State Engagement with the Energy Sector to Improve Cyber Security

Size: px
Start display at page:

Download "State Engagement with the Energy Sector to Improve Cyber Security"

Transcription

1 Contact: Allison Cullin Homeland Security and Technology Division 202/ April 20, 2010 State Engagement with the Energy Sector to Improve Cyber Security Executive Summary The state-owned computer networks used to deliver state and federal programs, benefits, and services are besieged by a variety of cyber criminals intent on stealing or manipulating the sensitive private information those systems contain. State information technology and homeland security offices are engaged full-time in fighting off those attacks by tracking new threats, protecting Internet portals, and securing databases. But state officials also have one eye on the security of the networks that run private infrastructure operations: the telecommunications systems, electrical grids, gas and oil pipelines, and transportation networks on which modern society relies. That infrastructure is so interconnected and interdependent that a successful attack on any one component of the infrastructure could have a cascading effect on several others. A reliable supply of energy, for example, is essential to the operation of transportation systems, water and wastewater treatment facilities, hospitals, and 911 dispatch centers. A successful cyber attack on the electrical grid not only could knock out power, but could also debilitate those other essential services. In such an event, state and local governments would be expected to respond in the same way, and with the same efficiency, that they would for any other disaster. But states cannot easily ensure the security of cyber systems owned and operated by the energy sector, or by any other sector of the economy. The majority of the infrastructure is privately owned, and legislative or other mandates often are strongly resisted. In addition, the cyber threat is so pervasive, and is evolving so rapidly, that the private sector often has the best information about the nature of the threat but does not share that information with government. Finally, a number of private sector-led initiatives and federal programs are already under way to improve cyber security in the energy sector, leaving the states to determine on their own what their appropriate role should be. This Issue Brief examines those challenges and reviews the approaches that several states have used to work with the energy sector to improve cyber security. Those efforts take into account the programs, policies, standards, and practices already in place that contribute to a reliable energy supply. In general, states are playing an active role in improving the cyber security of the energy sector by:

2 Page State Engagement with the Energy Sector to Improve Cyber Security Facilitating coordination and cooperation among and within state agencies, the energy sector, and other interdependent sectors with which the energy sector directly interacts; Collaborating with private energy firms to improve their - and the state s - cyber security and overall information sharing; and Participating in federal and private sector cyber security initiatives to build partnerships and monitor new initiatives. Introduction In April 2009, the Wall Street Journal reported that computer systems used to control parts of the nation s electricity grid had been infiltrated by foreign intelligence operatives. These professional hackers, whom U.S. intelligence officials reportedly traced to China, Russia, and other countries, left behind hidden software programs that experts said could be used to disrupt electricity supplies. The intrusions, according to the Journal report, were pervasive across the U.S. and [did not] target a particular company or region. The report underscored the vulnerability of the nation s cyber infrastructure to vandals, bandits, spies, and terrorists, but it came as no surprise to security experts or industry analysts. A series of studies and reports dating back several years have documented that threat. In one of the more notable studies, in June 2007 a video emerged showing government researchers hacking into and manipulating a small electrical generator until it broke down in a cloud of smoke, illustrating the damage that a cyber intrusion could cause to physical components of the energy infrastructure. Congress also is paying attention. In May 2008, the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology held a hearing titled Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid, which criticized federal efforts to address known vulnerabilities in the cyber networks underpinning the grid. A year later, the House Subcommittee on Telecommunications and the Internet held a hearing titled Cyber Security: Network Threats and Policy Challenges, which examined threats to critical infrastructure, including power grids. The House Committee on Science and Technology held a number of hearings in 2009 on federal efforts to improve the security of cyber systems. In the Senate, at least eight committees and subcommittees have held hearings or considered legislation aimed at improving cyber security in the energy sector. A Rogues Gallery States also have a significant stake in the nation s cyber security. They own and operate computer networks that are used to deliver state and federal benefits and other programs and services to their constituents. Many of these systems are accessible from the Internet. The security of those networks, and the sensitive private information that resides on them, is under near-constant attack from a rogues gallery of phishers, hackers, network probers, and increasingly, organized crime syndicates and foreign intelligence agencies. State chief information officers and chief information security officers are responsible in large part for

3 Page State Engagement with the Energy Sector to Improve Cyber Security ensuring the security of state-owned systems and for protecting the private information they contain. But state-run systems are just part of the picture. States are also concerned about the security of computer networks they do not own but on which they nonetheless rely. Telecommunications platforms, electrical grids, gas and oil pipelines, and transportation systems all operate on networks that, if compromised, could have a substantial and wide impact. A successful attack on a key component of the electrical grid, for example, could have devastating and cascading effects on transportation systems, public safety, public works, and any other critical infrastructure that relies on an uninterrupted supply of electricity. In such an event, state and local governments would be expected to respond in the same way, and with the same efficiency, that they would to a hurricane, an ice storm, or any other natural disaster. As is the case with other threats to the nation s critical infrastructure, however, states find themselves in a difficult position when it comes to cyber security. State governments and their citizens rely on that infrastructure for many vital functions, yet they have limited ability to influence the security of those systems directly. Several factors stand in the way of states playing a central role in protecting the cyber security of the energy sector: The vast majority of the infrastructure is owned by the private sector, and efforts to legislate or otherwise mandate cyber security programs often meet stiff resistance; The cyber threat is pervasive and rapidly evolving, and information on the threat often is not shared effectively among the private and public sectors; and A number of federal government and private sector led initiatives to improve cyber security in the energy sector already are under way, but many of those do not directly involve state agencies, leaving states behind the curve in addressing cyber threats. Private Property With the exception of some municipal utilities, cooperatives, and federally chartered utilities such as the Tennessee Valley Authority and the Bonneville Power Administration, the vast majority of the energy infrastructure in the United States is privately owned. Regulatory authority over the sector s security practices, particularly at the state level, is limited. In the gas and electric sectors, state public utility commissions are charged with ensuring the reliability of supplies, and this responsibility extends to the reliability of cyber systems. Beyond that, however, federal and state regulatory authority over the energy sector is limited. With the exception of nuclear power facilities, governments do not have direct regulatory authority over the sector s security, whether physical or cyber. Industry officials say they are well aware of cyber security threats and are aggressively defending their systems without state or federal involvement. One electrical industry executive said that his company has strict internal cyber security standards that apply across its systems, from generation to transmission to distribution. He said states should assume that utilities are working proactively to address the cyber threat and are not waiting around for regulations or requirements.

4 Page State Engagement with the Energy Sector to Improve Cyber Security Congress has nonetheless considered legislative and regulatory actions to bolster the security of the energy sector s cyber systems. Industry officials and outside experts have warned, however, that top-down mandates are unlikely to succeed and, particularly at the state level, could do more harm than good. The interconnection of electricity production, transmission, and distribution systems requires collaboration and coordination among various companies and utilities, often across state lines. Electricity used in one state, for example, often is generated in another state and carried on transmission lines that cross several state lines. Having different cyber security regulations from one state to the next, industry officials argue, could degrade the efficiency of the entire system. Privacy watchdogs also are hesitant to give government agencies a broader role in cyber security. Gregory Nojeim, Senior Counsel and Director of the Center for Democracy and Technology s Project on Freedom, Security and Technology, warned a congressional committee in May 2009 against direct government involvement in securing private sector cyber systems. Government s role in private sector cyber security, he said, should be limited to helping the private sector develop effective monitoring systems, and sharing information with private sector network operators to help them identify attacks at an early stage. i Access to Information Adding to the difficulty of effectively crafting state policy to address energy sector cyber security is the absence of information from private companies on the types of threats they face. Some state officials report that they receive little information from private entities regarding cyber attacks and rely on outside organizations for reports of new threats. Private sector officials often focus on the need for government to provide threat information and intelligence to industry, but they have historically been reluctant to share information on the attacks they experience on an on-going basis. Simply put, because they do not run the grid or manage pipeline operations, states often are not in the game when it comes to understanding and combating cyber threats to the private energy sector. Industry players, meanwhile, often share threat information with each other through forums such as sector-specific information sharing and analysis centers (ISACs), but state governments have only limited access to those industry-run forums. Instead, they rely on information provided through their own cyber security forum, the Multi-State Information Sharing and Analysis Center (MS-ISAC). Although the MS-ISAC cooperates and coordinates with private-sector ISACs, the MS-ISAC director says that more work needs to be done to break down the barriers between the public and private sectors. The ISAC Council, a coordinating body for all sector ISACs, recently expanded to allow government participation, but that does not mean state and local governments have access to all cyber threat information in all sectors. Access to Energy ISAC information would be helpful, one state official said. It would provide us with good situational awareness. ii The lack of information flowing to the states from the private sector makes any effort to develop effective public policy more difficult and, potentially, less effective. As one industry official warned, the cyber threat now evolves so rapidly that any top-down mandate from government would force industry to make investments in preventive measures that would become obsolete as

5 Page State Engagement with the Energy Sector to Improve Cyber Security soon as the threats evolved to counter them, which, in the cyber world, would be almost immediately. Behind the Curve A number of efforts, some with regulatory enforcement mechanisms, have been launched over the past several years to address cyber security vulnerabilities in the energy sector. None, however, have involved state governments. The North American Electric Reliability Corporation (NERC), for example, regulates the reliability of the bulk power system in the United States and parts of Canada. It has developed a series of cyber security standards that require utilities to identify critical cyber assets, put in place security controls to protect those assets, provide security awareness training to personnel, and take other steps to ensure the cyber security of their systems. But NERC has outlined no clear role for the states to participate in or oversee those efforts. The Department of Energy (DOE) also is working with the energy sector on cyber security issues and was one of the first federal agencies to develop a long-term plan to improve cyber security throughout the sector. The department s Roadmap to Secure Control Systems, published in 2006, identifies critical challenges and priorities for improving the security and reliability of the computerized control systems that operate the energy sector. The energy sector is using the DOE Roadmap to guide technology investments by both the federal government and the private sector to enhance security and operating practices. The states have no clearly defined role under that plan. Industry associations also have initiated cyber security programs for their members. For example, the Electric Power Research Institute published a guidance document in 2006 to help its members comply with the NERC Cyber Security Standards; the American Gas Association developed a standard for the protection of supervisory control and data acquisition (SCADA) communications systems; and the American Petroleum Institute has its own standard for pipeline SCADA security. Again, none of those initiatives includes a clear role for states. Networked Solutions The actions that the federal government has taken to date, and the industry s own cyber security initiatives, do not necessarily relegate state governments to observer-only status. States concerned about the cyber security of the energy sector have several strategies available to improve the sector s cyber security and help ensure a reliable energy supply, although any statelevel effort should take into account the programs, policies, standards, and practices already in place to address those issues. NASEO, the national association representing state energy officials, encourages its members to proactively engage with the energy sector on cyber security issues. Energy assurance guidelines developed by the association include a recommendation that states assure that cyber security, critical cyber systems, and their recovery are incorporated within their Continuity of Operations Plans and encourage businesses they work with as partners in critical infrastructure protection to also address this area of need. iii Governors should encourage their state homeland security directors, chief information officers, and state energy officials to engage proactively with the energy sector by:

6 Page State Engagement with the Energy Sector to Improve Cyber Security Facilitating coordination and cooperation among and within state agencies, the energy sector and other interdependent sectors with which the energy sector directly interacts; Collaborating with private energy firms to improve their -and the state s - cyber security and improve overall information sharing; and Participating in federal and private-sector cyber security initiatives to build partnerships and monitor new initiatives. Facilitate The Cyberspace Policy Review conducted by the White House in early 2009 noted that information is the key to preventing, detecting, and responding to cyber incidents and warned that [a] full understanding and effective response may only be possible by bringing information from those various sources together for the benefit of all. The report recommended that the federal government take the lead in working with state, local, and tribal governments and with the private sector to develop information-sharing networks, forums, and practices that address concerns with privacy and proprietary information and make information sharing mutually beneficial in the national interest. iv But states do not need to wait for the federal government to develop such information-sharing forums. States have a significant role to play in facilitating cooperation among the operators of critical infrastructure within their borders and in improving information-sharing between private companies and government agencies. The simple act of convening key players in periodic roundtable meetings is just one example of the proactive steps that state governments can take to establish and strengthen public-private coordination for cyber security. The state of New York convened such a meeting in 2002, when the Office of Cyber Security and Critical Infrastructure Coordination created a Public/Private Sector Cyber Security Workgroup that included state agency officials and executives from the telecommunications, financial, energy, public safety, health, agriculture, and education sectors. The Workgroup was established as a forum in which participants could share information on the types of threats facing their computer systems and networks. Will Pelgrin, the director of the New York office, said private sector officials were initially hesitant to participate in a government-led effort or to share information about their own vulnerabilities. But, Pelgrin said, with patience and hard work, the relationship began paying dividends. New York officials, he added, used the state s experience in preparing for Y2K as a guide for how to approach the new challenge of fending off deliberate cyber attacks against state-owned and private networks. We gave more than we got, and we didn t add any reporting requirements, Pelgrin said. We earned, rather than expected, the private sector s respect for the relationship. Louisiana officials took a slightly different approach in reaching out to the companies operating in the state s energy sector. Rather than convene roundtables or establish a working group for cyber security issues, the state s chief information officer (CIO) focused on facilitating a relationship between the energy sector and the state s intelligence fusion center. The fusion

7 Page State Engagement with the Energy Sector to Improve Cyber Security center was gathering tremendous amounts of data about cyber threats, but lacked the expertise to analyze the information and share it with the private sector in a useful format. The CIO addressed the problem by assigning two cyber security experts to the fusion center, where they focused on identifying cyber threats to the state s critical energy infrastructure and passing on warnings and other information to the private companies operating in that and other sectors. Over time, the fusion center s outreach to the private sector improved the flow of information in both directions. Companies will now reach out to us to talk about new threats because they know we ve got good intel, one Louisiana official reported. That s a result of the trust that has been built up based on the information we ve been providing over the years. Collaborate State officials say that that type of partnership with the private sector is proving more effective than imposing top-down regulatory requirements, and several states are exploring additional opportunities for working more closely with industry to identify cyber threats and craft coordinated responses. New York s Office of Cyber Security and Critical Infrastructure Coordination is widely viewed as having set the pace for public-private collaboration through the Public/Private Sector Cyber Security Workgroup. Although the effort began as a way to improve information-sharing, it has evolved into a collaborative approach for identifying vulnerabilities and developing effective defenses and countermeasures. In 2008, in recognition of the interdependence of infrastructure and economic activity between New York and New Jersey, representatives from the public and private sectors in the Garden State were invited to participate in the workgroup. The workgroup focuses on the current state of cyber readiness in and across the participating sectors and works to identify and assess vulnerabilities and determine appropriate response and mitigation strategies throughout the region. The Tennessee Department of Safety works closely with the Tennessee Valley Authority (TVA), the federally chartered electricity company, on all aspects of infrastructure security. The department views its role as both detecting threats and preventing attacks on critical infrastructure, and it actively provides TVA with information and intelligence on the full spectrum of threats facing the energy sector, including threats to cyber networks. It also assists TVA in assessing risks and vulnerabilities in its cyber systems and developing risk-mitigation strategies. The benefit, state officials said, is that TVA, in turn, provides feedback on the types of threats its analysts and experts have identified. Participate Activities such as those can be successful only if the state develops its own expertise on cyber threats and cyber security. NASEO, in its Energy Assurance Guidelines, recommends that states develop that expertise not only so that they are aware of the threats facing their own systems, but also so that as they prepare assurance plans or related response documents they can ask the proper questions to assure that these requirements are being met. v One strategy for tracking private sector cyber security activities, and for gauging their effectiveness, is to closely monitor and, whenever possible, participate in federal and private-sector programs and exercises.

8 Page State Engagement with the Energy Sector to Improve Cyber Security For example, the Department of Homeland Security s series of annual cyber security exercises, dubbed Cyber Storm, involves not only federal agencies and the private sector, but also state and local governments. The exercises are designed to examine communications, incident response policies and protocols, and operational procedures in response to a variety of cyber incidents and to identify future planning needs. vi The exercises also provide an opportunity for participating agencies to identify policies and procedures that must be developed to facilitate information sharing with outside organizations, including the private sector. Cyber Storm II, conducted in March 2008, included nine states as direct participants: California, Colorado, Delaware, Illinois, Michigan, North Carolina, Pennsylvania, Texas and Virginia. Another five states Arkansas, Minnesota, Nebraska, South Carolina and West Virginia observed the exercise from the MS-ISAC operations center in New York. The next Cyber Storm exercise, which will focus on coordinated attacks against critical infrastructure control systems, is scheduled for September In addition to its work with the TVA, the Tennessee Department of Safety engages with the private sector through the FBI-led InfraGard program, which was established after the September 11, 2001 terrorist attacks as an information-sharing and analysis partnership between the Bureau and private companies. InfraGard, which is organized around the FBI s network of field offices, now includes academic institutions and state and local agencies. Tennessee officials said that they participate actively in InfraGard cyber security programs, including annual meetings and seminars where they work closely with private sector representatives to discuss emerging threats and response capabilities. The relationships built through the InfraGard program, state officials said, have resulted in improved communications to and from the private sector on threats and available protections. The feedback for us is that we re now getting information on what they re seeing in terms of threats and attacks, Tennessee officials said. Louisiana officials said that they have engaged private sector energy companies on cyber security issues through a number of federal initiatives, including a SCADA security exercise in March 2009 that also involved DHS, the departments of Energy and Defense, and private companies from the energy and telecommunications sectors. The state also participates in InfraGard activities, notably an annual cyber security exercise known as Tiger Trap, which Louisiana officials help design. Tiger Trap is a capture the flag -type exercise, with one team of cyber attackers pitted against another team of cyber defenders. The exercise allows participants to share information and experiences on effective cyber security tools, techniques, and resources. Conclusion Threats to the nation s computer networks are growing and the potential damage from a successful attack on critical nodes of the energy sector could be far-reaching and economically devastating. States have a limited ability to force the private sector to ensure its cyber security either through laws or new regulations. But they have ample opportunities to actively engage with the private sector and with the federal government to address cyber threats cooperatively, to ensure that state programs complement rather than compete with activities already under way, and to improve information sharing.

9 Page State Engagement with the Energy Sector to Improve Cyber Security By facilitating information sharing networks, collaborating with the private sector to identify and defend against cyber threats, and participating in exercises and other programs with the federal government and private industry, states can directly affect the energy sector s cyber security and improve the reliability of energy supplies. Acknowledgments: This issue brief was drafted by Chris Logan, director of the Homeland Security and Technology Division, NGA Center for Best Practices. Notes i Gregory Nojiem, Testimony Before the House Committee on Energy and Commerce, Subcommittee on Communications, Technology and the Internet on Cybersecurity, Civil Liberties and Innovation, May 1, ii Louisiana iii National Association of State Energy Officials, State Energy Assurance Guidelines, Version 3.0, June iv The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, May v National Association of State Energy Officials, State Energy Assurance Guidelines.. vi U.S. Department of Homeland Security National Cyber Security Division, Cyber Storm Exercise Report, September 2006.

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure

State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure NGA PAPER State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure Executive Summary Protecting the nation s energy system and infrastructure from cyber threats is of vital importance

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE A Functional Model for Critical Infrastructure Information Sharing and Analysis Maturing and Expanding Efforts ISAC Council White Paper January 31, 2004 1. PURPOSE/OBJECTIVES This paper is an effort to

More information

NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""

NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in

More information

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

National Cyber Threat Information Sharing. System Strengthening Study

National Cyber Threat Information Sharing. System Strengthening Study Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

INFRAGARD.ORG. Portland FBI. Unclassified 1

INFRAGARD.ORG. Portland FBI. Unclassified 1 INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the Proposed Cyber Security Information Act of 2000. Testimony

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the Proposed Cyber Security Information Act of 2000. Testimony GAO United States General Accounting Office Testimony Before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives For Release

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing: Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Corporate Perspectives On Cybersecurity: A Survey Of Execs Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey

More information

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,

More information

How To Defend Against A Cyber Attack

How To Defend Against A Cyber Attack As appears in: Cybersecurity - more than just a good firewall by Jim Fererro, Senior Vice President, GlobaLogix (8/4/2013) In seemingly too short a timespan, energy industry cyber threats have escalated

More information

National Cybersecurity & Communications Integration Center (NCCIC)

National Cybersecurity & Communications Integration Center (NCCIC) National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Statement of. before the. Committee on Homeland Security Subcommittee on Oversight and Management Efficiency U.S. House of Representatives

Statement of. before the. Committee on Homeland Security Subcommittee on Oversight and Management Efficiency U.S. House of Representatives Statement of Judson M. Freed Director, Emergency Management and Homeland Security Ramsey County, Minnesota on behalf of the National Association of Counties before the Committee on Homeland Security Subcommittee

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the National Plan for Information Systems Protection. Testimony

GAO CRITICAL INFRASTRUCTURE PROTECTION. Comments on the National Plan for Information Systems Protection. Testimony GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release at 10 a.m. Tuesday,

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

Information Assurance. and Critical Infrastructure Protection

Information Assurance. and Critical Infrastructure Protection Information Assurance and Critical Infrastructure Protection A Federal Perspective Information Assurance Presented by the Government Electronics and Information Technology Association 2001 Executive Summary

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

GAO. CRITICAL INFRASTRUCTURE PROTECTION DHS Leadership Needed to Enhance Cybersecurity

GAO. CRITICAL INFRASTRUCTURE PROTECTION DHS Leadership Needed to Enhance Cybersecurity GAO For Release on Delivery Expected at 3 p.m. EDT Wednesday, September 13, 2006 United States Government Accountability Office Testimony Before the House Committee on Homeland Security, Subcommittee on

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES STATEMENT OF MARK A. FORMAN ASSOCIATE DIRECTOR FOR INFORMATION TECHNOLOGY AND ELECTRONIC GOVERNMENT OFFICE OF MANAGEMENT AND BUDGET BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT

More information

Cyber Security & State Energy Assurance Plans

Cyber Security & State Energy Assurance Plans Cyber Security & State Energy Assurance Plans Michigan Cyber Summit 2011 Friday, October 7, 2011 Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials What is Energy

More information

FBI AND CYBER SECURITY

FBI AND CYBER SECURITY FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.

More information

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events. ESF Coordinator: Energy Primary Agency: Energy Support Agencies: Agriculture Commerce Defense Homeland Security the Interior Labor State Transportation Environmental Protection Agency Nuclear Regulatory

More information

Cybersecurity Converged Resilience :

Cybersecurity Converged Resilience : Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Energy Cybersecurity Regulatory Brief

Energy Cybersecurity Regulatory Brief Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider

More information

U.S. Cyber Security Readiness

U.S. Cyber Security Readiness U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

CYBERSECURITY RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON PERIODIC INFORMATION SECURITY AND PENETRATION AUDITS OF THE EXECUTIVE BRANCH INFORMATION TECHNOLOGY SYSTEMS APRIL 1, 2016 SUBMITTED TO THE TWENTY-EIGHTH

More information

Cyber security: Practical Utility Programs that Work

Cyber security: Practical Utility Programs that Work Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009 The Electric Grid - Challenges

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Preface to the Fourth Edition

Preface to the Fourth Edition The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through

More information

All. Presidential Directive (HSPD) 7, Critical Infrastructure Identification, Prioritization, and Protection, and as they relate to the NRF.

All. Presidential Directive (HSPD) 7, Critical Infrastructure Identification, Prioritization, and Protection, and as they relate to the NRF. Coordinating Agency: Department of Homeland Security Cooperating Agencies: All INTRODUCTION Purpose Scope This annex describes the policies, responsibilities, and concept of operations for Federal incident

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

Enhancing The Role of Fusion Centers in

Enhancing The Role of Fusion Centers in Issue Brief Enhancing The Role of Fusion Centers in Cybersecurity Executive Summary Fusion centers were created after the 9/11 terrorist attacks to facilitate the type of multijurisdictional information

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

Critical Infrastructure Security and Resilience

Critical Infrastructure Security and Resilience U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

Working with the Federal Government on Cybersecurity

Working with the Federal Government on Cybersecurity O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...

More information

Cybersecurity and United States Policy Issues

Cybersecurity and United States Policy Issues Global Security Studies, Summer 2014, Volume 5, Issue 3 Cybersecurity and United States Policy Issues Cristina Berriz Peace, War and Defense Program University of North Carolina at Chapel Hill Chapel Hill,

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

MESSAGE FROM THE SECRETARY... ii EXECUTIVE SUMMARY... iii INTRODUCTION... 1 THE FUTURE WE SEEK... 5

MESSAGE FROM THE SECRETARY... ii EXECUTIVE SUMMARY... iii INTRODUCTION... 1 THE FUTURE WE SEEK... 5 TABLE OF CONTENTS MESSAGE FROM THE SECRETARY... ii EXECUTIVE SUMMARY... iii INTRODUCTION... 1 SCOPE... 2 RELATIONSHIP TO OTHER KEY POLICIES AND STRATEGIES... 3 MOTIVATION... 3 STRATEGIC ASSUMPTIONS...

More information

Cybersecurity Primer

Cybersecurity Primer Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

Washington State Fusion Center. The Pacific Northwest Economic Region

Washington State Fusion Center. The Pacific Northwest Economic Region FUSION CENTER SPOTLIGHT Washington State Fusion Center and the Pacific Northwest Economic Region: Building a Critical Infrastructure/ Key resource Information Sharing Capability Washington State Fusion

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) View Key CRS Policy Staff May

More information

Computer Network Security & Privacy Protection

Computer Network Security & Privacy Protection Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and

More information

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information