber Emergency Preparedness subcommittee is facilitating a Cyber Exercise with public and private partners to examine cyber incident response and information sharing capabilities within the Northern California region. The High-Tech and Digital Evidence Subcommittee is establishing a state digital evidence forensic laboratory and training center that will work in support of both local, regional and federal digital evidence forensic laboratories and serve rural counties.

3 Section 3: Business Problem and Solution Problem Top experts agree that Cyber-attacks are a real and ever-growing threat to our national and economic security. Presidential Executive Order on Improving Critical Infrastructure Cybersecurity was issued on February 12, 2013 directing increased collaboration and information sharing for improved cybersecurity for critical infrastructure. The Order specifically directed the National Institute of Standards and Technology to work with private industry to develop a National Cybersecurity Framework and a Voluntary Critical Infrastructure Cybersecurity Program. California, the most populous state in the U.S. with over 38 million residents, is considered the third largest state by geographic area. If California were a country, it would be the ninth largest economy in the world, through its important contributions in aerospace, education, manufacturing, and high-tech industry. California is home to the Silicon Valley and a robust IT infrastructure making it a prime target for cyber attacks. The attacks against government systems are greatly increasing. While the state has many efforts to prevent and mitigate these attacks, government IT is extremely decentralized and various jurisdictions operate in silos. Further, the state lacks a comprehensive, concerted public-private statewide strategy to assess and respond to these kinds of threats. Various government entities have different roles in the cybersecurity arena from policy, assessment and enforcement to response and emergency management coordination in the event of a major cyber-emergency. Solution On May 13, 2013, California launched the California Cybersecurity Task Force in response to the Presidential Executive Order. Led jointly by the State CIO/Director of the California Department of Technology and the Director of the California Office of Emergency Services, this Task Force is the first of its kind in the nation. The Task Force serves as an advisory body to State of California Senior Administration Officials and the Governor in matters related to Cybersecurity. The strategic role of the task force is to act in an advisory capacity, briefing public policy makers in the following areas: Identify areas where stakeholders can improve statewide collaboration and information sharing to identify potential threats; Assist in the development of threat preventions, remediation, response and recovery strategies;

4 Review areas where coordination will enhance security, emergency response, communications, contingency planning and other areas of mutual responsibility across the State of California; and Develop and review a statewide cybersecurity strategy and provide support for strategy implementation. Other functions of the Task Force include: Research cybersecurity initiatives, policies and trends; Implement California Cybersecurity recommendations; Conduct public outreach and increase awareness of cybersecurity as a priority. Section 4: Significance of the Project The California Cybersecurity Task Force is the first state-led collaboration of its kind in the US. Given California s size and complexity, member willingness to come together on a volunteer basis to collaborate has been extraordinary. In just one year, members have been able to form high-performing subcommittees and working groups and make significant progress in the identification of California s cybersecurity needs. Some have already moved to implementing enhancements they can accomplish with existing resources and through public-private partnerships, which were derived from participation in the Task Force. Each member and new member interaction brings with it identification of additional resources, capabilities or ideas for advancing the achievement of goals and objectives, and ultimately California s cybersecurity posture. Approach/Communication Plan The Task Force is the first state-led collaboration of its kind. The Task Force engages a full range of stakeholders in a whole community approach to address the issue. With over 120 members, the task force is made up of stakeholders from many different sectors. These include government, research and education, utility, financial, and private industry. While 65% of the task force comprises primarily of government members (state, local and federal governments, the military and the port authority), the other 35% represents private industry, research and education, and utilities. The California Cybersecurity Task Force has formed seven subcommittees based on specific issues and vital areas of opportunity. The subcommittees address the following areas of importance: Legislation and Funding Cyber Emergency Preparedness Risk Mitigation Information Sharing Cybersecurity Workforce Development

5 High Tech and Digital Evidence Economic Development Each subcommittee has developed short-term and longer-term goals, is working on items which can be completed with existing resources and will be making recommendations about the prioritization and resource allocation for achieving longerterm goals. The full membership of the Task Force meets quarterly or as necessary at the call of the Executive Governance leadership. The Subcommittee co-chairs meet monthly. The subcommittees and their working groups meet as often as necessary to carry out their assigned objectives. Strategic/NACIO Priority Alignment The California Cybersecurity Task Force aligns with California s State IT Strategic Plan- Goal 4: Secure and Manage Information as an Asset. The Task Force will allow the state to realize the Objectives under this plan: 4.1 Protect sensitive date through robust security and privacy programs; 4.2 Ensure the state s technology and public safety communication infrastructures have robust and reliable disaster recovery capabilities to support the continuity of government services. Further, this initiative aligns with and promotes NASCIO s number one priority among all State Chief Information Officers, that of security. Section 5: Benefits of the Project The Task Force will deliver a California Cyber Security Strategy and achieve tangible objectives in support of the strategy. The following are several specific examples of the benefits achieved to date: Collaboration- The Task Force has brought together many different entities that have not engaged with each other before, each with a vested interest in improving California s overall cybersecurity posture. The coming together has garnered greater appreciation about the significance of the cybersecurity threat from the sharing of each perspective. In turn, this has led to the establishment of increased public-private partnerships, cross-sector collaboration, information sharing, and more productive dialogue about how the state s scarce cybersecurity resources and capabilities can be best utilized across the state to maximize cybersecurity for all. Training Exercises- The Cyber Emergency Preparedness subcommittee is facilitating a Cyber Exercise with public and private partners to examine cyber

6 incident response and information sharing capabilities within the Northern California region. It is anticipated the event will yield valuable information that will assist the development of a Cyber Playbook designed to assist the participants and other organizations in responding to a major cyber incident. This exercise will also inform future regional and Statewide Cyber Exercises to come. Information Sharing- The Information Sharing subcommittee has identified all the various information sharing protocols and channels and is examining the most effective method for streamlining and improving operational efficiency and effectiveness. Workforce Development- The Workforce Development groups are focused on the following four overarching objectives: 1. Develop a consistent definition and criteria for cyber security expertise to serve the State of California. 2. Discover, align, refine and capture the cybersecurity educational pathway inclusive of traditional curricula, extracurricular, competitions and professional development activities at all levels of education. 3. Leverage private sector, non-profit and educational resources within the State of California to inform the development of relevant state and federal policies and identify incentives to provide design inputs as well as to support the development and implementation of the California State Cyber Security Strategy. 4. Identify and support opportunities for California to leverage and employ our veteran population in the field of cybersecurity. To date they have completed a review of the Department of Homeland Security s NICE Workforce Development Framework and two California state agencies are in the process of piloting its use. They have engaged and are working with numerous educational institutions on student and faculty development to increase cybersecurity education, and sponsorships for afterschool programs and competitions. They have also engaged with the Department of Military and Wounded Warriors Program moving them closer toward achievement of Objective 4. Shared Resources- The High-Tech and Digital Evidence Subcommittee is establishing a state digital evidence forensic laboratory and training center that will work in support of both local, regional and federal digital evidence forensic laboratories and serve rural counties. Through Task Force members collaborative efforts, facility related barriers have been overcome, space has been acquired and is being built out. They are now days out from occupancy.

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

Highlights of Cybersecurity Efforts in Other States. JCOTS Cybersecurity Advisory Committee

Highlights of Cybersecurity Efforts in Other States. JCOTS Cybersecurity Advisory Committee Highlights of Cybersecurity Efforts in Other States JCOTS Cybersecurity Advisory Committee Where is the Silicon Valley for Cybersecurity? Several states, in addition to Virginia, are competing for the

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

State Homeland Security Strategy (2012)

State Homeland Security Strategy (2012) Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,

More information

Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives

Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives Portal Storm: A Cyber/Business Continuity Exercise Cyber Security Initiatives Commonwealth of Pennsylvania Office of Administration Tony Encinias, Chief Information Officer Project Initiated: January 2013

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Arizona Department of Homeland Security

Arizona Department of Homeland Security Arizona Department of Homeland Security Arizona Integrated Planning System (AZIPS) Five-Year Strategic Plan 2013-2018 SEPTEMBER 2012 MISSION STATEMENT The mission of the Arizona Department of Homeland

More information

The Computerworld Honors Program

The Computerworld Honors Program The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

Infrastructure Protection Gateway

Infrastructure Protection Gateway Infrastructure Protection Gateway Our Nation s critical infrastructure is essential to sustaining our security, the economy, and the American way of life. The Department of Homeland Security (DHS), National

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 Implementing Executive Order 13636 and Presidential Policy Directive 21 2013 2014 Winter Energy Conference November 1, 2013 Bob Kolasky Director, EO-PPD Integrated Task Force Announcement of the EO and

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

Re: Electronic Standards for Public Health Information Exchange

Re: Electronic Standards for Public Health Information Exchange NCVHS June 16, 2014 Honorable Sylvia Mathews Burwell Secretary, Department of Health and Human Services 200 Independence Avenue, S.W. Washington, D.C. 20201 Re: Electronic Standards for Public Health Information

More information

PORT OF HOUSTON AUTHORITY COMMUNITY ENGAGEMENT PLAN

PORT OF HOUSTON AUTHORITY COMMUNITY ENGAGEMENT PLAN PORT OF HOUSTON AUTHORITY COMMUNITY ENGAGEMENT PLAN Overview The provides the framework for the Port of Houston Authority ( Port Authority ) to effectively engage and support local communities while efficiently

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Water Security in New Jersey: Partnership and Services

Water Security in New Jersey: Partnership and Services GOV. CHRIS CHRISTIE LT. GOV. KIM GUADAGNO DIR. CHRIS RODRIGUEZ NJOHSP OFFICE OF HOMELAND SECURITY AND PREPAREDNESS Preparedness Act Water Security in New Jersey: Partnership and Services Created by the

More information

CALIFORNIA GIS COUNCIL CHARTER

CALIFORNIA GIS COUNCIL CHARTER CALIFORNIA GIS COUNCIL CHARTER ADOPTED JANUARY 7, 2015 SECTION 1: FINDING AND DECLARATIONS WHEREAS: A. Geographic Information Systems (GIS) are a critical tool for improving the quality, accuracy and responsiveness

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The

More information

NEBRASKA STATE HOMELAND SECURITY STRATEGY

NEBRASKA STATE HOMELAND SECURITY STRATEGY NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve

More information

State of New Hampshire Cybersecurity Strategy and Actions. Commissioner Toumpas

State of New Hampshire Cybersecurity Strategy and Actions. Commissioner Toumpas State of New Hampshire Cybersecurity Strategy and Actions Commissioner Goulet Director Plummer Commissioner Toumpas Assumptions The term statewide is meant to convey that scope is not limited to the executive

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

CIS Response to NIST RFI for the Cybersecurity Framework. Introduction

CIS Response to NIST RFI for the Cybersecurity Framework. Introduction Introduction The (CIS) hereby submits this response to the National Institute of Standards and Technology (NIST) Request for Information (RFI) pursuant to the notice published in the Federal Register on

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

National Infrastructure Protection Plan Partnering to enhance protection and resiliency

National Infrastructure Protection Plan Partnering to enhance protection and resiliency National Infrastructure Protection Plan Partnering to enhance protection and resiliency 2009 Preface Risk in the 21st century results from a complex mix of manmade and naturally occurring threats and

More information

Impact of Financial Aid on Student College Access & Success:

Impact of Financial Aid on Student College Access & Success: Impact of Financial Aid on Student College Access & Success: The San Antonio Experience Noé C. Ortiz P a r t n e r s f o r E d u c a t i o n a l E n g a g e m e n t Eyra A. Perez P a r t n e r s f o r

More information

Statement of. before the. Committee on Homeland Security Subcommittee on Oversight and Management Efficiency U.S. House of Representatives

Statement of. before the. Committee on Homeland Security Subcommittee on Oversight and Management Efficiency U.S. House of Representatives Statement of Judson M. Freed Director, Emergency Management and Homeland Security Ramsey County, Minnesota on behalf of the National Association of Counties before the Committee on Homeland Security Subcommittee

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness

All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness All Eyes: A Security Breach Exercise Disaster Recovery/Security and Business Continuity Readiness Commonwealth of Pennsylvania Molly Dougherty, Director Continuity of Government and Records Information

More information

Enterprise IT Portfolio Governance and Management Model

Enterprise IT Portfolio Governance and Management Model STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

Table of Contents ESF-12-1 034-00-13

Table of Contents ESF-12-1 034-00-13 Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 2 Purpose... 3 Situations and Assumptions... 4 Direction and

More information

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,

More information

STATE OF NEW JERSEY. ASSEMBLY, No. 4490. 216th LEGISLATURE. Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District 37 (Bergen)

STATE OF NEW JERSEY. ASSEMBLY, No. 4490. 216th LEGISLATURE. Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District 37 (Bergen) ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JUNE, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) SYNOPSIS Creates NJ Cybersecurity Commission; appropriates $0,000.

More information

TESTIMONY OF TIM PAWLENTY. Chief Executive Officer, The Financial Services Roundtable. Committee on Homeland Security and Government Affairs

TESTIMONY OF TIM PAWLENTY. Chief Executive Officer, The Financial Services Roundtable. Committee on Homeland Security and Government Affairs TESTIMONY OF TIM PAWLENTY Chief Executive Officer, The Financial Services Roundtable Committee on Homeland Security and Government Affairs Hearing entitled Data Breach on the Rise: Protecting Personal

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Executive Summary. Introduction

Executive Summary. Introduction Written Testimony of Ravi Pendse, Ph.D. Vice President and Chief Information Officer Brown University Cisco Fellow Professor of Practice, Computer Science and Engineering Before the U.S. Senate Committee

More information

Emergency Support Function #11 Agriculture and Natural Resources Strategic Plan

Emergency Support Function #11 Agriculture and Natural Resources Strategic Plan Emergency Support Function #11 Agriculture and Natural Resources Strategic Plan 2016-2020 1 Table of Contents Preface...3 Introduction...4 Mission Statement...6 Vision Statement...6 Goals and Objectives...6

More information

CRITERIA FOR STATEWIDE INTEROPERABILITY STRATEGIC PLANS. Purpose of Criteria. All-Inclusive Approach

CRITERIA FOR STATEWIDE INTEROPERABILITY STRATEGIC PLANS. Purpose of Criteria. All-Inclusive Approach CRITERIA FOR STATEWIDE INTEROPERABILITY STRATEGIC PLANS Purpose of Criteria According to Section I.C.5 of the 2006 Homeland Security Grant Program, all states are required by December 2007 to develop and

More information

University of North Carolina Tomorrow Commission FINAL REPORT AND RECOMMENDATIONS EXECUTIVE SUMMARY

University of North Carolina Tomorrow Commission FINAL REPORT AND RECOMMENDATIONS EXECUTIVE SUMMARY University of North Carolina Tomorrow Commission FINAL REPORT AND RECOMMENDATIONS EXECUTIVE SUMMARY What was the purpose of this study? The purpose of the University of North Carolina Tomorrow Initiative

More information

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions

More information

I. INTRODUCTION. 1 For the purposes of this document the term cyber threat/s has been retained from the National Institute of

I. INTRODUCTION. 1 For the purposes of this document the term cyber threat/s has been retained from the National Institute of I. INTRODUCTION The automobile industry is currently undergoing an unprecedented wave of innovation, as automakers are pioneering groundbreaking technologies that are making cars and trucks safer than

More information

The Association of Bay Area Health Officials: Advancing Public Health through Regional Networks

The Association of Bay Area Health Officials: Advancing Public Health through Regional Networks The Association of Bay Area Health Officials: Advancing Public Health through Regional Networks Adam W Crawley, MPH 1, Wayne T.A. Enanoria, MPH, PhD 1 1 School of Public Health, University of California,

More information

California Information Technology Strategic Plan

California Information Technology Strategic Plan California Information Technology Strategic Plan 2013 Update Edmund G. Brown Jr. Governor Carlos Ramos Secretary of Technology Focusing on Outcomes Table of Contents Message from the Secretary of California

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""

NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT

More information

Regulatory Compliance Management for Energy and Utilities

Regulatory Compliance Management for Energy and Utilities Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy 2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality

More information

Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director

Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology.......... June 2010 Ron Huston Director Message from the State Enterprise Portfolio Project

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

Georgia Emergency Operations Plan. Emergency Support Function # 5 Annex Emergency Management

Georgia Emergency Operations Plan. Emergency Support Function # 5 Annex Emergency Management Emergency Support Function # 5 Annex Emergency Management 2015 Emergency Support Function #5 E S F C o o r d i nator and Support Ag e n c i e s ESF C oordi na t or Georgia Emergency Management Agency/Homeland

More information

New Hampshire Recovery Plan

New Hampshire Recovery Plan ANNEXES LEAD AGENCY: RECOVERY SUPPORT FUNCTION (RSF) 1 COMMUNITY PLANNING AND CAPACITY BUILDING N.H. Homeland Security and Emergency Management (HSEM) SUPPORT AGENCIES: N.H. Attorney General s Office (AG)

More information

National Emergency Communications Plan

National Emergency Communications Plan National Emergency Communications Plan 2014 This page intentionally left blank. MESSAGE FROM THE SECRETARY Since the Department of Homeland Security (DHS) was established in 2003, one of its top priorities

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Board of Nurse Examiners for the State of Texas

Board of Nurse Examiners for the State of Texas Board of Nurse Examiners for the State of Texas Statewide Plan to Create Innovative Models for Nursing Education To Increase RN Graduates in Texas Professional Nursing Education Programs Published by the

More information

STATE OF MARYLAND Strategy for Homeland Security

STATE OF MARYLAND Strategy for Homeland Security STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND

More information

Iowa Science, Technology, Education, Engineering, & Mathematics Advisory Council Broadband Committee

Iowa Science, Technology, Education, Engineering, & Mathematics Advisory Council Broadband Committee Broadband is the electricity of the future Governor Terry Branstad September 3, 2013 Iowa Science, Technology, Education, Engineering, & Mathematics Advisory Council Broadband Committee 12/1/2013 Initial

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events. ESF Coordinator: Energy Primary Agency: Energy Support Agencies: Agriculture Commerce Defense Homeland Security the Interior Labor State Transportation Environmental Protection Agency Nuclear Regulatory

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

Subject: National Preparedness

Subject: National Preparedness For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-8 Subject: National Preparedness Purpose (1) This directive establishes

More information

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

MEMA Strategic Plan 2012-2016

MEMA Strategic Plan 2012-2016 MEMA Strategic Plan 2012-2016 A Prepared Marylander Creates a Resilient Maryland March 2013 A CENTER FOR PREPAREDNESS EXCELLENCE Message from the Director I am pleased to present the (MEMA) Strategic Plan.

More information

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Agency for State Technology

Agency for State Technology Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief

More information

Relationship to National Response Plan Emergency Support Function (ESF)/Annex

Relationship to National Response Plan Emergency Support Function (ESF)/Annex RISK MANAGEMENT Capability Definition Risk Management is defined by the Government Accountability Office (GAO) as A continuous process of managing through a series of mitigating actions that permeate an

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

ESF 02 - Communications Annex, 2015

ESF 02 - Communications Annex, 2015 ESF 02 - Communications Annex, 2015 Table of contents I. Introduction... 3 A. Purpose... 3 B. Scope of Operations... 3 C. Specific Authorities and References... 4 II. Situation and Assumptions... 4 A.

More information

DISASTER RECOVERY FOR PUBLIC HEALTH. August 2007

DISASTER RECOVERY FOR PUBLIC HEALTH. August 2007 DISASTER RECOVERY FOR PUBLIC HEALTH August 2007 National events like the terrorist attacks of 2001 and Hurricanes Katrina and Rita have focused attention on the need for recovery planning. Citizens who

More information