All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness
|
|
|
- Giles Morris
- 9 years ago
- Views:
Transcription
1 All Eyes: A Security Breach Exercise Disaster Recovery/Security and Business Continuity Readiness Commonwealth of Pennsylvania Molly Dougherty, Director Continuity of Government and Records Information Management Pennsylvania Office of Administration 205 Finance Building Harrisburg, PA [email protected] Initiation: May 2014 Completion: June
2 Executive Summary Pennsylvania has lead and participated in numerous exercises to test and strengthen its cyber security posture. These exercises have generally focused on the IT response and remediation of an incident such as a data breach or distributed denial of service attack. However, the effects of a cyber-incident extend far beyond the IT department to include senior leadership, attorneys, program managers and others in the organization, as well as the public. In 2014, Pennsylvania developed an exercise called All Eyes to specifically focus on the role of the chief information officer (CIO) in engaging and communicating with key stakeholders and decision makers during a cyber-event. The exercise was created jointly by Pennsylvania s Continuity of Government Office and Enterprise Information Security Office and conducted with current and future chief information officers in the Certified Government CIO program at Harrisburg University of Science and Technology. The exercise establishes a constructive environment for the students to learn about and prepare for the non-it issues related to a data breach. Participants examine the responsibilities of the CIO, internal and external communications concerns, and the commonwealth s security breach checklist of questions and potential actions to be taken during an incident. The exercise package includes background information, checklist tool, exercise plan and presentation materials and is easily repeatable, allowing participants to further the discussion by hosting cyber continuity exercises of their own in their agencies. Using Homeland Security Exercise and Evaluation Program (HSEEP) design principles, the exercise takes an objectives-first approach to exercise design ensure that the scenario, discussion and corrective actions achieve the following results: Understand the political and economic impact of a data breach and coordinated response. Review data breach reporting requirements. Examine command and control and communications challenges during a breach. The no-cost exercise also followed the model of learning development: (70% practice, 20% coaching/collaboration and 10% formal training). The exercise encourages CIOs to view their role during a cyber-incident through a broader lens and familiarize themselves with the legal and communications aspects of a coordinated response. In doing so, the exercise strengthens both the commonwealth s continuity and cyber response capabilities. Through the inclusion of continuity planning and exercising in cyber strategies, Pennsylvania has been able to bridge the divide between IT disruptions and a coordinated response. 2
3 Business Problem & Solution The frequency and severity of cyber incidents continues to rise, with 2014 dubbed by many as the Year of the Data Breach. With online services now the norm and demand for mobility and open data increasing steadily, Pennsylvania can only expect its exposure and risk to cyber threats to increase. Recent history has demonstrated time and again that no one is immune to cyber threats. Like other governments, the Commonwealth of Pennsylvania has a responsibility and legal obligation to protect our employees and citizens and to continue essential business functions during natural, human-made or technological disasters. Cyber incidents are a matter of when not if. Therefore, having a comprehensive, practiced response is critical. According to the 2014 Ponemon study, including continuity of operations in cyber security planning can help cut the cost of a data breach by up to $9 per compromised record. Although the cyber incident itself may be an IT issue, the coordinated response extends far beyond the IT department. This is especially important for incidents involving the breach of data. Pennsylvania s Breach of Personal Information Notification Act defines the conditions under which it is necessary to notify victims and credit reporting agencies. While an incident may be considered a data breach from an IT perspective, it may or may not meet the definition of a data breach under the act. In order to strengthen Pennsylvania s cyber security readiness and ensure that IT leaders understand the fundamentals of a coordinated response approach, the Continuity of Government (CoG) office and Enterprise Information Security Office (EISO) partnered to design the All Eyes security breach exercise and conduct it with 26 students from Harrisburg University s Certified Government CIO program, which includes current and aspiring CIOs from executive and legislative agencies and local governments. This easily repeatable exercise package includes background information, checklist tool, exercise plan and presentation materials. Best Practice Exercise Design The exercise scenario was tailored around the key learning objectives identified by the CoG office and EISO and developed using the nationally recognized Homeland Security Exercise and Evaluation Program (HSEEP) design doctrine: Understand the political and economic impact of a security breach and why a coordinated response is not merely an IT issue. Review security breach reporting requirements. Examine command and control and communications challenges during a security breach event. 3
4 The Scenario The scenario was designed to be a realistic and probable so the discussion would focus on the response rather than the likelihood that such an incident could occur. The exercise was structured as four modules and included discussions about who makes the legal determination of a data breach and the critical role of the CIO in communications. Module 1: Lost but not Forgotten The participants play the role of CIO of the organization. The exercise begins with notification of a potential security breach involving a little-known agency FTP site. CIOs from multiple disciplines learned IT staff review the FTP site and identify a database that contains the names, Social Security numbers and home addresses of 5,000 applicants to a nowdefunct energy assistance program. Discussion questions focus on the role of the CIO during a potential data breach and how the commonwealth s Security Breach Checklist would be utilized at this stage of an incident. Module 2: All is not Lost the answers to critical questions. What is your role as a CIO during a potential security breach? How would you use the security breach checklist at this point? What are the possible ramifications if this is a security breach? Who makes the legal determination that it is a Further review by IT staff finds that breach? there has been some activity on the FTP site and that the applicants data At this point, who needs to know about the has been viewed. The CIO notifies the legal office that personal information possible breach and why? may have been compromised. What is your communications plan if there is a Exercise participants are asked to assess the criteria for determining a breach in your agency? security breach and what must be communicated and to whom. Continuing to refer to the Security Breach Checklist, the group discussion explores the possible ramifications of a potential data breach, who makes the legal determination that a breach has occurred, who needs to be notified and why. 4
5 Module 3: For all Eyes Only Once the legal office has determined that the breach meets the definition under Pennsylvania s notification law, the discussion focuses on the communications plan and what information the chief information officer is responsible for providing. Module 4: Lessons Learned and After Action Based on lessons learned from the exercise, the participants were asked to develop action items for critical steps they must take in their agencies. Through the inclusion of continuity planning and exercising in cyber strategies, Pennsylvania has been able to bridge the divide between IT disruptions and a coordinated response. Significance of the Project Effective completion of the cyber/continuity exercise and identification of corrective actions was a priority identified by Pennsylvania s Continuity of Government Steering Committee, which includes the Secretaries of Administration and General Services, Director of the Pennsylvania Emergency Management Agency; Commissioner of the Pennsylvania State Police and Commonwealth CIO. The All Eyes exercise focuses on resiliency by testing Pennsylvania's ability to communicate and establish a coordinated response during a potentially catastrophic event. The exercise was designed using principles from the Homeland Security Exercise and Evaluation doctrine and included: Training. The exercise included a briefing on the cyber security threat landscape in Pennsylvania, the legal definition of a data breach and the impacts of declaring a breach. Table Top Exercise. Ground rules were designed to create an open, candid, low-risk environment that allowed participants to ask questions and discuss challenges. Preparedness Tools. Procedures and checklists have been created for CIOs to use when a breach occurs. Providing participants with an opportunity to practice using these resources while walking through the scenario is the most effective way to ensure familiarity aside from an actual event. Continual Learning. The after action review and development of corrective actions help to ensure implementation of lessons learned. 5
6 Benefits of the Project In addition to supporting the CoG Steering Committee s 2014 program priorities, the exercise also aligns with the Pennsylvania IT Strategic Plan s emphasis on cyber security throughout its framework, as well as: NASCIO State CIO Priorities for 2014 Security, including risk assessment and training and awareness, was the number one priority. The National Governors Association Call to Action for Governors for Cyber Security Recommends taking steps to create a culture of risk awareness. National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Includes assessing risk, developing risk management strategy and providing awareness and training to personnel. Pennsylvania has created an exercise tool and forum that can be easily replicated in other states that want to mature their security posture and further align operational readiness with priorities and FEMA exercise guidelines. All Eyes was developed around the following principles: Effective and learning and development. The no-cost exercise was designed based on effective learning research, including the model of development. That is, 70% of the exercise encouraged practicing the response during a cyber-event, 20% on coaching and collaboration and 10% on formal training. Successful practice. Using the nationally recognized exercise design doctrine, Homeland Security Exercise and Evaluation Program (HSEEP), provided a consistent, tested method for effective exercise development. Testing and practice. Participants had an opportunity practice utilizing response procedures and tools in a real world but low-risk environment. 6
Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives
Portal Storm: A Cyber/Business Continuity Exercise Cyber Security Initiatives Commonwealth of Pennsylvania Office of Administration Tony Encinias, Chief Information Officer Project Initiated: January 2013
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
The Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
UCF Office of Emergency Management. 2013-2018 Strategic Plan
UCF Office of Emergency Management 2013-2018 Strategic Plan Table of Contents I. Introduction... 2 Purpose... 2 Overview... 3 Mission... 5 Vision... 5 II. Mandates... 6 III. Accomplishments and Challenges...
The Future of Response, Recovery and Reconstitution Capability
The Future of Response, Recovery and Reconstitution Capability Sheraton Society Hill Hotel, Philadelphia, PA William L. Carwile, III Associate Administrator for Response and Recovery August 25, 2011 Federal
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
HSEM Emergency Management Director s Qualification Curriculum, Emergency Management Certification and Elected/Appointed Officials Certificate Programs
HSEM Emergency Management Director s Qualification Curriculum, Emergency Management Certification and Elected/Appointed Officials Certificate Programs 1-16-2014 1 A Note from the Director Effective emergency
Security Incident Response Process. Category: Information Security and Privacy. The Commonwealth of Pennsylvania
Security Incident Response Process Category: Information Security and Privacy The Commonwealth of Pennsylvania Executive Summary The Commonwealth of Pennsylvania is a trusted steward of citizen information.
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM
NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM October 15 th, 2013 Table of Contents Program Overview and Administration:...4 Certification process:...4 Responsibilities:...4 North Carolina
https://usawc.blackboard.com/bbcswebdav/pid-82431-dt-content-rid-112988_1/institution/...
Unit 6 - Homeland Security, Homeland Defense, and Defense Support of Civil Authorities Page 1 of 5 The defense of the homeland is a significant contemporary security issue. Defending the homeland is a
BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity
Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033
CHAPTER 2016-138 Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 An act relating to information technology security; amending s. 20.61, F.S.; revising the
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Cyber Security Risk Management
Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
Subject: National Preparedness
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-8 Subject: National Preparedness Purpose (1) This directive establishes
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE
Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE This page intentionally left blank Tampa Bay Catastrophic Plan Hurricane Phoenix A Storm Recovery Tabletop Exercise August 5, 2010 EXERCISE
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Cyber Europe 2012. Key Findings and Recommendations
Cyber Europe 2012 December 2012 On National and International Cyber Exercises S I Acknowledgements ENISA wishes to thank all persons and organisations which have contributed to this exercise. In particular,
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Technology Infrastructure Services
LOB #303: DISASTER RECOVERY Technology Infrastructure Services Purpose Disaster Recovery (DR) for IT is a capability to restore enterprise-wide technology infrastructure, applications and data that are
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
ESF 02 - Communications Annex, 2015
ESF 02 - Communications Annex, 2015 Table of contents I. Introduction... 3 A. Purpose... 3 B. Scope of Operations... 3 C. Specific Authorities and References... 4 II. Situation and Assumptions... 4 A.
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
NEBRASKA STATE HOMELAND SECURITY STRATEGY
NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Cybersecurity..Is your PE Firm Ready? October 30, 2014
Cybersecurity..Is your PE Firm Ready? October 30, 2014 What you will learn. Understanding SEC s interest in cybersecurity Mitigating cyber risk at the PE firm and the portfolio companies Developing a plan
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security
Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security
Understanding the NIST Cybersecurity Framework September 30, 2014
Understanding the NIST Cybersecurity Framework September 30, 2014 Earlier this year the National Institute of Standard and Technology released the Framework for Improving Critical Infrastructure Cybersecurity
CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1
CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
BUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Emergency Preparedness at Nuclear Power Plants
A White Paper Addressing Compliance with NRC Proposed Rule making Emergency Preparedness at Nuclear Power Plants Ensuring Readiness and Compliance with New NRC Regulation of Emergency Preparedness Programs
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
The NIST Cybersecurity Framework
View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Business Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
Dealer Member Cyber-security
Administrative Notice General Please distribute internally to: Legal and Compliance Senior Management Contact: Wendy Rudd Senior Vice President, Member Regulation and Strategic Initiatives 416 646-7216
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
The 5 Cybersecurity Concerns You Can t Overlook
The 5 Cybersecurity Concerns You Can t Overlook and how to address them 2014 SimSpace Corporation The 5 Cybersecurity Concerns You Can t Overlook CONCERN 1 You don t know how good your cybersecurity team
Business Continuity Exercise Program (BCEP) Information Packet
BUSINESS CONTINUITY PLANNING Business Continuity Exercise Program (BCEP) Information Packet This exercise program was developed by the Texas Engineering Extension Service (TEEX) A Member of the Texas A&M
PHILADELPHIA GAS WORKS Business Continuity Plan and Consulting RFP # 28576 Questions & Answers Emailed April 21, 2014
Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 QUESTIONS Under Task 1: It appears there are two tabletop exercises to be provided? Is there an estimate of how many personnel will take part in each exercise? Will PGW provide
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
